f35 frosh sem cryptography

Information about f35 frosh sem cryptography

Published on December 31, 2007

Author: Marian

Source: authorstream.com

Content

Cryptography:  Cryptography A Lecture in CE Freshman Seminar Series: Ten Puzzling Problems in Computer Engineering About This Presentation:  About This Presentation This presentation belongs to the lecture series entitled “Ten Puzzling Problems in Computer Engineering,” devised for a ten-week, one-unit, freshman seminar course by Behrooz Parhami, Professor of Computer Engineering at University of California, Santa Barbara. The material can be used freely in teaching and other educational settings. Unauthorized uses, including any use for financial gain, are prohibited. © Behrooz Parhami Some Simple Cryptograms:    Some Simple Cryptograms Cipher: YHPARGOTPYRC OT EMOCLEW Plain: ----------------------- Cipher: EHT YPS WSI RAE GNI LBA CEU TAO Plain: --- --- --- --- --- --- --- --- Cipher: ICCRAANCTKBEEDLTIHEIVSECYOODUE Plain: ------------------------------ I C A N T B E L I E V E Y O U C R A C K E D T H I S C O D E Cipher: SSA PSE TJX SME CRE STO THI GEI Plain: --- --- --- --- --- --- --- --- THI 1 2 3 4 5 6 7 8 Key: 7 4 1 8 6 2 5 3 SME SSA GEI STO PSE CRE TJX Cipher: AMY TAN’S TWINS ARE CUTE KIDS Plain: A T T A C K Simple Substitution Ciphers:    Simple Substitution Ciphers Decipher the following text, which is a quotation from a famous scientist. Clue: Z stands for E “CEBA YUC YXSENM PDZ SERSESYZ, YXZ QESOZDMZ PEJ XQKPE MYQGSJSYA, PEJ S’K ECY MQDZ PLCQY YXZ RCDKZD.” PBLZDY ZSEMYZSE ALB RT INST IN X stands for H? Contextual information facilitated the deciphering of this example Breaking Substitution Ciphers:    Breaking Substitution Ciphers CEBA YUC YXSENM PDZ SERSESYZ YXZ QESOZDMZ PEJ XQKPE MYQGSJSYA PEJ SK ECY MQDZ PLCQY YXZ RCDKZD The previous puzzle, with punctuation and other give-aways removed: Letter frequencies in the cipher: A || N | B | O | C ||||| P ||||| D ||||| Q ||||| E ||||||||| R || F S |||||||| G | T H U | I V J ||| W K ||| X |||| L | Y ||||||||| M |||| Z |||||||| Most frequently used 3-letter words: THE AND FOR WAS HIS Most frequently letter pairings: TH HE AN IN ER ON RE ED The Pigpen Cipher:    The Pigpen Cipher Encoded message: T This is a substitution cipher, with all the weaknesses of such ciphers Slide7:    More Sophisticated Substitution Ciphers:    More Sophisticated Substitution Ciphers The letter A has been replaced by C, D, X, or E in different positions The letter T has been replaced by M, W, or X in different positions 25 rotating wheels The German Enigma Encryption Machine:    The German Enigma Encryption Machine (1) W pressed on keyboard Q W E R T Z U I O A S D F G H J K P Y X C V B N M L (2) Battery now connected to W on plugboard . . . (3) . . . which is wired to X plug (4) Connection goes through the 3 rotors, is “reflected”, returns through the 3 rotors, leads to plugboard (5) Eventually, the “I” light is illuminated Source: http://www.codesandciphers.org.uk/enigma/index.htm Entry disk Reflector Three rotors Light array Keyboard Plugboard Alan Turing and the Enigma Project:    Alan Turing and the Enigma Project Source: http://www.ellsbury.com/enigmabombe.htm The Mansion at Bletchley Park (England’s wartime codebreaking center) Alan M. Turing 1912-1954 The German Enigma encryption machine Enigma’s rotor assembly A Simple Key-Based Cipher:    A Simple Key-Based Cipher Plain text: A T T A C K A T D A W N 00 19 19 00 02 10 00 19 03 00 22 13 Secret key: o u r k e y o u r k e y 14 20 17 10 04 24 14 20 17 10 04 24 Sum: 14 39 36 10 06 34 14 39 20 10 26 37 Modulo 26 sum: 14 13 10 10 06 08 14 13 20 10 00 11 Cipher text: O N K K G I O N U K A L A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Agreed upon secret key: ourkey Secret key: 14 20 17 10 04 24 14 20 17 10 04 24 Difference: 00 -7 -7 00 02-16 00 -7 03 00 -4-13 Modulo 26 diff.: 00 19 19 00 02 10 00 19 03 00 22 13 Recovered text: A T T A C K A T D A W N One can break such key-based ciphers by doing letter frequency analysis with different periods to determine the key length The longer the message, the more successful this method of attack Decoding a Key-Based Cipher:    Decoding a Key-Based Cipher A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Agreed upon secret key: freshman 09 14 07 13 18 12 08 19 07 Secret key: f r e s h m a n f 05 17 04 18 07 12 00 13 05 Sum: 14 31 11 31 25 24 08 32 12 Modulo 26 sum: 14 05 11 05 25 24 08 06 12 Cipher text: O F L F Z Y I G M Decipher the coded message and provide a reply to it using the same key Cipher text: B Y E L P E Y B Z I R S T Q 01 24 04 11 15 04 24 01 25 08 17 18 19 16 Secret key: f r e s h m a n f r e s h m 05 17 04 18 07 12 00 13 05 17 04 18 07 12 Difference: Modulo 26 diff.: Plain text: Reply: J O H N S M I T H -4 07 00 -7 08 -8 24-12 20 -9 13 00 12 04 22 07 00 19 08 18 24 14 20 17 13 00 12 04 W H A T I S Y O U R N A M E Key-Based Cipher with Binary Messages:    Key-Based Cipher with Binary Messages Agreed upon secret key (11 bits): 0 1 0 0 0 1 1 1 0 1 0 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 * & # @ % $ 26 27 28 29 30 31 Symmetric: Encoding and decoding algorithms are the same Data Encryption Standard (DES):    Data Encryption Standard (DES) Feistel block: The data path is divided into left (mi–1) and right (mi) halves. A function f of mi and a key ki is computed and the result is XORed with mi–1. Right and left halves are then interchanged. The f function is fairly complicated, but it has an efficient hardware realization Public-Key Cryptography:    Public-Key Cryptography Encryption and decryption are asymmetric. Knowledge of the public key does not allow one to decrypt a message. Electronic signature (authentication) Source: Wikipedia E.g., key for symmetric communication Analogy for Public-Key Cryptography:  Analogy for Public-Key Cryptography Alice sends a secret message to bob by putting the message in a box and using one of Bob’s padlocks to secure it. Only Bob, who has a key to his padlocks, can open the box to read the message. Bob’s padlocks Alice Bob Carol’s padlocks Dave’s padlocks Erin’s padlocks

Related presentations


Other presentations created by Marian

Manchester United 081204
14. 03. 2008
0 views

Manchester United 081204

lecture3
13. 04. 2008
0 views

lecture3

Session2 2 Yves
30. 03. 2008
0 views

Session2 2 Yves

20040820 RepICFA HN
27. 03. 2008
0 views

20040820 RepICFA HN

Cold War 2
18. 03. 2008
0 views

Cold War 2

rcc
12. 03. 2008
0 views

rcc

TGchapter8 Concepts
11. 03. 2008
0 views

TGchapter8 Concepts

Livingalive
04. 03. 2008
0 views

Livingalive

57351 1
28. 02. 2008
0 views

57351 1

SearchingtheInternet
26. 02. 2008
0 views

SearchingtheInternet

gopinath
24. 02. 2008
0 views

gopinath

landforms of canada
02. 10. 2007
0 views

landforms of canada

Power Point Colorado
03. 10. 2007
0 views

Power Point Colorado

Faults and Earthquakes
29. 10. 2007
0 views

Faults and Earthquakes

consumer360 2005 apples
05. 11. 2007
0 views

consumer360 2005 apples

group exercise
03. 12. 2007
0 views

group exercise

SWW3 Chilingaryan
02. 11. 2007
0 views

SWW3 Chilingaryan

Siranjeev 09 04 2006 WOII
13. 11. 2007
0 views

Siranjeev 09 04 2006 WOII

Competition Formats PP MT
16. 11. 2007
0 views

Competition Formats PP MT

tiger presentation
22. 11. 2007
0 views

tiger presentation

cecildb01
13. 12. 2007
0 views

cecildb01

Teaching
05. 12. 2007
0 views

Teaching

VietnamWar
25. 12. 2007
0 views

VietnamWar

Peter Uvin conference paper
27. 12. 2007
0 views

Peter Uvin conference paper

Week 01 Introduction to IPE
28. 12. 2007
0 views

Week 01 Introduction to IPE

atividadefisica
29. 12. 2007
0 views

atividadefisica

Kashmir presentation US India
01. 01. 2008
0 views

Kashmir presentation US India

ellis ed fc fdr
03. 01. 2008
0 views

ellis ed fc fdr

A 3 SMurphy
04. 01. 2008
0 views

A 3 SMurphy

THE COLD WAR
21. 12. 2007
0 views

THE COLD WAR

aquaculture
07. 01. 2008
0 views

aquaculture

brenda final
19. 11. 2007
0 views

brenda final

KS RuralEnvironment Tilden
28. 11. 2007
0 views

KS RuralEnvironment Tilden

05 25 Mayer PMC
29. 12. 2007
0 views

05 25 Mayer PMC

WinterManureApplppt
07. 01. 2008
0 views

WinterManureApplppt

CHEST2
04. 01. 2008
0 views

CHEST2

New AI
21. 11. 2007
0 views

New AI

airforce camp brief
18. 12. 2007
0 views

airforce camp brief

presentation ACFAS2 000
05. 11. 2007
0 views

presentation ACFAS2 000

eifert 9 15 07
03. 01. 2008
0 views

eifert 9 15 07

HowtoDoResearchonMov ies
19. 02. 2008
0 views

HowtoDoResearchonMov ies

item 633 12 Lacis labots
06. 11. 2007
0 views

item 633 12 Lacis labots

3022 office en
27. 11. 2007
0 views

3022 office en

6 3 Groundwater
09. 10. 2007
0 views

6 3 Groundwater

EAS303
21. 11. 2007
0 views

EAS303

20071103 DUSEL DC
17. 12. 2007
0 views

20071103 DUSEL DC

Its All Politics 1
04. 01. 2008
0 views

Its All Politics 1

Ernesto
01. 10. 2007
0 views

Ernesto

Barish EAC
18. 12. 2007
0 views

Barish EAC

conditional propositions
16. 11. 2007
0 views

conditional propositions

OpeningCreatImpr
05. 11. 2007
0 views

OpeningCreatImpr