Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
18 views46 pages

Lec 1 - Cryptology

Lec 1 cryptology

Uploaded by

youssefelkiki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views46 pages

Lec 1 - Cryptology

Lec 1 cryptology

Uploaded by

youssefelkiki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 46

Cryptology and Number Theory

Assoc. Prof. Fatty M. Salem


• Course Title : Cryptology and Number Theory

• Course Code: C-MA425

• Credit Hours: 4 credit hours

• Prerequisites : Computational Linear Algebra

• Instructor: Assoc. Prof. Fatty M. Salem


Instructor and TA

• Instructor:
• Assoc. Prof. Fatty M. Salem
• Associate Professor, Faculty of Computing and Information
Sciences, Egypt University of Informatics
• Email: [email protected]
• Office Hours: Sunday 2 pm - 4 pm
• TA:
• Eng. Ahmed Sherif ([email protected])
Course Syllabus
Reference

 William Stallings. Cryptography


and Network Security: Principles
and Practice, Pearson; 8th
edition (June 6, 2022).
Teaching and Learning Style
• Lectures
• Theoretical aspects will be covered in details
• Examples/problems are solved
• Questions are posed and you need to reflect and answer them
• Your questions are answered
• Tutorials
• More examples and problems are solved
• Your questions are answered
• Labs
• Hands on experiments
Classroom Policy

7
Course Description and Learning
Outcomes
Course Description
• This course provides an introduction to
• The security services, attacks and tools
• The Symmetric and Asymmetric encryption algorithms.

• Topics covered include:


• The security services, attacks and tools,
• Classical Symmetric Encryption,
• Modern Symmetric Encryption,
• Modes of Operations,
• Asymmetric Encryption,
• and Hash Functions.

9
Learning Objectives
• By the end of this course, students will develop the ability to:
• Analyze the different types of encryption algorithms.
• Evaluate the performance of both symmetric key and public key
techniques.
• Examine the cryptographic strength.
• Design a security system.

10
Course Contents
Contents
 Introduction
 Classical Symmetric Encryption
 Modern Symmetric Encryption
 (Simple DES & DES)
 Double DES and Triple DES
 Advanced Encryption Standard
 Modes of Operations
 Types of Cryptanalytic Attacks
 Numbering Theory
 Public Key Encryption
o RSA
o ElGamal Encryption
 Hash Functions and MAC
 Key Exchange
 Key Management
 Digital Signature Standard
Grading Scheme
Grading Scheme

Item Grade
Quizzes 10%
Tutorial and Lab Exercises 5%
Assignments 5%
Project 5%
Midterm 15%
Final 60%

14
Policies
• Academic Honesty
• Cheating is not tolerated; any cheating case will result in a zero score for
all students involved
• Examples of cheating:
• Copying the work of others
• Obtaining assignment solution from online sources
• Seeking help from, or providing help to other students on course work before it
is due for submission
INTRODUCTION
Definitions
• Plaintext: easy to understand form (original message).
• Ciphertext: difficult to understand form.
• Encryption: encoding (plaintext -> ciphertext).
• Decryption: decoding (ciphertext -> plaintext).
• Cryptology: study of encryption, the art and science of hiding the
meaning of a communication message from unintended recipients.
It encompasses both cryptanalysis and cryptography.
• Cryptography: use of encryption.
• Cryptanalysis: breaking encryption, the difficulty in recovering the
plaintext from the ciphertext as measured by cost or time”.
Computer Security Concepts

Services Attacks Mechanisms


Services:
• Authentication
• Confidentiality
• Integrity
• Non-repudiation
• Availability
• Access Control
Security Services

• Authentication: assurance that the communicating


entity is the one claimed.

• Confidentiality: protection of data from unauthorized


disclosure.

• Integrity: assurance that data received is as sent by an


authorized entity
Security Services

• Non-Repudiation: protection against denial by


one of the parties in a communication.

• Availability: ensuring that authorized parties are


able to access the information when needed.

• Access Control: prevention of the unauthorized


use of a resource.
Attacks
Attacks

• Normal Flow
Attacks
• Interception

• Modification
Attacks
• Fabrication

• Interruption (DoS)
Attacks
• Replay Attack
Attacks
• Traffic Analysis
Attacks

Attacks on Confidentiality Attacks on Integrity

Attacks on Authentication Attacks on Availability


Security Attacks

• Interception: This is an attack on confidentiality


• Modification: This is an attack on integrity
• Fabrication: This is an attack on authenticity
• Interruption: This is an attack on availability
Active and Passive Attacks

Security Attacks

Attack:
Active Attack Passive Attack
Active and Passive Attacks
Passive Attacks
• The main goal of a passive attack is to obtain unauthorized access
to the information. For example, actions such as intercepting and
eavesdropping on the communication channel can be regarded as
passive attack.
• These actions are passive in nature, as they neither affect
information nor disrupt the communication channel. A passive
attack is often seen as stealing information.
Active and Passive Attacks
Passive Attacks
Active and Passive Attacks
Active Attacks
- An active attack involves changing the information in some way by
conducting some process on the information. For example,
• Modifying the information in an unauthorized manner.
• Initiating unintended or unauthorized transmission of information.
• Alteration of authentication data such as originator name or
timestamp associated with information
• Unauthorized deletion of data.
• Denial of access to information for legitimate users (denial of
service).
Active and Passive Attacks
Active Attacks
Passive Attack Active Attack

Active Attack Active Attack

Active Attack Passive Attack


Active and Passive Attacks

Security Attacks

Active Attacks: Passive Attacks:


-Fabrication -Interception
-Modification -Traffic Analysis
-Interruption
-Replay
Cryptanalysis and Brute-Force Attack

• Cryptanalysis: This type of attack exploits the characteristics of


the algorithm to attempt to deduce a specific plaintext or to
deduce the key being used.

• Brute-Force Attack: The attacker tries every possible key on a


piece of ciphertext until an intelligible translation into plaintext
is obtained
Mechanisms
Mechanisms:

Security Mechanisms

Encryption Hash Digital Key


Function Signature Exchange
Encryption:

• Symmetric Encryption
• Asymmetric Encryption
• Hybrid Encryption
Encryption Equation
• Mathematically:
C = EK1(P) or C = E(K1, P) Encryption
P = DK2(C) or P = D(K2, C) Decryption
• P = plaintext P Ek C

• C = ciphertext K1
K2
• K1 = encryption key
• K2= decryption key C Dk P

• Symmetric encryption k1 = k2=k=secret key


• Asymmetric encryption k1≠k2 but are mathematically
related, k1 private key, k2 public key
• E = encryption algorithm
• D = decryption algorithm
• Both E and D are known to public
Symmetric Encryption
• Alice uses an encryption algorithm and a shared secret key.
• Bob uses a decryption algorithm and the same secret key.
Authentication

Confidentiality
Symmetric Encryption

Ka,b
A B

Ka,c Kb,c

We Need 3 Different
Keys
Symmetric Encryption

We Need 6 Different
Keys
Symmetric Encryption
• Advantages:
- Low complexity.
- Short processing time.
• Disadvantages:
- Large number of keys are required.
For N nodes, we need N(N-1)/2 different key.
- Hard key management.
- Some security services can’t be achieved.

You might also like