crypto-chapter-11 - IDE132 Maths and Passwords

advertisement
Temasek Academy
Math of Passwords
0000101001001101001010101010010101010010101001010101010100101010101001010101010111010101010
0110010101001010101001000010101010111010010101001010100101111101101001010010100101010100110
1001010010001011111010010110010101000111001010101001001010010100010101011010101100101000101
1010010101001010101010010101001010101001010010101010101001010100101010100101010110010101010
1001010010101010010101001010010101001010100100010100101011001010100101010010101010010101010
1001010100101010101101001010100110010100011101001010100101010100101010100101010101001010101
0100101010100101010100100101010010010101010010101001010010101010100010101010010101001010101
01001010101010101001010100101011010010101010101010100100
Chapter 1: Introduction to Cryptography
Cryptography is the study of message secrecy. Historically, cryptography has been used to encode
information to conceal secret messages from unauthorised parties and, as such, it is important for military and
national security use.
The development of information and communications technologies that allow vast quantities of data to
be transmitted, copied and stored quickly and easily has prompted a growing concern for the protection of privacy
and the confidentiality of data, including personal data, government administrative records, and business and
financial information. Effective cryptography is an essential tool in a network environment for addressing these
concerns. It is also used to protect classified government information.
In this course, we will study the developments of code writing from ancient times to our modern era, and
learn some of the classical ciphers, a modern cryptosystem, and certain aspects of Coding Theory.
Section
1.1
Terminology
Before we embark on this journey of discovery into the art of secrecy, let us introduce some special
words that we will be using in this elective.
“Cryptography” came from two root Greek words, meaning “secret writing”. (kryptós, meaning “hidden,”
and gráphein, meaning “to write”). In general, the study of the field of secret writing is called cryptography. In
layman terms, cryptography is the art of creating and studying secret “codes”.
“Cryptoanalysis” is the study of how to circumvent the use of cryptography, or in layman terms, the art
of codebreaking.
1
Temasek Academy
Math of Passwords
“Cryptology” is the whole field of secret writing in general, comprising of both cryptoanalysis and
cryptography, i.e., the study of both making and cracking secret “codes”.
“Encryption” is the process of converting ordinary readable information, plaintext, into unreadable
gibberish, ciphertext.
“Decryption” is just the reverse process of converting the unreadable ciphertext back into the original
readable message, plaintext.
“Code or cipher” in layman terms, is the method used to encrypt the information. However, specifically,
the two terms mean different things in cryptography. Thus we will use the term cipher to represent the method.
Strictly speaking, cipher refers to the set of algorithms used in encryption and decryption.
A “key” refers to the parameters used in the cipher. A cipher can have many possible keys. (i.e., the more
keys a cipher has, the harder it is to crack the cipher.)
Note: The field of cryptography or cryptology should not be confused with the field of Coding Theory, which
involves the study of accuracy of transmission of data across channels, an error prone process.
Typing in Secret Message
Plaintext
Hacker
(Doing Cryptoanalysis)
Encryption
Stealing Secret Message
Ciphertext
Transmitting Secret Message
Ciphertext
Decryption
The Real Da Vinci Code
Leonardo DA Vinci wrote his notes with his
left hand using a technique of mirror
writing. The mirror script made his work
Figure1.2
1:
Development
of Cryptography
very Section
difficult to read.
To compound
the
Illustration of processes in
difficulty, he also made use of unusual
Cryptography
spellings and abbreviations, while
arranging his notes in no logical order.
Receiving Secret Message
Plaintext
2
Temasek Academy
Math of Passwords
Task: Research on the development of cryptography and fill up the table below with the major events that
occurred during each period of time.
Read up on the ciphers you come across in your research and other classical ciphers.
1900 BC
Egyptian Hieroglyphic writing. The first known incidence of cryptography. A scribe used
nonstandard hieroglyphs in an inscription. This is the picture language that was used most often
to decorate temples and monuments. [Originally used to draw kings possessions]
600 BC
500 - 600 B.C. - ATBASH Cipher.
Hebrew scribes writing down the book of Jeremiah used a reverse-alphabet simple substitution
cipher known as the ATBASH cipher. The ATBASH cipher is a Hebrew code which substitutes the
first letter of the alphabet for the last and the second letter for the second last, and so on.
ATBASH to English
Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher: ZYXWVUTSRQPONMLKJIHGFEDCBA
500 BC
486 B.C. - Greek Skytale
Ancient Greeks invented the "Skytale" (rhymes with Italy), which was a stick wrapped with narrow
strips of papyrus, leather, or parchment.
The message was written on the wrapping; then the strip was removed and passed to the
messenger. Only if the receiver had the same size tube would they be able to read the message.
50 BC
Julius Caesar's simple substitution cipher.
This type of encryption is one of the simplest and most widely known encryption techniques. Each
letter of the plaintext is replaced by a letter some fixed number of positions further down the
alphabet. For example, a shift of 4 would move A to E, B to F, etc. Such as:
Plain: abcdefghijklmnopqrstuvwxyz Cipher: DEFGHIJKLMNOPQRSTUVWXYZABC
800
Around 800 AD, religiously motivated textual analysis of the Qur’an led to the invention of the
frequency analysis technique for breaking monoalphabetic substitution ciphers by al-kindi.
1500
In 1467,Leon Alberti invented the cipher disk and cryptographic key. Alberti's cipherdisk was
polyalphabetic, meaning that a new alphabet could be created each time by turning the disk. This
type of disk was the only method of using this type of cipher until the 16th century. This
assumption was based on his inquiries into frequency analysis, which is the most effective
method of deciphering monoalphabetic cryptograms.
1600
In 1626, the Great Cipher was developed by the rossignols. Each number stood for a French
syllable rather than single letters.
1800
In 1845, Samuel Morse created the Morse Code - Morse code represents letters, numbers and
punctuation marks by means of a code signal sent intermittently. This is an early form of digital
communication. It uses to states(on and off) composed into five symbols: dit('), dah(-), short gap
(between letters), medium gap (between words) and long gap (between sentences). Morse code
differed from the telegraph in the fact that it sent code for each letter on a single wire rather than
3
Temasek Academy
Math of Passwords
a wire for each letter. In 1863, the European Morse Code was created.
1900
In 1917, the Zimmerman telegram was a secret telegram which included proposals for a German
alliance with Mexico. The telegram was intercepted and decrypted by the British Government.
1920
Arthur Scherbius designed the Enigma in 1918 - a device which allowed businesses to
communicate confidential documents without having to resort to clumsy and slow codebooks.
The device consisted of many rotors turning on a common axis. The rotors had numbers 1
through 26 marked on the edge, or the alphabet A-Z, and were equipped with 26 electrical
contacts (one for each letter of the alphabet) so that when a letter was pressed, the output would
depend on the position of the rotor and its cross wiring. Within that year, the Enigma was put to
use by the Nazi Germans before and during WWII.
1940
Captain Midnight radio show featured the “Code-O-Graph” at the finishing of each transmission,
where fans could request the program’s sponsors to get the Code-O-Graph and decode the secret
messages from the program. (Classic example of a cipher disk except that it used numbers instead
of letters.
1968
It is the start of John Walker’s 17 years of copying keys and sending them to the Soviet Union
during the Cold War. He helped the Soviet Union garner more than one million messages and
compromised US codes.
1976
1976 - Diffie Hellman
Whitfield Diffie & Martin Hellman publish Public-key Cryptography. This asymmetric key
cryptosystem was known as the Diffie-Hellman key exchange, and was the first published practical
method for establishing a secret key through unprotected communications channels without a
prior shared secret.
Note: In public key cryptography, a user has a pair of cryptographic keys—a public key and a
private key. The private key is kept secret, while the public key may be widely distributed.
Incoming messages would have been encrypted with the recipient's public key and can only be
decrypted with his corresponding private key. The keys are related mathematically, but the private
key cannot be practically derived from the public key.
Also, In encryption, a key specifies the particular transformation of plaintext into ciphertext, or
vice versa during decryption.
1991
Pretty Good Privacy (PGP)
PGP is a computer program that provides cryptographic privacy and authentication. PGP is often
used for signing, encrypting and decrypting e-mails to increase the security of e-mail
communications. It was originally created by Philip Zimmermann in 1991.
1999-2000
1999 -January RSA Data Security, establishes worldwide distribution of encryption product
outside the USA
National Institute of Standards and Technologies announces that 56-bit DES is not safe
compared to Triple DES
4
Temasek Academy
Math of Passwords
German government wants to elaborate a cryptography-law, different organizations start a
campaign against that law.
computer hackers do no longer only visit websites and change little details there but cause
breakdowns of entire systems, producing big economic losses.
2010
Section 1.3
Related Readings
The list of readings below will be useful in this elective to understand more about the art of secrecy, but it is not
exhaustive. Feel free to find more related readings.
Readings (Books)
1)
The cracking code book: how to make it, break it, hack it, crack it
Author: Simon Singh
2)
The science of secrecy: the secret history of codes and code breaking
Author: Simon Singh
3)
652.8 SIN
652.8 SIN[BIZ], 652.809 SIN[BIZ],
Cryptography Demystified
Author: John E. Hershey
4)
Crypto: secrecy and privacy in the new code war
Author: Steven Levy
5)
005.82 HER[COM]
652.8 LEV[BIZ]
Cryptography for dummies
Author: Chey Cobb
005.82 COB[COM]
Available: Tampines Regional Library
Readings (Websites)
1)
Wikipedia Website
Cryptography Portal: http://en.wikipedia.org/wiki/Portal:Cryptography
Cryptography:
2)
http://en.wikipedia.org/wiki/Cryptography
Website of Author of “The Code Book”, Simon Singh:
http://www.simonsingh.net/
3)
Frode Weierud’s CryptoCellar: Cryptology and Its History
http://mad.home.cern.ch/frode/crypto/
4)
Beyond Discovery Website
http://www.beyonddiscovery.org/content/view.article.asp?a=3420
5)
Cryptology Essay by Oliver Pell
http://www.ridex.co.uk/cryptology/
6)
National Security Agency (USA)
http://www.nsa.gov/museum/
5
Temasek Academy
Math of Passwords
6
Download