Symmetric Encryption

advertisement


Kryptos comes from the Greek word for "hidden"
The study & practice of hiding information:


Provides secure communication in the presence of third parties
Often supports information assurance

Can provide





Confidentiality
Integrity
Authentication
Non-repudiation
Cryptographic methods
Encryption: Confidentiality is maintained, hides the contents of the message,
but not the existence of the message
 Hashing: Integrity is maintained, but still does not hide the existence of the
message
 Steganography: Greek for “concealed writing”, goal is to keep the message’s
existence unknown

Symmetric Encryption
2

Process of transforming information to make it
unreadable to anyone



Must possess special knowledge to make the information
readable
Provides confidentiality
Definitions
1.
2.
3.
4.
Plaintext: The original, unaltered information
Cipher: algorithm used to perform the transformation
Key: piece of information used to control a cipher’s
output
Ciphertext: the transformed information created by
combining the plaintext and key using a cipher
Symmetric Encryption
3

Create a “fingerprint” from a file or string





Fingerprint is a sequence of bytes called a hash
Integrity is maintained, but still does not hide the
existence of the message
Two identical files or strings should result in the same
hash value
Uses a process that is hard to reverse
 Cannot determine the original text from the hash
 Cannot determine how to manipulate text to create an identical
hash
More on hashing (and its uses) later…
Symmetric Encryption
4


Study and practice of writing hidden
messages such that no one suspects the
existence of the message
NOT encryption

Encryption only hides the contents of a message
 Not the fact that two parties are communicating


Provides confidentiality


Steganography may or may not use encryption
Security through obscurity
Examples


Embedding text in an image file
Tattooing a message on the top of someone’s
head
 Hair grows back and message is hidden
Symmetric Encryption
5
Symmetric Encryption
6
Symmetric Encryption
7
Symmetric Encryption
8

Algorithms use trivially related keys for both
encryption and decryption

Keys are often identical
 May be a simple transformation between the two keys


Key represents a shared secret between two or
more parties
We’ll look at two examples


Caesar Cipher
Vigenère Cipher
Symmetric Encryption
9

Characters in plaintext are shifted a pre-determined
number of characters


Shift value is the shared key
In mathematical terms
Given shift value s,
 The kth letter is replaced by the letter at position:

(k + s) % 26

Or, more simply:
Symmetric Encryption
10
Decrypting is means subtracting rather than adding the shift value,
although you might notice that a shift value of 26-s actually reverses a
shift of s.
1.
At some earlier time, Alice and Bob agree to a secret key/shiftvalue k = 11.
2.
Alice decides to send Bob the secret message "MEET ME AT
NOON", i.e. plaintext = MEET ME AT NOON.
3.
Alice encrypts the plaintext (using something like the table
above) with key k=11 to get: ciphertext = XPPE XP LE YZZY.
4.
Alice sends Bob the ciphertext.
5.
Eve manages to read the message in transit, but since she reads
the ciphertext, XPPE XP LE YZZY, she can't make sense of it. Not
knowing the key, she can't decrypt it to recover the plaintext.
6.
Bob receives the ciphertext and decrypts it using something like
the table above, in reverse, with key k=11, recovering the
plaintext MEET ME AT NOON.
Symmetric Encryption
11


Class Exercise: Break into pairs and select a
shift value to send messages via the message
board
http://rona.cs.usna.edu/~si110/resources/cea
sar-shift/shiftTable.html
Symmetric Encryption
12

The study of methods for obtaining the
meaning of encrypted information


Without knowledge of the key
Targets weaknesses in the actual cryptography

Excludes methods such as bribery, coercion,
burglary, keystroke logging, and social engineering
Symmetric Encryption
13

Frequency analysis



Caesar cipher is a simple shift cipher


Use of letters in a given language occurs
with a [fairly] constant frequency
Analyzing how frequently a letter occurs
in ciphertext may divulge information
about the key
Shifted letters should occur at roughly
the same frequency as their plaintextcounterpart
What does this mean:

XPPE XP LE YZZY
Symmetric Encryption
14

Bottom Line: Caesar Shift Cipher is not very
secure and is quite vulnerable to attack via
frequency analysis :



There are only 26 key values, so trying them all is a
viable option
Since a given character in plaintext is always
replaced with the same character in ciphertext, letter
frequncies carry over from plaintext to ciphertext.
http://rona.cs.usna.edu/~si110/resources/cea
sar-shift/freqAnalysis.html
Symmetric Encryption
15

Uses a series of different
Caesar ciphers based on the
letters of a keyword

Polyalphabetic substitution
 Substitution using multiple
substitution alphabets

Implemented using a tabula
recta


Each row formed by shifting
the previous row one to the left
Disguise plaintext letter
frequencies

Sort of…
Symmetric Encryption
16


Vigenere Table on message board, groups
agree on key, encode, read aloud to transmit,
then decode a very short message
http://rona.cs.usna.edu/~wcbrown/si110/res
ources/vigenere/VigenereCipher.html
Symmetric Encryption
17

Still vulnerable to frequency analysis


If the length of the key is known
For key of length n, perform frequency analysis
using every nth character

Becomes a simple Caesar cipher
 Shift value is the first key character’s alphabet position


Start at the next character and repeat using every nth
character
Can eventually recover the entire key
Symmetric Encryption
18
Symmetric Encryption
19

Ciphertext:




JZFDEYNFUDS MB KLNFI CVIH KMUZ ECHELY
Suppose that we know that "ALBUQUERQUE" is in fact the
first word.
Perhaps we did something to provoke an encrypted
communication with that word.
ALB U Q UERQUE
↓↓↓↓ ↓ ↓↓↓↓↓↓
J Z F D E YNFU DS
We work through to recover the key like this:


row A has a J in the J-column, so J is the first letter of the key.
row L has a Z in the O-column, so we have an O as the second
letter, and so on. In this way we recover JOEJOEJOEJO and
deduce that the key was JOE.
Symmetric Encryption
20

Encryption/decryption requires three strings




Knowing two is enough to get the third



Plaintext
Key
Ciphertext
Plaintext + Key = Ciphertext
Ciphertext + Key = Plaintext
What if we know the plaintext and ciphertext?

Plaintext + Ciphertext = Key
Symmetric Encryption
21

What if we can induce a user to send a message
of our choosing


Combining the ciphertext with known
plaintext can reveal the key



Or at least some text the attacker knows
Key can be used to decrypt the rest of the message or
other messages
Used during WWII (Battle of Midway)
Many WEP-cracking tools based on chosen
plaintext attacks
Symmetric Encryption
22





May 1942, Admiral Yamamoto was assembling a carrier task force to launch a
diversionary raid off the Aleutian Islands and lure the US Navy to into a
decisive battle that would destroy what remained of the US fleet after Pearl
Harbor, allowing them to invade Midway Island.
From a decrypted JN-25 messages, US commanders knew the general outlines
of the plan, even the timetable. The messages, however, did not say where the
Japanese intended to strike; the target was simply designated "AF."
A ruse to determine what AF stood for was used, although Naval Intelligence
already suspected it was Midway, they arranged for US forces at Midway to
send a clear radio message that they were running short of fresh water
 Japanese intercepts took the bait, and US codebreakers in turn intercepted an
encoded Japanese message stating: AF was running short of fresh water.
Knowing that the assault was be at Midway, US forces were ready, and on June
4, 1942, U.S. Navy pilots sank all four Japanese aircraft carriers in Yamamoto's
task force, effectively turning the tide in the Pacific and the entire war.
As postscript to Midway, Yamamoto lost his life as a result of a decrypted message when code breakers learned that he was
scheduled to inspect a naval base in the Solomon Islands on April 18, 1943; and the decision was made to assassinate Yamamoto.
That morning, 18 P–38 fighters left their base at the other end of the Solomon chain and arrived just as his plane was making its
approach. The admiral was killed, depriving Japan of its most experienced admiral and sapping Japanese morale. To maintain the
fiction that the fighters had arrived by chance, they flew other patrols in the area, before and after the attack. The Japanese did not
change JN–25, and for the remainder of the war, U.S. intelligence intercepted and read thousands of Japanese messages.
Symmetric Encryption
23

AES (Rijndael)


RC4


Used in 802.11 WPA/WPA2
Used in 802.11 WEP
DES/3DES


Used in IPSEC VPNs
Replaced by AES
Symmetric Encryption
24
Symmetric Encryption
25
Download