Seminar no.1 Information security for 4th course MIPT

31
Seminar #1 Infosecurity Kolybelnikov Alexander [email protected]

description

First seminar at infaormation security of 4 th course of MIPT. Basic terms and definitions. History of cryptography.

Transcript of Seminar no.1 Information security for 4th course MIPT

Page 1: Seminar no.1 Information security for 4th course MIPT

Seminar #1 Infosecurity

Kolybelnikov Alexander

[email protected]

Page 2: Seminar no.1 Information security for 4th course MIPT

Agenda

• Organizational matters• Basic terms and defintions• History of cryptography• Infosecurity

Page 3: Seminar no.1 Information security for 4th course MIPT

Organizational matters

Page 4: Seminar no.1 Information security for 4th course MIPT

Requirements for seminar courseTask Stage 1 Stage 2 Stage 3 Stage 4

Essay Paper essay: 10 points

Article on Wiki +5 points

Conference, good article on Wiki + 5 points

Featured article on Wiki:50 points

Project 10 points Valuable project +5 points (2 projects for a group)

Project is marked as good by the commisson of seminarists – +5 points (3 projects for a course)

Hometask Upper limit: 10 points

Page 5: Seminar no.1 Information security for 4th course MIPT

How to pass the tasks

• Essay – defence at the seminar;

• H/w – send to e-mail [email protected] before a deadline;

• Project – defence at the seminar;

• Tests – at the seminars.

Page 6: Seminar no.1 Information security for 4th course MIPT

Examination

• 60 points – 3 control works at lectures during the course.

Page 7: Seminar no.1 Information security for 4th course MIPT

Basic terms and definitions

Page 8: Seminar no.1 Information security for 4th course MIPT

Cryptography, cryptology, cryptoanalysis

Cryptography (from Greek κρυπτός — ”hidden secret” and γράφω — ”writing”) — the study about methods of information confidentiality and consistency maintenance.

Page 9: Seminar no.1 Information security for 4th course MIPT

Cryptology (from Greek κρυπτός — ”hidden secret” and λόγος — ”word”) — the study about encrypting and decrypting methods. Cryptology consists of two parts: cryptography and cryptoanalysis. Cryptography studies development of data encrypting methods.

Cryptoanalysis – estimation of strong and week sides of encrypting methods and development of methods allowing to break cryptosystems.

Cryptography, cryptology, cryptoanalysis

Page 10: Seminar no.1 Information security for 4th course MIPT

Cipher, key, encrypting

• Cipher is a reversible way of information transformation using a key. The aim of a cipher is to ensure information confidentiality. Algorithms of cryptography transformations reflecting the multitude of plain texts M to the multitude of possibly encrypted data C with the use of key K.

Page 11: Seminar no.1 Information security for 4th course MIPT

• Key K: secret and/or public (paired with the secret one) component of a cipher that allows reflecting of plain texts M multitude to plain texts C multitude.

• Encrypting is the process of plain text transformation to encrypted text with the use of a cipher and a key.

Cipher, key, encrypting

Page 12: Seminar no.1 Information security for 4th course MIPT

• Decryption (russian: расшифрование) – the process of encrypted text transformation to plain text with the use of a cipher and a key.

• De-encryption (дешифрование) – receiving of plain data according to known secret data without knowing a key.

Cipher, key, encrypting

Page 13: Seminar no.1 Information security for 4th course MIPT

History of cryptography

Page 14: Seminar no.1 Information security for 4th course MIPT

History periodicity

• The first period (approximately since the 3rd millennium BC) is characterised by prevalence of monoalphabetic ciphers

Page 15: Seminar no.1 Information security for 4th course MIPT

• The second period (since the IX century in the Middle East (Al-Kindi) and since the XV century in Europe (Leon Battista Alberti) before the beginning of the XX century) is characterized by the use of polyalphabetic ciphers

History periodicity

Page 16: Seminar no.1 Information security for 4th course MIPT

History periodicity

• The third period (since the beginning and to the middle of the XX century) is characterized by introduction of electromechanical devices in work of crytpographers. Polyalphabetic ciphers were also widely used.

Page 17: Seminar no.1 Information security for 4th course MIPT

• The fourth period (since the middle to the 70th years of the XX century) is characterized by transition to mathematical cryptography. Shannon's work: strict mathematical definitions of information amount, data transmission, entropy, encrypting functions.

History periodicity

Page 18: Seminar no.1 Information security for 4th course MIPT

• The modern period of cryptography development (since the end of the 1970th years to the present) is characterized by the origin and development of the new derection — cryptography with a public key.

History periodicity

Page 19: Seminar no.1 Information security for 4th course MIPT

Infosecurity

Page 20: Seminar no.1 Information security for 4th course MIPT

Information transfer system

Page 21: Seminar no.1 Information security for 4th course MIPT

Infosecurity purposes

• Confidentiality;

• Consistency;

• Accessibility.

Page 22: Seminar no.1 Information security for 4th course MIPT

Monoalphabetic ciphers• Monoalphabetic cipher (cipher of simple

replacement, simple sustitution cipher) is a class of encrypting methods that define mapping of each letter of encrypted text to the letter of plain text.

• Examples:– Etbash;– Caesar ciphers;– etc.

Page 23: Seminar no.1 Information security for 4th course MIPT

Etbash cipher

• Plain text: abcdefghijklmnopqrstuvwxyz Encrypted text: ZYXWVUTSRQPONMLKJIHGFEDCBA

Page 24: Seminar no.1 Information security for 4th course MIPT

Caesar cipher (Julius)

• Each Caesar from Rome has his own cipher. Julius Caesar cipher became the most well-known.

Page 25: Seminar no.1 Information security for 4th course MIPT

Polyalphabetic cipher

• Polyalphabetic cipher is cyclic application of several monoalphabetic ciphers to a certain number of letters of the encrypted text.

• Examples:– Vigenere cipher;– Gronsfeld cipher.

Page 26: Seminar no.1 Information security for 4th course MIPT

Vigenere cipher

Page 27: Seminar no.1 Information security for 4th course MIPT

Stability of ciphers

• All ciphers are divided into several classes of stability:– unbreakable (absolutely unbreakable) ciphers;– calculating unbreakable ciphers;– ciphers based on solution of a mathematic task

that is unsolved yet;– breakable ciphers.

Page 28: Seminar no.1 Information security for 4th course MIPT

Unbreakable ciphers – Vernam cipher

Page 29: Seminar no.1 Information security for 4th course MIPT

Calculating unbreakable ciphers

• DES;• AES;• GOST 28147-89;• Other symmetric and stream ciphers

Page 30: Seminar no.1 Information security for 4th course MIPT

Ciphers based on unsolved mathematic problems

• RSA;• Diffi-Helman.

Page 31: Seminar no.1 Information security for 4th course MIPT

Breakable ciphers

• Linear recurrent register;• A5/1;• SkipJack;• etc...