44
Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust [email protected] Lecture Course in Estonian IT College Autumn 2014

Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust [email protected] Lecture Course in Estonian IT College

Embed Size (px)

Citation preview

Page 1: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Data Security and Cryptology, V

Traditional (Pre-Computer) Cryptography

Data Security and Cryptology, V

Traditional (Pre-Computer) Cryptography

October 1st, 2014

Valdo Praust 

[email protected]

Lecture Course in Estonian IT CollegeAutumn 2014

  

October 1st, 2014

Valdo Praust 

[email protected]

Lecture Course in Estonian IT CollegeAutumn 2014

  

Page 2: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Standard Model of Security Harming1. Threats (ohud) influence the data (via IT assets)

2. Threats use the vulnerabilities (nõrkused, turvaaugud) of IT assets or components of IT system

3. Threats with co-influence the vulnerabilites will determine the risk or security risk (risk, turvarisk)

4. When a certain risk realises, there will appear a security loss or security breach or security incident (turvakadu, turvarike, turvaintsident)

5. In order to minimize the risks there’s necessary to minimise vulnerabilities using safeguards of security measures (turvameetmeid)

Page 3: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Economical View of Data Security

Page 4: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Essence of Risk Management

• risk of availability loss, risk of integrity loss and risk of confidentiality loss must all be taken into account

• typically these acceptable risks are determined by the business process and given to IT specialists (IT security specialists) as existing values

Main goal of risk management: to implement exactly such a set of safeguards, which lead a security risk (the significance of theats + and its realising probability through vulnerabilities) to the level of the accepted residual risk

Main goal of risk management: to implement exactly such a set of safeguards, which lead a security risk (the significance of theats + and its realising probability through vulnerabilities) to the level of the accepted residual risk

Page 5: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Main Alternatives of Risk Management

1. Detailed risk analysis (detailne riskianalüüs). An ideal case

2. Baseline approach (etalonturve metoodika). A convenient way in a lot of practical cases

3. Mixed approach (segametoodika). Takes the best elements from both baseline and detailed risk analysis combining them

4. Informal approach (mitteformaalne metoodika). A real practical alternative to systematic (formal) approaches

Page 6: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Detailed Risk Analysis

2. Founding areas where it’s necessary to reduce the residual risk

3. Implementing appropriate safeguards in these areas

4. Finding new residual risks with the comparing them to accepted residual risk

5. Repeating the above-mentioned procedure until we fit to the accepted residual risk limits

1. Residual risk evaluating with the using of either qualitative or quantitative risk analysis methodology

Page 7: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Essence of Baseline Approach

Baseline approach is a main alternative of detailed security analysis for the casees of limited resources (used in 99% situations in practice)

In the case of baseline methodology (etalonturbe metoodika) we have a given (fixed) set of mandatory safeguards for a certain (early determined) security level and we assume that implementing these safeguards is sufficient to reach the mentioned security level (to reach to the limits of accepted residual risk)

In the case of baseline methodology (etalonturbe metoodika) we have a given (fixed) set of mandatory safeguards for a certain (early determined) security level and we assume that implementing these safeguards is sufficient to reach the mentioned security level (to reach to the limits of accepted residual risk)

Page 8: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Main Idea of Baseline Approach1. All typical components of the typical information

system (buildings, office, servers, hardware, software, communications, users, organization, access control, etc.) was taken into account as an hypothetical system

2. The certain level of security was predefined

3. The detailed risk analysis was implemented (once!) for above-mentioned circumstances. The result is a certain set of safeguards

4. It is assumed that for any other information system the same security level needs to implement the same set of safeguards. Therefore, these safeguards can be considered as a baseline safeguards (etalonturvameetmed)

Page 9: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Essence of Mixed Approach

Two main branches of mixed approach (segametoodika):

1. Sets of baseline safeguards are prepared not only for a certain (single) security level but for different security levels (for different pre-defined availability, integrity and confidentiality levels)

2. In mission-critcal and/or unique architecture components the detailed risk analysis was implemented (in other components the baseline approach)

Overtakes the advantages from both, detailed risk analysis and baseline approach combining them in order to find a reasonable compromize

Overtakes the advantages from both, detailed risk analysis and baseline approach combining them in order to find a reasonable compromize

Page 10: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Informal Apporoach

It is a useful method when:• risk analysis has to be performed very fast• we havn’t any suitable abstract risk assessment

approaches or we can’t use them for some reasons• existing risk management methods are too

resource-consumable for us• we have suitable experienced (IT) professionals

Informal approach (mitteformaalne riskihaldusmetoodika) is based on risk assessment by non-abstract methods using the existing experience of specialists (own employees, external consultants)

Informal approach (mitteformaalne riskihaldusmetoodika) is based on risk assessment by non-abstract methods using the existing experience of specialists (own employees, external consultants)

Page 11: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Two Stages of Cryptography• Pre-computer cryptography or traditional

cryptography (arvutieelne ehk traditsiooniline krüptograafia). Uses paper-pencil or some simple mechanical devices (until 1940s). Was a tool only for military, diplomacy and intelligence areas (until 1970-80s). Uses empirical tehcniques (until 1949)

• Contemporary cryptology or computer-age cryptography, usually called only cryptography ((kaasaja) krüptograafia). Uses computers as encrypting/breaking tools (since 1940s). Is an essential tool for each e-systems (since 1970-80s). Uses scientific-based algoritms(since 1949)

Page 12: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Essence of Traditional Cryptography

Traditional or pre-computer cryptography (traditsiooniline ehk arvutieelne krüptograafia) was a discipline which aim was a hiding of information (hiding meaning of data) for foreign or alien people by the way of ”strange writing”

Traditional or pre-computer cryptography (traditsiooniline ehk arvutieelne krüptograafia) was a discipline which aim was a hiding of information (hiding meaning of data) for foreign or alien people by the way of ”strange writing”

The name of the discipline comes from the Greek name (like most of other classic disciplines):• κρνπτος (kryptos) – hidden• γραπηο (graphō) – I write

Cryptography means “hidden word” in Greek

Page 13: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Sources of Cryptography

Cryptography derives probably from ancient times, when the writing was invented and there also soon arises a necessity to write down the information in such a way that it will be understandable by own people but ununderstandable for others (aliens)

Cryptography derives probably from ancient times, when the writing was invented and there also soon arises a necessity to write down the information in such a way that it will be understandable by own people but ununderstandable for others (aliens)

How old it actually is?• An alphabet is some thousand years old

(first used by Phoenicians), hieroglyphs are much older (at least 5000 years)

• Cryptography is probably also about 3000-5000 years old

Page 14: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

The Oldest Known Utilization Fact

Hieroglyphs on cliff-tomb of Egyptian Pharaoh Khnumhotep, which are completly different from other knows hieroglyphs from these times

About 4000 years old (1900 BC)

Page 15: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Main Methods of Pre-Computer Cryptography, I

• substitution (substitutsioon) – replacing of original characters (letters) by another characters (letters)

• transposition or permutation (transpositsioon, permutatsioon) – changing the order of characters (letters)

Page 16: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Main Methods of Pre-Computer Cryptography, II

The simplest pre-computer (ancient) ciphers were different variants of substitution or transposition ciphers. More complex ancient ciphers were certain combinations of substitution and transposition

The simplest pre-computer (ancient) ciphers were different variants of substitution or transposition ciphers. More complex ancient ciphers were certain combinations of substitution and transposition

By the way, even a lot of modern (computer-age) cryptoalgorithms are still a complex combinations of substitution and transposition

Page 17: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Used probably since 200 BC

Ancient Greek Cryptography: Polybios Square

Each character was replaced by the pair of numbers of row and column. For example EESTI was replaced by 5151344442

The alphabet was usually re-arranged or mixed (25! different possibilities)

Page 18: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

A Greek Transposition Cipher

Is known under a name Skytale

• First known use in 500BC• Includes a tape (belt), on which the characters

were written, and a round stick• After the scrolling the tape on the stick the text

was written and later read

Page 19: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Example: a word KRYPTO is encrypted to CIOHKG

Caesar Cipher

Was a simple substitution cipher – each letter (character) was replaced by another letter with a certain positions ahead

Was a simple substitution cipher – each letter (character) was replaced by another letter with a certain positions ahead

Was used by a famous Roman Emperor Julius (Gaius) Caesar

Usage time: about 50 BC

Page 20: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Line Transpostion CipherText was written into the lines with a certain length, later columns were rearranged:

Page 21: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Arab CryptographyAl-Khalil (Abu `Abd al-Rahman al-Khalil ibn Ahmad ibn `Amr ibn Tammam al Farahidi al-Zadi al Yahmadi), about AD 790 :

• Has written the book about ciphers (lost, but used as citations in other later and remained books)

• Has discussed on a different cipher systems, including the systems which were used in Byzantine Empire

• Has used the complex cryptoanalytic means (by the way the known plaintext analysis which was used in 1940 for breaking ENIGMA cipher)

Page 22: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Jefferson’s Cylinder

First mentioned in 1790

• Each of (numbered) disks bears full alphabet in different arrangement

• Arrangement of disks on a stick is a key

• Message (plaintext) was set into one line by turning of disks; from another line the ciphertext was read

Page 23: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Vigenére’s Table

Page 24: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Vigenére’s Table• Is a common rule how we calculate the

ciphertext letter from a plaintext letter and key letter

• The key is a portion of any text (usually from previously determined book and page)

• Was very widely used between 18th and 20th centuries

If the lenght of key is equal to the lenght of enciphered text, then such a system (Vernam’s cipher) is theoretically unbreakable

If the lenght of key is equal to the lenght of enciphered text, then such a system (Vernam’s cipher) is theoretically unbreakable

It was proved by Shannon in 1949

Page 25: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Paper and Pencil as Essential Tools

• Until the 1920-40s the paper and pencil were the most important tools in encryption; other tools were used only slightly

• Most used cipher was a Verman cipher when certain book (certain page of book) was used as a key material

During 1920-40s there also appeared first mechanical and/or electromechanical ciphering devices (machines)

During 1920-40s there also appeared first mechanical and/or electromechanical ciphering devices (machines)

Page 26: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

An ENIGMA Cipher Machine

ENIGMA was constructed by Germans during 1930s. ENIGMA ciphers was considered unbreakable in these times

ENIGMA was constructed by Germans during 1930s. ENIGMA ciphers was considered unbreakable in these times

• ENIGMA was a complex substitution-permutation cipher, where the key was an initial position of permutative rotors (usually there was 3 rotors)

• Rotor was disk with 26 electrical contacts on both side and realises a permutation of 26-letter alphabet

Page 27: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

An ENIGMA Cipher Machine• By each letter encryption the last rotor was moved by one

step• If the last rotor has done 26 steps (full circle), the middle

rotor was moved by an one step (as in car odometer) • There were varied 262626 = 17 576 different positions of

rotors (different permutations)

This method was considered to be unbreakable in 1930-40s

This method was considered to be unbreakable in 1930-40s

Page 28: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

ENIGMA: a Wiring Scheme

Page 29: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

ENIGMA: Photos

Page 30: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

ENIGMA: Photos

Page 31: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Other (Electro)mechanical Cipher Machines

Sigaba: USA, 1930s

Differently from ENMIGA, the ciphers of Sigaba were really unbreakable

Page 32: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Other (Electro)mechanical Cipher Machines

M-100: USSR, 1934

Germans were unable to decrypt the messages made by M-100 during WWII

Page 33: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

ENIGMA - A Breaking Story• ENIGMA cipher was theoretically broken

by a Polish cryptographer Rejewski in 1930s but it needed large amount of calculations (a lot of time and/or machine work)

• In 1943, a British matematician Alan Turing constructed a special electronic computer (first in world!) named COLOSSUS, which only aim was breaking the ENIGMA ciphers

• This fact was kept secret for a long time (until the end of cold war in late 1980s) because COLOSSUS was made by British intelligence MI5

Page 34: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

COLOSSUS • Was built in 1943 in UK (MI5) especially

for breaking ENIGMA ciphers• Was a top secret device until 1980s• Was the first electronic computer in

world• The exact functional copy of original

COLOSSUS was built in UK in 1990s

Page 35: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

End of Traditional Cryptography, I

End of traditional cryptography was mainly caused by an appearing of electronic computer in 1940s (COLOSSUS, ENIAC), which made a computational work thousands times faster than before

End of traditional cryptography was mainly caused by an appearing of electronic computer in 1940s (COLOSSUS, ENIAC), which made a computational work thousands times faster than before

It ended the era of pre-computer ciphers (crypotoalgorithms) and a traditional (pre-computer) cryptography

Since 1940s for both during encryption and cipher breaking processe there was used (electronical) computers

Page 36: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Since 1949 we can speak about contemporary (modern, scientifical) cryptography. It is a branch of applied mathematics. It is used as an useful tool for data security (both confidentiality and integrity)

Since 1949 we can speak about contemporary (modern, scientifical) cryptography. It is a branch of applied mathematics. It is used as an useful tool for data security (both confidentiality and integrity)

End of Traditional Cryptography, II

Around the same time with the appearance of electronic computers, Shannon published his information theory (1949). It led cryptology from previous empirical basis to scientific basis

Page 37: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

The transition from paper-based into computer-based encrypting during 1940-50s did not change these traditional usage fields

The transition from paper-based into computer-based encrypting during 1940-50s did not change these traditional usage fields

A Tool for Diplomats and Warriors

Traditional or pre-computer cryptography was used for a narrow purposes - for diplomacy, intelligence and military purposes

In many countries until 1970-80s the encryption equipment/devices was considered to be handled as weapons

Page 38: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Mass-use of cryptographic means in commerce began together with the spread on wide-area computer networks (Internet) during 1970-80s where the transferred information confidentiality often needed a protection

Mass-use of cryptographic means in commerce began together with the spread on wide-area computer networks (Internet) during 1970-80s where the transferred information confidentiality often needed a protection

1970-80s – From Military to Commerce Use

Additionally this process was heavily led by the invention of new types of cryptoalgorithms which do not protect the confidentiality but integity

Page 39: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

The Essence and Role of Contemporary Cryptology

The aim of contemporary cryptology is not only confidentiality. The additional aim – the avoiding of unauthorized changes (integrity) was added. Ensuring of integrity can be even considered as the main function of contemporary cryptology (ca 80% of its usage)

The aim of contemporary cryptology is not only confidentiality. The additional aim – the avoiding of unauthorized changes (integrity) was added. Ensuring of integrity can be even considered as the main function of contemporary cryptology (ca 80% of its usage)

But the classical (Greek) name cryptography (a hidden word) has stille remained as a relict (even in these cases when the aim is not confidentiality)

Page 40: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

The mass-usage of Internet (the early and mid 1990s) caused the final liberalizing of cryptographical means/devices use

The mass-usage of Internet (the early and mid 1990s) caused the final liberalizing of cryptographical means/devices use

1990s: Liberalizing of Cryptology

Last essential “old relicts” were:

• France - until mid-1990s the cryptographivc devices’ usage were considered as weapons

• U.S.- until 1999 there was an export ban of unbreakable algorithms (algorithms with tke keylenght more than 40 bits)

Page 41: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Contemporary Cryptology as a Typical Tool of IT and Data Security

Without the using of cryptographical tools as an essentials tools for protecting digital data, there’s usually impossible to realize any information system. The observation of crypto-tools as weapons are lost forever already for long years

Contemporary cryptology is a basic mean to protecting both the integrity and confidentiality of any digital data. For protecting of availabilty it is usualy an auxiliary mean

Contemporary cryptology is a basic mean to protecting both the integrity and confidentiality of any digital data. For protecting of availabilty it is usualy an auxiliary mean

Page 42: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Contemporary Cryptography — an Official Definition

Contemporary Cryptography — an Official Definition

(Contemporary) cryptology ((kaasaja) krüptograafia) is a discipline that embodies the principles, means, and methods for the transformation of data in order to hide their semantic content, prevent their unauthorized use, or prevent their undetected modification (Source: ISO 7498-2)

(Contemporary) cryptology ((kaasaja) krüptograafia) is a discipline that embodies the principles, means, and methods for the transformation of data in order to hide their semantic content, prevent their unauthorized use, or prevent their undetected modification (Source: ISO 7498-2)

Page 43: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Basic Concepts of (Contemporary) Cryptology

• Encryptable (convertable from readable to unreadable form) text is called plaintext (avatekst)

• Encrypted text (the text which is already converted to unreadable form) is called ciphertext (krüptogramm)

• The converting process from plaintext to ciphertext (from readable to unreadable form) is called encryption or encipherment (krüpteerimine, šifreerimine)

• The converting process from ciphertext back to plaintext (beck to readable form) under normal circumstances is called decryption or deciphering (dešifreerimine)

Page 44: Data Security and Cryptology, V Traditional (Pre-Computer) Cryptography October 1st, 2014 Valdo Praust mois@mois.ee Lecture Course in Estonian IT College

Basic Concepts of (Contemporary) Cryptology

• Usually both the enciphering and deciphering processes are performed by using a key or secret key (võti, salajane võti)

• Deciphering is a transforming of ciphertext into a plaintext using an appropriate key

• Successful transforming of ciphertext into a plaintext without a key is called breaking a cryptoalgorithm (krüptoalgoritmi murdmine)

In pre-computer (traditional) cryptoalgoritms the key is often undistinguishable from an algoritm itself

In pre-computer (traditional) cryptoalgoritms the key is often undistinguishable from an algoritm itself