Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.

Slides:



Advertisements
Similar presentations
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Advertisements

Digital Signatures and Hash Functions. Digital Signatures.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Cryptographic Security CS5204 – Operating Systems1.
Asymmetric-Key Cryptography
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptographic Technologies
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Encryption Methods By: Michael A. Scott
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
COEN 351 E-Commerce Security Essentials of Cryptography.
Cryptography, Authentication and Digital Signatures
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Public-Key Cryptography CS110 Fall Conventional Encryption.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Computer and Internet Security. Introduction Both individuals and companies are vulnerable to data theft and hacker attacks that can compromise data,
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
1 Public-Key Cryptography and Message Authentication.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Encryption.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Digital Signatures, Message Digest and Authentication Week-9.
1 Introduction The State of the Art in Electronic Payment Systems, IEEE Computer, September 1997.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
COEN 351 E-Commerce Security
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Mort Anvari Introduction to Encryption Technology To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography and Network Security Chapter 13
Basics of Cryptography
Computer Communication & Networks
NET 311 Information Security
Presentation transcript:

Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1

Cryptographic Security CS 5204 – Operating Systems2 Goals of Cryptography  The most basic problem : ensure security of communication over in-secure medium  Security Goals: - privacy (secrecy, confidentiality) only the intended recipient can see the communication - authenticity (integrity) the communication is generated by the intended sender information is not altered or destroyed - non-repudiation party in a dispute cannot repudiate, or refute the validity of a statement

Cryptographic Security Basic terminology in Cryptography  Plaintexts  Cipher texts  Keys  Encryption  Decryption  Cryptography  Cryptanalysis  Cryptology

Cryptographic Security CS 5204 – Operating Systems4 Cryptography Encryption key Decryption key public information E CA M D C M’ KeKe M KdKd Forms of attack: ciphertext­only known­plaintext chosen­plaintext

Cryptographic Security Forms of Cryptosystems  Secret-key cryptography (a.k.a. symmetric cryptography)  – encryption & decryption use the same key  – key must be kept secret  – key distribution is very difficult  Public-key cryptography (a.k.a. asymmetric cryptography)  – encryption key different from decryption key  – cannot derive decryption key from encryption key

Cryptographic Security CS 5204 – Operating Systems6 Combining Public/Private Key Systems (1) (2) A B Public key encryption is more expensive than symmetric key encryption For efficiency, combine the two approaches (1)Use public key encryption for authentication; once authenticated, transfer a shared secret symmetric key (2) Use symmetric key for encrypting subsequent data transmissions

Cryptographic Security CS 5204 – Operating Systems7 Secure Communication - Public Key System M M ? Alice Bob Eve D bob (C) E bob (M) C E bob is the public key for Bob D bob is the private key for Bob

Cryptographic Security CS 5204 – Operating Systems8 Rivest­Shamir­Adelman (RSA) Method M M Alice Bob M e mod n C d mod n Encryption Key for BobDecryption Key for Bob C (e, n) (d, n)

Cryptographic Security CS 5204 – Operating Systems9 RSA Method 1. Choose two large (100 digit) prime numbers, p and q, and set n = p x q 2. Choose any large integer, d, so that: GCD( d, ((p­1)x(q­1)) = 1 3. Find e so that: e x d = 1 (modulo (p­1)x(q­1)) Example: 1. p = 5, q = 11 and n = 55. (p­1)x(q­1) = 4 x 10 = A valid d is 23 since GCD(40, 23) = 1 3. Then e = 7 since: 23 x 7 = 161 modulo 40 = 1

Cryptographic Security Encryption and Decryption using RSA method  Encryption - Alice does the following:- i) Obtains Bob’s public key (e, n). ii) Represents the plaintext message as a positive integer m. iii) Computes the ciphertext c = m^e mod n. iv) Sends the ciphertext c to Bob.  Decryption - Bob does the following:- i) Uses his private key (d, n) to compute m = c^d mod n. ii) Extracts the plaintext from the message representative m.

Cryptographic Security CS 5204 – Operating Systems11 (Large) Document Integrity File/ message hash process digest Digest properties: fixed-length, condensation of the source efficient to compute irreversible - computationally infeasible for the original source to be reconstructed from the digest unique - difficult to find two different sources that map to the same digest (collision resistance) Also know as: fingerprint Examples: MD5 (128 bits), SHA-1 (160 bits)

Cryptographic Security CS 5204 – Operating Systems12 (Large) Document Integrity  Note that small differences in the input result in very different digests

Cryptographic Security CS 5204 – Operating Systems13 Guaranteeing Integrity hash process file digest decrypt with sender’s public key file digital envelope digest compare

Cryptographic Security CS 5204 – Operating Systems14 Digital Signatures (Public Key) Requirements: cannot be forged and unique receiver: knows that a message came from the sender (authenticity) sender: cannot deny authorship( non-repudiation) message integrity sender & receiver: message contents preserved (integrity) (e.g., cannot cut­and­paste a signature into a message) Public Key System: sender, Alice: (E Alice : public, D Alice : private) receiver, Bob: (E Bob : public, D Bob : private) sender(Alice) ­­­­ C= E Bob (D Alice (M)) ­­­> receiver(Bob) receiver(Bob) ­­ M = E Alice (D Bob (C)) ­­­> M

Cryptographic Security Digital Signature using RSA Method Digital Signing Bob does the following:- i) Creates a message digest of the information to be sent. ii) Represents this digest as an integer m between 0 and n-1. iii) Uses her private key (d, n) to compute the signature s = m^d mod n. iv) Sends this signature s to Bob. Signature verification:- Alice does the following:- i) Uses Bob’s public key (e, n) to compute integer v = s^e mod n. ii) Extracts the message digest from this integer. iii) Independently computes the message digest of the information that has been signed. iv) If both message digests are identical, the signature is valid.

Cryptographic Security Secure Communication (Public Key) Handshaking B A E PKA (I A, I B ) E PKB, (I A, A) E PKB (I B ) IA, IB are “nonces” nonces can be included in each subsequent message PKB: public key of B; PKA: public key of A;