 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.

Slides:



Advertisements
Similar presentations
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Advertisements

CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
NSRC Workshop Some fundamental security concerns... Confidentiality - could someone else read my data? Integrity - has my data been changed? Authentication.

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Authentication. Terminology  Authentication التثبت من الهوية  Access Control (authorization) التحكم في الوصول  Note the difference between the two.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Chapter 4  Hash Functions 1 Overview  Cryptographic hash functions are functions that: o Map an arbitrary-length (but finite) input to a fixed-size output.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Apr 4, 2003Mårten Trolin1 Previous lecture TLS details –Phases Handshake Securing messages –What the messages contain –Authentication.
Introduction to Cryptography
1 Message Authentication and Hash Functions Authentication Requirements Authentication Functions Message Authentication Codes Hash Functions Security of.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Security systems need to be able to distinguish the “white hats” from the “black hats”. This all begins with identity. What are some common identifiers.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Hash Functions A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value h = H(M) Principal object is.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
Dan Johnson. What is a hashing function? Fingerprint for a given piece of data Typically generated by a mathematical algorithm Produces a fixed length.
CIS 450 – Network Security Chapter 8 – Password Security.
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
David Evans CS150: Computer Science University of Virginia Computer Science Class 31: Cookie Monsters and Semi-Secure.
Lecture 19 Page 1 CS 111 Online Authentication for Operating Systems What is authentication? How does the problem apply to operating systems? Techniques.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Password authentication Basic idea –User has a secret password –System checks password to authenticate user Issues –How is password stored? –How does system.
6fb52297e004844aa81be d50cc3545bc Hashing!. Hashing  Group Activity 1:  Take the message you were given, and create your own version of hashing.  You.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
Authentication Chapter 2. Learning Objectives Create strong passwords and store them securely Understand the Kerberos authentication process Understand.
Lecture 2: Introduction to Cryptography
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Modern Cryptography.
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Authentication What you know? What you have? What you are?
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
MD5 & Hash Encryption By Alex Buzak. Overview Purpose of MD5 and Hash Encryptions Examples MD5 Algorithm Explanation of Possible Security Risks Practical.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
CSCE 201 Identification and Authentication Fall 2015.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Chapter Six: Authentication 2013 Term 2 Access Control Two parts to access control Authentication: Are you who you say you are?  Determine whether access.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Dr. Nermin Hamza.  Attacks:  Traffic Analysis : traffic analysis occurs when an eavesdroppers observes message traffic on network. Not understand the.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Outline The basic authentication problem
Cryptographic Hash Function
Chapter 5: The Art of Ensuring Integrity
Web Systems Development (CSC-215)
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Exercise: Hashing, Password security, And File Integrity
COEN 351 Authentication.
Presentation transcript:

 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity of a message  What is received is the same as what was sent  Also useful in providing authentication  Can verify a message without knowledge of the original message Cryptographic Hashing2

3

 Based on cryptographic methods  Takes an arbitrary-size input  Called the message  Returns a fixed-size output  Called the message digest or hash value  Change to the data will change the hash value  Accidental or intentional Cryptographic Hashing4

5

1. Easy to compute the hash of a message  Not necessarily quick 2. Infeasible to generate a message that has given a hash 3. Infeasible to modify a message without changing the hash 4. Infeasible to find two different messages with the same hash  Meaningful message even more difficult Cryptographic Hashing6

 Message Digest Algorithm  MD4  MD5  Secure Hash Algorithm  SHA-1  SHA-256  SHA-512  RACE Integrity Primitives Evaluation Message Digest (RIPEMD)  RIPEMD-160 Cryptographic Hashing7

 Hashing can be used for password checking 1. User creates an account or changes password  Server hashes the password and stores the hash 2. User attempts to log on to the system  User enters username/password  Password is hashed and sent to server 3. Hash is compared to the stored hash  Reasonable assurance the correct password was used if hashes match  Server does not need to store user passwords “in the clear”  Hash can be used to verify password  Can’t reverse hashes to discover passwords Cryptographic Hashing8

9 Start Take User Password Convert Password to MD5 Hash Database

Cryptographic Hashing10Cryptographic Hashing Start Take User Password Convert Password to MD5 Hash Compare MD5 with the stored MD5 Create User Session

Cryptographic Hashing11

 Given a small pool of possible inputs, it is easy to find the original message  Try every possible input and compare to the hash value  Solution: employ a salt  Random sequence of bits concatenated with the hash function input (message)  Attacker must try every combination of message+salt against the hash  Sufficiently large salt make this infeasible  Salt must be known by both parties  Verifying a message hash without the salt will (most likely) fail Cryptographic Hashing12

 Number of passwords of length n is k n  k = # of possible characters used in the password  Lowercase only = 26 n  Lowercase and uppercase = 52 n  Lowercase, uppercase, and digits = 62 n  n is the more important factor  Adding a salt to a password effectively increases n Cryptographic Hashing13

 Password guessing  Most people don’t choose creative passwords  Relatively small pool of likely passwords  Dictionary attacks  Try every password in a list  Brute force  Try every password of length 1, then 2, then 3, …  What if hashing is used?  Easily guessed passwords still vulnerable  “Stronger” passwords harder to guess  Rainbow tables  Pre-compiled list of passwords and their hash values  Can be searched quickly  Employing a salt makes rainbow tables ineffective Cryptographic Hashing14

 Authenticate using more than one means  Something you know  Login/Password  Something you have  Smart card (with PKI certificates)  One-time password token  Something you are  Biometrics  Fingerprints  Retinal scans  Hand geometry  Facial recognition  Etc. Cryptographic Hashing15

 The Advanced Encryption Standard (AES) is a symmetric key algorithm.  Numerous variants and key lengths.  Used to encrypt Top Secret information  Basis for many modern VPNs  AES utilizes a large hexadecimal key, which is hard to remember  We can combine hashing of a password with AES to allow us to use easy to remember pass phrases. Digital Cryptography16