CS/ECE 578 Cyber-Security Dr. Attila Altay Yavuz

Slides:



Advertisements
Similar presentations
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Advertisements

CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
CS1001 Lecture 24. Overview Encryption Encryption Artificial Intelligence Artificial Intelligence Homework 4 Homework 4.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Introduction to Cryptography
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Basics Credit: Prof. Dr. Peng Ning Network.
Cryptography, Authentication and Digital Signatures
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
EE515/IS523 Think Like an Adversary Lecture 4 Crypto in a Nutshell Yongdae Kim.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Lecture 2: Introduction to Cryptography
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Lecture 23 Symmetric Encryption
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Intro to Cryptography Lesson Introduction
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Web Applications Security Cryptography 1
Overview of Cryptography
CS/ECE Network Security Dr. Attila Altay Yavuz
ISA 400 Management of Information Security
Symmetric Cryptography
IT443 – Network Security Administration Instructor: Bo Sheng
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Cryptography Much of computer security is about keeping secrets
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
ISA 330 Introduction to Proactive System Security
Cryptographic Hash Function
Public Key Encryption and Digital Signatures
Security.
Outline Desirable characteristics of ciphers Uses of cryptography
Public-key Cryptography
Cryptography.
Encryption
Basic Network Encryption
Introduction to security goals and usage of cryptographic algorithms
Cryptography.
Outline Desirable characteristics of ciphers Uses of cryptography
Presented by: Dr. Munam Ali Shah
Cryptography Basics and Symmetric Cryptography
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Security through Encryption
PART VII Security.
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
Security.
Network Security - A Lecture 1 - NETW4006 NETW4006-Lecture01 1.
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
DISSERTATION ON CRYPTOGRAPHY.
Introduction to Cryptography (1)
Chapter 29 Cryptography and Network Security
Basic Network Encryption
Unit 2: Cryptography & Cryptographic Algorithm
Introduction to Cryptography
Fluency with Information Technology Lawrence Snyder
Cryptanalysis Network Security.
CRYPTOGRAPHY & NETWORK SECURITY
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

CS/ECE 578 Cyber-Security Dr. Attila Altay Yavuz Basics Credit: Prof. Dr. Peng Ning Dr. Attila Altay Yavuz

Crypto Cryptography: the art of secret writing Converts data into unintelligible (random-looking) form Sometimes must be reversible (can recover original data without loss or modification) Enable verifiable properties on data Authentication, integrity Recent: Try to preserve functionality while doing these… Not the same as compression n bits in, n bits out Can be combined with compression What’s the right order? (interview question)

Encryption/Decryption plaintext ciphertext plaintext encryption decryption key key Plaintext: a message in its original form Ciphertext: a message in the transformed, unrecognized form Encryption: the process that transforms a plaintext into a ciphertext Decryption: the process that transforms a ciphertext to the corresponding plaintext Key: the value used to control encryption/decryption.

Ciphertext Only Attacks Ex.: attacker can intercept encrypted communications, nothing else when is this realistic? Breaking the cipher: analyze patterns in the ciphertext provides clues about the encryption method/key Sniffer on WiFi network Modern ciphers are secure againt this, but: The incorrect use of cipher can be weakness

Known Plaintext Attacks Ex.: attacker intercepts encrypted text, but also has access to some of the corresponding plaintext (definite advantage) When is this realistic? Makes some codes (e.g., mono-alphabetic ciphers) very easy to break Not very rare that abandoned PCs are compromised by attacker Old plaintext  new ones

Chosen Plaintext Attacks Ex.: attacker can choose any plaintext desired, and intercept the corresponding ciphertext Allows targeted code breaking (choose exactly the messages that will reveal the most about the cipher Very realistic attack, past and today: Gardening by British forces to Enigma Public key crypto, send message to a server, will return you the corresponding ciphertext! Trusted Platform Module (TPM)

Chosen Ciphertext Attacks Ex.: attacker can present any ciphertext desired to the cipher, and get the corresponding plaintext When is this realistic? Isn’t this the goal of cryptanalysis??? A very strong notion of security, IND-CCA experiment

Perfectly Secure Ciphers Ciphertext does not reveal any information about which plaintexts are more likely to have produced it i.e., the cipher is robust against chosen ciphertext attacks and Plaintext does not reveal any information about which ciphertexts are more likely to be produced i.e, the cipher is robust against chosen plaintext attacks

Computationally Secure Ciphers The cost of breaking the cipher quickly exceeds the value of the encrypted information and/or The time required to break the cipher exceeds the useful lifetime of the information Under the assumption there is not a faster / cheaper way to break the cipher, waiting to be discovered

Secret Keys v.s. Secret Algorithms Security by obscurity We can achieve better security if we keep the algorithms secret Hard to keep secret if used widely Reverse engineering, social engineering Publish the algorithms Security of the algorithms depends on the secrecy of the keys Less unknown vulnerability if all the smart (good) people in the world are examine the algorithms

Secret Keys v.s. Secret Algorithms (Cont’d) Kerckhoffs's principle Commercial world Published Wide review, trust Military Keep algorithms secret Avoid giving enemy good ideas Military has access to the public domain knowledge anyway. BUT?

A Perfectly Secure Cipher: One-Time Pads According to a theorem by Shannon, a perfectly secure cipher requires: a key length at least as long as the message to be encrypted the key can only be used once (i.e., for each message we need a new key) Very limited use due to need to negotiate and distribute long, random keys for every message

OTP… (Cont’d) Idea generate a random bit string (the key) as long as the plaintext, and share with the other communicating party encryption: XOR this key with plaintext to get ciphertext decrypt: XOR same key with ciphertext to get plaintext plaintext  ciphertext Key

 = =  OTP… (Cont’d) Why can’t the key be reused? plaintext 01011001 01000101 01010011  = =  key (pad) 00010111 00001010 01110011 ciphertext 01001110 01001111 00100000 if C = P  K, then K = C  P Why can’t the key be reused?

System, Threat and Security Models Threat model and attack model need to be clarified before any security mechanism is developed System Model Entities, organization, capabilities Threat model Assumptions about potential attackers Describes the attacker’s capabilities Security model Assumptions about the attacks Describe how attacks are launched

Types of Cryptography Number/type of keys Hash functions: no key (sometimes) Secret key cryptography: one key Public key cryptography: two keys - public, private The way in which the plaintext is processed Stream cipher: encrypt input message one symbol at a time Block cipher: divide input message into blocks of symbols, and processes the blocks in sequence May require padding

Hash Algorithms Also known as Message of arbitrary length A fixed-length short message Hash H Also known as Message digests One-way transformations One-way functions Hash functions Length of H(m) much shorter then length of m Usually fixed lengths: 160 or 256 bits

Secret Key Cryptography plaintext ciphertext plaintext encryption decryption key Same key key Same key is used for encryption and decryption Also known as Symmetric cryptography Conventional cryptography

Secret Key Cryptography (Cont’d) Basic technique Product cipher: Multiple applications of interleaved substitutions and permutations plaintext S P S P … S ciphertext break key

Secret Key Cryptography (Cont’d) Ciphertext approximately the same length as plaintext Examples Stream Cipher: RC6 Block Cipher: DES, IDEA, AES

Applications of Secret Key Cryptography Secure Storage on insecure media Authentication Challenge-response To prove the other party knows the secret key Must be secure against chosen plaintext attack Integrity check Message Integrity Code (MIC) a.k.a. Message Authentication Code (MAC) Highly fast and secure Transmitting over an insecure channel Challenge: How to share the key?

Public Key Cryptography (PKC) plaintext ciphertext plaintext encryption decryption Public key Private key A public/private key pair is used Public key can be publicly known Private key is kept secret by the owner of the key Much slower than secret key cryptography Also known as Asymmetric cryptography

Applications of PKC-Hash Primary application Generate/verify digital signatures H(m) Message m Signature Sig(H(m)) H Sign Private key Message m H(m) H Verify Yes/No Signature Sig(H(m)) Public key

Applications of Public Key Cryptography Digital signatures Sign hash H(m) with the private key Authorship, Integrity Non-repudiation: can’t do with secret key cryptography Key exchange and Distribution Establish a common session key between two parties. Particularly for encrypting long messages Pervasively distribute many keys One to many message encryption