Cybersecurity: Aspects of Cryptography from a Classical and Quantum Perspective (An Ongoing Review) Joseph Spring University of Hertfordshire British Council.

Slides:



Advertisements
Similar presentations
Public Key Cryptosystem
Advertisements

Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
Course summary COS 433: Crptography -Spring 2010 Boaz Barak.
Information Security & Cryptographic Principles. Infosec and Cryptography Subjects / Topics : 1. Introduction to computer cryptography 1. Introduction.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Encryption Methods By: Michael A. Scott
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
COEN 351 E-Commerce Security Essentials of Cryptography.
Cryptography, Authentication and Digital Signatures
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Information Security CS 526
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
COEN 351 E-Commerce Security
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Key Management Network Systems Security Mort Anvari.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
INCS 741: Cryptography Overview and Basic Concepts.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Introduction to Information Security Introduction & Overview
Key management issues in PGP
Basics of Cryptography
Hash Functions Which of these problems is easier to solve:
Advanced Computer Networks
Quantum Cryptography Christian Schaffner ICT OPEN 2017
Computer Communication & Networks
Secure Sockets Layer (SSL)
Public Key Encryption Systems
Public Key Encryption and Digital Signatures
Information Security CS 526
Chapter 8 Network Security.
Basic Network Encryption
Cryptography.
IS3230 Access Security Unit 9 PKI and Encryption
Practical Aspects of Modern Cryptography
Quantum Key Distribution
Cryptography and Security Fall 2009 Steve Lai
Quantum Cryptography Alok.T.J EC 11.
Information Security CS 526
The Secure Sockets Layer (SSL) Protocol
Key Management Network Systems Security
Network Security - A Lecture 1 - NETW4006 NETW4006-Lecture01 1.
Lecture 10: Network Security.
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Public-Key, Digital Signatures, Management, Security
CSCE 715: Network Systems Security
Chapter 29 Cryptography and Network Security
Basic Network Encryption
Asymmetric Cryptographic Algorithms
Public Key Encryption Systems
Secure Diffie-Hellman Algorithm
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Cybersecurity: Aspects of Cryptography from a Classical and Quantum Perspective (An Ongoing Review) Joseph Spring University of Hertfordshire British Council India Tour January 2017 – Pune and Chennai

Cyber Security

Cyber security “the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide” M. Gasser, 1988, Building a secure computer system, van Nostrand Reinhold. Information security – “the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information”

Cyber security Following the statements above we note the following concepts: Authentication Establishing for example that I am who I say that I am and that I am entitled to gain access to some entity such as my computer Confidentiality Any data sent between two parties is not seen by unauthorised observers Integrity Establishing that the message sent is the same as the message received Non repudiation Ensuring that the sender of some information cannot deny that they sent the information Accessibility If I am entitled for example to use a service then I want to be able to do so Anonymity In for example voting schemes where one might also like confidentiality A long standing tool in maintaining a degree of control and defence of information systems is cryptography

Threat Models

Standard Threat Model Encrypt Decrypt Plaintext Ciphertext Ciphertext Alice Bob K1 Eve K2 Trusted Key Source

Classical Cipher Schemes

Classical Cryptography Symmetric Systems K1 = K2 Vernam (One Time Pad), Data Encryption Standard, Blowfish, Twofish, Serpent … Rijndael, Advanced Encryption Standard Asymmetric Systems K2 = (K1)-1 Based on what are perceived to be hard problems Integer Factorisation Problem (IFP) and the Discrete Logarithm Problem (DLP, ECDLP) RSA for the IFP Diffie – Hellman (DLP based Key Agreement Protocol) El Gamal (Number Fields, Algebraic Number Fields, Points on an Elliptic Curve)

Quantum cryptography

Cryptography Quantum Information Theory Postulates 1 Postulate 2 cbits - binary bits 0 or 1 Qubits - vectors in a 2 dimensional vector space, a Hilbert Space Postulate 2 Analogues of processing information using classical AND, OR, NAND, NOR logic gates Not all reversible Operators/Gates: Hadamard, Pauli Operators, CNOT, swap, phase gate, …. Unitary operators, all are reversible Postulate 3 After processing information in a quantum setting we measure using Hermitian operators which give us real/classical values Postulate 4 Using tensor products to represent multiple qubits similar to how we use bytes to represent bits

Resources Key Quantum Resources include Entanglement Teleportation 4 Bell entangled states Generated by two qubits, a Hadamard and a CNOT gate Teleportation Involves an unknown state that we wish to send (Teleport) to a particular receiver CNOT, Hadamard, measurement and being able to communicate classically with a receiver Both concepts have been experimentally verified Both concepts are being used in the construction of quantum networks Entanglement, Entanglement swapping and Teleportation

Quantum Cryptography Key Agreement Protocols The Diffie Hellman Key Agreement Protocol is a classical based protocol Uses a multiplicative cyclic group, a primitive and the DLP to agree a symmetric key, the same key for sender and receiver BB84, B92 and E91 are quantum based key agreement protocols They employ: No cloning Theorem (Quantum Property) Information gain implies disturbance (Quantum Property) Information Reconciliation (Classical Technique) Privacy amplification (Classical Technique)

Shors Algorithm In the mid 1990’s Peter Shor published a paper in which he established that given a quantum computer of sufficient processing power his algorithm would break any scheme based on either the IFP or the DLP It broke the following algorithms in a very efficient manner Diffie Hellman RSA El Gamal – all three forms And led to the problem of what to replace these algorithms with. These were/are very efficient in comparison to current alternatives.

Post Quantum Cryptography The PQC cryptographers and designers have been looking at Hash Based Cryptography Code Based Cryptography Lattice Based Cryptography Multivariate Quadratic Equation Based Cryptography Symmetric Key Based Cryptography

Cyber Related Issues

Cyber Related Issues We are now in an age in which: Quantum information Quantum technology are going to increasingly pervade our everyday experience Likewise: Cybersecurity, cyberwarfare and cybercrime Pervasive computing, Distributed systems The cloud Internet of things

Thank You