Applied Cryptography Main goal

Slides:



Advertisements
Similar presentations
Feb 12, 2002Mårten Trolin1 Applied Cryptography Main goal –Give some practical experience on cryptographic technics used today. –Show how to use existing.
Advertisements

1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
Apr 30, 2002Mårten Trolin1 Previous lecture – passwords Passwords for authentication –Storing hashed passwords –Use of salt Passwords for key generation.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Csci5233 Computer Security & Integrity 1 Cryptography: Basics (2)
May 21, 2002Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Computer Science Lecture 22, page 1 Security in Distributed Systems Introduction Cryptography Authentication Key exchange Readings: Tannenbaum, chapter.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Feb 11, 2003Mårten Trolin1 Applied Cryptography Main goal –Give some practical experience on cryptographic technics used today. –Show how to use existing.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
1 Security and Cryptography: basic aspects Ortal Arazi College of Engineering Dept. of Electrical & Computer Engineering The University of Tennessee.
1 Introduction The State of the Art in Electronic Payment Systems, IEEE Computer, September 1997.
1 Network Security Basics. 2 Network Security Foundations: r what is security? r cryptography r authentication r message integrity r key distribution.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Network Security Lecture 18 Presented by: Dr. Munam Ali Shah.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
1 Hello World and Welcome to The simple crypt Key=23 {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Applied Cryptography Spring Lecture times Thursdays14:30-16:00room lectures The lectures at the following dates will be rescheduled (dates/times.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Network Security  introduction  cryptography  authentication  key exchange  required reading: text section 7.1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CS201 Tech-Talk Two: Cryptography Michael Hsu CSULA.
Network security Cryptographic Principles
Applied Cryptography Spring 2017.
Web Applications Security Cryptography 1
Crypto in information security
Previous lecture – smart-cards
Cryptography Why Cryptography Symmetric Encryption
Public-Key Cryptography RSA Rivest-Shamir-Adelmann Public-Key System
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Public Key Encryption and Digital Signatures
Security.
Cryptography and Security Technologies
Taehyung Kim HPC Lab. POSTECH
Introduction to security goals and usage of cryptographic algorithms
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
Network Security Basics
Security in Network Communications
Security.
Cryptography: Basics (2)
The Secure Sockets Layer (SSL) Protocol
DISSERTATION ON CRYPTOGRAPHY.
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
Cryptology Design Fundamentals
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Fluency with Information Technology Lawrence Snyder
Security in Distributed Systems
Presentation transcript:

Applied Cryptography Main goal Give some practical experience on cryptographic technics used today. Show how to use existing cryptographic software. Examination: Practical assignments and written exam Homepage containg latest course information: http://www.nada.kth.se/~marten/AC/2003 Check course program (from homepage) for detailed information Homepage mirror at http://students.mii.lu.lv/user/AC/2003/ Feb 11, 2003 Mårten Trolin

Requirements Attend lectures (if you want to) Collect at least 30 points Two practical assignments give up to 20 points each Written exam gives up to 20 points. Feb 11, 2003 Mårten Trolin

Outline of course program N.B. Course program is subject to change. Check the home page for the latest information Lectures 1-5: Basic cryptographic functions and principles Lectures 6-8: Smartcards in financial transactions Lectures 9-11: SSL and PGP Lectures 12: Passwords Exam on April 29th. Feb 11, 2003 Mårten Trolin

Why cryptography Reason for using cryptography Protect from eaves-dropping (confidentiality) Ensure data is not modified (integrity) Certify identity of sender (authenticity) Requirements (application dependent) Simple key management Low hardware requirements (smart card applications, mobile phones) Cost of bandwidth Feb 11, 2003 Mårten Trolin

Simple example – substitution cipher The key is a permutation of the letters of the alphabet, i.e. a bijection Encryption is performed by substituting each letter for its corresponding letter Decryption is the same as encryption with the difference that the inverse is used Feb 11, 2003 Mårten Trolin

Substitution cipher – example Example: Encrypt MY DOG ATE YOUR CAT using the key ABCDEFGHIJKLMNOPQRSTUVWXYZ UWGRPNQSBJXMECAIZOYTDFHKLV Feb 11, 2003 Mårten Trolin U

Breaking the substitution cipher Substitution ciphers are easily broken using frequency analysis We use the fact that different letters (or combination of letters) occur with different probability Example – break TK IL KQ JKT TK IL TBST CR TBL OULRTCKJ Frequency of letters in English: ETAOINSHRDLU Most common two letter words: OF TO IN IS IT BE BY HE AS ON AT OR AN SO IF NO Feb 11, 2003 Mårten Trolin

Symmetric vs. asymmetric cryptography Symmetric ciphers – sender and recipient use the same key Dkey(Ekey(m)) = m Substitution cipher is an example of a symmetric cipher Impractical for big systems – number of keys is quadratic in the number of users The solution – asymmtric algorithms. Think of a locked mailbox! Different keys for encryption and decryption Dprivate key(Epublic key(m)) = m Feb 11, 2003 Mårten Trolin

Asymmetric cryptography Each user has a public and a private key The public key is published in a “phone book” The private key is kept secret Messages encrypted with the public key can be decrypted with the private key To send a message to Mårten, look up Mårten’s public key in the “phone book”. Mårten can then decrypt the message with his private key Number of keys is linear in the number of users Feb 11, 2003 Mårten Trolin

RSA Asymmetric cryptographic algorithm published in 1978 The most popular asymmetric algorithm used today Now free to use – patent expired in 2000 Relies on the hardness of factoring a number consisting of two primes Feb 11, 2003 Mårten Trolin

The RSA algorithm – key generation Generate two primes p, q and set n = pq Choose e such that gcd(e, (p – 1)(q – 1)) = 1 Compute d such that ed = 1 mod ((p – 1)(q – 1)) The public key is the pair (e, n) The private key is the pair (d, n) Feb 11, 2003 Mårten Trolin

RSA – encryption and decryption Message m – number 0 < m < n Encryption E(m) = me mod n Decryption D(m) = md mod n Number theoretical exercise – check that D(E(m)) = m. Feb 11, 2003 Mårten Trolin

Breaking RSA If we can factor n we can break RSA Suppose we know p, q such that pq = n We can compute (p – 1)(q – 1) It is now trivial to compute d = e-1 mod ((p – 1)(q – 1)) The largest number that is (publicly) known to have been factored today is 512 bits Other attacks exist for certain uses of RSA Feb 11, 2003 Mårten Trolin