Uses Uses of cryptography Lab today on RSA

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure and Applications
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Data Security 101 Part 1: PKI and SSL. Reading First, read the VeriSign case, –page Second, read section 5.3 –pages Finally, briefly skim.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
David Evans CS200: Computer Science University of Virginia Computer Science Class 36: Public-Key Cryptography If you want.
Types of Electronic Infection
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Secure HTTP (HTTPS) Pat Morin COMP 2405.
Unit 3 Section 6.4: Internet Security
Key management issues in PGP
Digital Signatures.
Basics of Cryptography
Security Outline Encryption Algorithms Authentication Protocols
Unit 3 Section 6.4: Internet Security
Symmetric and Asymmetric Encryption
Public-Key Cryptography and Message Authentication
Tutorial on Creating Certificates SSH Kerberos
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Security Design.
Network Security.
Information Security message M one-way hash fingerprint f = H(M)
Cryptographic Hash Function
Chapter 5 Electronic Commerce | Security
Public-key Cryptography
Chapter 9 Security 9.1 The security environment
Cryptography and Security Technologies
BY GAWARE S.R. DEPT.OF COMP.SCI
Basic Network Encryption
E-Commerce Security.
IS3230 Access Security Unit 9 PKI and Encryption
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Using SSL – Secure Socket Layer
2. Authentication & Message Authentication
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
Digital Signatures and Forms
Network Security Basics
Chapter 5 Electronic Commerce | Security
Secure Electronic Transaction (SET) University of Windsor
Information Security message M one-way hash fingerprint f = H(M)
Recap unit 2 Review cipher systems, RSA Digital signatures
Lecture 4 - Cryptography
Chapter 4 Cryptography / Encryption
Digital Signatures…!.
Lecture 10: Network Security.
Chapter 3 - Public-Key Cryptography & Authentication
Basic Network Encryption
Advanced Computer Networks
Electronic Payment Security Technologies
Module 4 System and Application Security
Instructor Materials Chapter 5: Ensuring Integrity
Fluency with Information Technology Lawrence Snyder
Presentation transcript:

Uses Uses of cryptography Lab today on RSA It’s not just to thwart eavesdroppers Data Integrity Authenticating people or data Non-repudiation Examples in chapter 9 Lab today on RSA

Hash functions Many applications in CS An efficient way to store lots of data, for easy retrieval later Quickly determine whether data has become corrupted Provide password security It’s a 1-way function: used to encrypt passwords When you enter your password, p, the system computes value of e(p) Your correct password, c, is already stored in encrypted form e(c) If e(p) == e(c), then you are “authenticated”

Hash functions (2) Why do it this way? One way to do it: If password file is compromised, thief really has no information If you lose your password, no one can retrieve it  very secure. In this case, a new password is generated One way to do it: Multiply first letter value by 3 Add 2nd letter value. Multiply answer by 3. Add 3rd letter value. Multiply answer by 3. Continue… At each point, take mod by a large prime ~ 1 billion

Hash functions (3) Another purpose: provide digital fingerprint to a file Associate with each file a single numerical value, like a serial number For example, the file size There is a slim chance that 2 files will map to the same number. Quick way to determine if your files have been altered or damaged. Saves space.

Breakability Cryptanalysis often relies on “exhaustive key search.” What does this mean? How does Moore’s Law relate? What can an attacker do to speed up a search? RSA & Diffie-Hellman rely on unsolvability of certain number theory problems (we have faith in them) But will someone discover short cuts? We should be seeking out better 1-way functions just in case! Learn from history.

Data integrity A hacker might not care what your message says Wants to modify / corrupt it Just encrypting your data won’t help Need to Recognize genuine data, unchanged from the source Detect unauthorized access or change (security) Preventing the attack might not be necessary We have backups of the data

Digital signature Proof of origin Sender can’t later deny sending message! In ordinary authentication, an imposter could have used Diffie-Hellman to pretend being A. DS relies on sender’s public and private keys The two keys are mathematically related Sender must use private key to compute the message’s digital signature (analogous to authentication value) Receiver uses sender’s public key to verify origin

Digital signature Similar to RSA Purpose: verify sender & integrity of message Useful when resolving disputes: non-repudiation When A sends message to B Message  private key  D.S. Append D.S. to the message B receives message (with D.S.) from A Separate the D.S. from body of the message. D.S.  public key  output Verify that the output matches the message. (To save time, the message is usually “hashed”)

E-commerce What are the relationships among: Other things to consider: Client (i.e. you) Server Bank Certification authority Other things to consider: How to set up your own online business The steps of a secure session Authentication Digital signature

Setting it up You have products to sell Create a Web site Subscribe for Web hosting, acquire HW/SW as needed Need accounts with a bank, and individual credit card merchant accounts, PayPal, etc. Subscribe to SSL service E.g. Verisign is now owned by Symantec Maintain database of transactions E.g. individual purchases

Secure Web session Here’s one way to do it. Client wants to buy goods on server’s secure site. Server sends its public key & authentication certificate to client. Client’s Web browser verifies certificate with CA Client uses RSA with server’s public key to encrypt DES key. Send to server. Server uses own RSA-private key to decrypt DES key. Now, both parties can communicate with DES.

Notes Why not just use RSA for everything? DES is much faster. We just use RSA to communicate the DES key. Client & server have “agreed” on a key, but we did not use Diffie-Hellman. DES key was chosen by the client, sent to server securely. Diffie-Hellman by itself can’t authenticate. Authentication goes both ways CA verifies server identity to client (you). Bank verifies client (you) to the server.