Cryptography Basics and Symmetric Cryptography

Slides:



Advertisements
Similar presentations
Symmetric Message Authentication Codes Prof. Ravi Sandhu.
Advertisements

Symmetric Encryption Prof. Ravi Sandhu.
Asymmetric Encryption Prof. Ravi Sandhu. 2 © Ravi Sandhu PUBLIC KEY ENCRYPTION Encryption Algorithm E Decryption Algorithm D Plain- text Plain- text Ciphertext.
PKI Introduction Ravi Sandhu 2 © Ravi Sandhu 2002 CRYPTOGRAPHIC TECHNOLOGY PROS AND CONS SECRET KEY SYMMETRIC KEY Faster Not scalable No digital signatures.
MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Lecture 2: Introduction to Cryptography
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CS/ECE 578 Cyber-Security Dr. Attila Altay Yavuz
Reviews Rocky K. C. Chang 20 April 2007.
ISA 400 Management of Information Security
Symmetric Cryptography
IT443 – Network Security Administration Instructor: Bo Sheng
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
ISA 330 Introduction to Proactive System Security
Asymmetric Cryptography
CSCE 715: Network Systems Security
Public Key Encryption and Digital Signatures
Security.
Chapter 8 Network Security.
Cryptography.
Cryptography.
Presented by: Dr. Munam Ali Shah
Lecture 3: Symmetric Key Encryption
Cryptography Lecture 12.
Authentication by Passwords
Cryptography and Security Fall 2009 Steve Lai
Challenge-Response Authentication
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Asymmetric Cryptography
Security through Encryption
PART VII Security.
Security in Network Communications
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
Introduction to Symmetric-key and Public-key Cryptography
Security.
CSE 484 Midterm Review “1st half of the quarter in 5 slides”
csci5233 computer security & integrity (Chap. 4)
Security Of Wireless Sensor Networks
Tutorial on Network Security: Sep 2003
The Secure Sockets Layer (SSL) Protocol
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Security of Wireless Sensor Networks
DISSERTATION ON CRYPTOGRAPHY.
Cryptography Lecture 12.
Introduction to Cryptography (1)
Challenge-Response Authentication
Chapter 29 Cryptography and Network Security
Basic Network Encryption
Unit 2: Cryptography & Cryptographic Algorithm
Cryptography Lecture 11.
Symmetric Encryption or conventional / private-key / single-key
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Cryptography Basics and Symmetric Cryptography Prof. Ravi Sandhu Executive Director and Endowed Chair Lecture 2 ravi.utsa@gmail.com www.profsandhu.com © Ravi Sandhu World-Leading Research with Real-World Impact!

Basic Concepts World-Leading Research with Real-World Impact! © Ravi Sandhu World-Leading Research with Real-World Impact!

Cryptographic Technology SYMMETRIC KEY Secret Key Single Key Conventional ASYMMETRIC KEY Public Key Public-Private Key © Ravi Sandhu World-Leading Research with Real-World Impact! 3

Cryptographic Technology Symmetric-key encryption Symmetric-key message authentication codes (MACs) Public-key encryption Public-key digital signatures Public-key key agreement Message digests (hash functions) Public-key certificates Challenge-response authentication © Ravi Sandhu World-Leading Research with Real-World Impact! 4

ATMs run on symmetric-key technology Cryptographic Technology Symmetric-key encryption Symmetric-key message authentication codes (MAC) Public-key encryption Public-key digital signatures Public-key key agreement Message digests (hash functions) Public-key certificates Challenge-response authentication SSL uses all of these ATMs run on symmetric-key technology © Ravi Sandhu World-Leading Research with Real-World Impact! 5

Traditional formulation Cryptographic Services confidentiality traffic flow confidentiality integrity authentication non-repudiation Traditional formulation © Ravi Sandhu World-Leading Research with Real-World Impact! 6

Cryptographic Services confidentiality crypto keys leak profusely via side channels integrity + authentication no point having one without the other non-repudiation requires asymmetric cryptography stronger form of integrity + authentication replay protection beyond integrity? Important insights © Ravi Sandhu World-Leading Research with Real-World Impact! 7

Safe Cryptography Symmetric-key cryptography Public-key cryptography 128 bit or higher Public-key cryptography 2048 bit or higher Message digests 256 bit or higher These numbers keep increasing https://www.keylength.com/ © Ravi Sandhu World-Leading Research with Real-World Impact! 8

Symmetric Encryption World-Leading Research with Real-World Impact! © Ravi Sandhu World-Leading Research with Real-World Impact!

Symmetric-Key Encryption INSECURE CHANNEL Plain- text Plain- text Ciphertext Encryption Algorithm E Decryption Algorithm D A B Symmetric Key shared by A and B K K SECURE CHANNEL Confidentiality Integrity © Ravi Sandhu World-Leading Research with Real-World Impact! 10

Symmetric-Key Encryption confidentiality depends only on secrecy of the key size of key is critical Symmetric key systems do not scale well with N parties we need to generate and distribute N*(N-1)/2 keys A and B can be people or computers © Ravi Sandhu World-Leading Research with Real-World Impact! 11

Master Keys and Session Keys master keys, long lifetime prolonged use increases exposure session keys short-term keys communicated by means of master symmetric keys public key technology © Ravi Sandhu World-Leading Research with Real-World Impact! 12

Cryptanalysis ciphertext only known plaintext chosen plaintext cryptanalyst only knows ciphertext known plaintext cryptanalyst knows some plaintext-ciphertext pairs chosen plaintext chosen ciphertext © Ravi Sandhu World-Leading Research with Real-World Impact! 13

Known-Plaintext Attack 40 bit key requires 239  5 * 1011 trials on average (exportable from USA, early 1990’s) trials/second time required 1 20,000 years 103 20 years 106 6 days 109 9 minutes 1012 0.5 seconds © Ravi Sandhu World-Leading Research with Real-World Impact! 14

Known-Plaintext Attack 56 bit key requires 255  3.6 * 10^16 trials on average (DES, 1977) trials/second time required 1 109 years 103 106 years 106 103 years 109 1 year 1012 10 hours © Ravi Sandhu World-Leading Research with Real-World Impact! 15

Known-Plaintext Attack 80 bit key requires 279  6 * 1023 trials on average (SKIPJACK, mid-1990s) trials/second time required 1 1016 years 103 1013 years 106 1010 years 109 107 years 1012 104 years © Ravi Sandhu World-Leading Research with Real-World Impact! 16

Known-Plaintext Attack 128 bit key requires 2127  2 * 1038 trials on average (AES-128, 2001) trials/second time required 1 1030 years 103 1027 years 106 1024 years 109 1021 years 1012 1018 years © Ravi Sandhu World-Leading Research with Real-World Impact! 17

AES Advanced encryption standard, 2001 3 key sizes: 128, 192, 256 DES, 1977: designed by IBM. Blessed by NSA. SKIPJACK, early 1990s: designed by NSA, declassified 1998 AES, 2001: designed by open international competition, winner was a European team 3 key sizes: 128, 192, 256 Block size: 128 Previously most (e.g. DES) used 64 bit block size 128 bit block size is safer due to birthday attack © Ravi Sandhu World-Leading Research with Real-World Impact! 18

Symmetric-Key Encryption INSECURE CHANNEL Plain- text Plain- text Ciphertext Encryption Algorithm E Decryption Algorithm D A B Symmetric Key shared by A and B K K SECURE CHANNEL Confidentiality Integrity © Ravi Sandhu World-Leading Research with Real-World Impact! 19

A B Password Derived Keys INSECURE CHANNEL Plain- text Plain- text Ciphertext Encryption Algorithm E Decryption Algorithm D A B K K Symmetric Key shared by A and B Key Derivation Function Key Derivation Function Password (salted) Password (salted) © Ravi Sandhu World-Leading Research with Real-World Impact! 20

A B Password Derived Keys Dictionary attack INSECURE CHANNEL Plain- text Plain- text Ciphertext Encryption Algorithm E Decryption Algorithm D A B K K Symmetric Key shared by A and B Key Derivation Function Key Derivation Function Dictionary attack Password (salted) Password (salted) © Ravi Sandhu World-Leading Research with Real-World Impact! 21

Perfect Secrecy Vernam one-time pad Plain- text Ciphertext Plain- text + + Mi Mi A B AB 0 0 0 0 1 1 1 0 1 1 1 0 Symmetric Key Ki Ki Vernam one-time pad SECURE CHANNEL © Ravi Sandhu World-Leading Research with Real-World Impact! 22

Double DES Intermediate Ciphertext Plain- text Cipher- text E E X Not covered in lecture K1 K2 effective key size is only 57 bits due to meet-in-the-middle attack © Ravi Sandhu World-Leading Research with Real-World Impact! 23

Triple DES Cipher- text Plain- text E D E X Not covered in lecture K1 K2 K1 effective key size is 112 bits due to meet-in-the-middle attack © Ravi Sandhu World-Leading Research with Real-World Impact! 24

Electronic Code Book (ECB) Mode 128 bit Data block 128 bit key 128 bit key D E 128 bit encrypted Data block 128 bit Data block OK for small messages identical data blocks will be identically encrypted © Ravi Sandhu World-Leading Research with Real-World Impact! 25

Cipher Block Chaining (CBC) Mode 128 bit Data block + 128 bit previous ciphertext block 128 bit key 128 bit key D E  is the exclusive OR operation 128 bit previous ciphertext block + 128 bit Data block © Ravi Sandhu World-Leading Research with Real-World Impact! 26

Message Authentication Code (MAC) Symmetric-Key Message Authentication Code (MAC) © Ravi Sandhu World-Leading Research with Real-World Impact!

Message Authentication Code INSECURE CHANNEL Plaintext + MAC Plain- text Yes/No MAC Algorithm M Verification Algorithm V A B K K © Ravi Sandhu World-Leading Research with Real-World Impact! 28

Does not provide non-repudiation Message Authentication Code INSECURE CHANNEL Plaintext + MAC Plain- text Yes/No MAC Algorithm M Verification Algorithm V A B K K Does not provide non-repudiation © Ravi Sandhu World-Leading Research with Real-World Impact! 29

Message Authentication Code Symmetric Encryption Based Message-Digest Based © Ravi Sandhu World-Leading Research with Real-World Impact! 30

Will revisit after discussing message digests Message Authentication Code Symmetric Encryption Based Message-Digest Based Will revisit after discussing message digests © Ravi Sandhu World-Leading Research with Real-World Impact! 31