Security through Encryption

Slides:



Advertisements
Similar presentations
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Advertisements

CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Digital Signatures and Hash Functions. Digital Signatures.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Introduction to Public Key Cryptography
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
EE515/IS523 Think Like an Adversary Lecture 4 Crypto in a Nutshell Yongdae Kim.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Lecture 2: Introduction to Cryptography
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Overview of Cryptography & Its Applications
Intro to Cryptography Lesson Introduction
INCS 741: Cryptography Overview and Basic Concepts.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CS/ECE 578 Cyber-Security Dr. Attila Altay Yavuz
Web Applications Security Cryptography 1
Basics of Cryptography
Attacks on Public Key Encryption Algorithms
ISA 400 Management of Information Security
Symmetric Cryptography
IT443 – Network Security Administration Instructor: Bo Sheng
Cryptography Much of computer security is about keeping secrets
Cryptographic Hash Function
Public Key Encryption Systems
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Public Key Encryption and Digital Signatures
Outline Desirable characteristics of ciphers Uses of cryptography
Public-key Cryptography
Cryptography and Security Technologies
Encryption
Introduction to security goals and usage of cryptographic algorithms
Cryptography.
Outline Desirable characteristics of ciphers Uses of cryptography
Presented by: Dr. Munam Ali Shah
Digital Signatures Last Updated: Oct 14, 2017.
Cryptography Basics and Symmetric Cryptography
ICS 454 Principles of Cryptography
PART VII Security.
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
Introduction to Symmetric-key and Public-key Cryptography
Security.
NETW4005 COMPUTER SECURITY - A
ICS 454 Principles of Cryptography
NET 311 Information Security
Outline Using cryptography in networks IPSec SSL and TLS.
Lecture 10: Network Security.
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
DISSERTATION ON CRYPTOGRAPHY.
Introduction to Cryptography (1)
Chapter 29 Cryptography and Network Security
Introduction to Cryptography
Public Key Encryption Systems
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

Security through Encryption James P. Skon

Encryption

Overview History What is encryption/decryption? Symmetrical encryption Public-key encryption Current encryption standards Encryption

Caesar cipher Encryption

German Enigma Encryption

Cryptography Is Is not A tremendous tool The basis for many security mechanisms Is not The solution to all security problems Reliable unless implemented properly Reliable unless used properly Something you should try to invent yourself unless you spend a lot of time becoming an expert you subject your design to outside review Encryption

Basic Cryptographic Concepts Encryption scheme: functions to encrypt, decrypt data Symmetric encryption Block, stream ciphers, same key for both sides Hash function, MAC Map any input to short hash; ideally, no collisions MAC (keyed hash) used for message integrity Public-key cryptography PK encryption: public key does not reveal key-1 Signatures: sign data, verify signature Encryption

Unsecure message Plain Text ah-ha!! Encryption Dear Sally, The secret ... ah-ha!! Encryption

network transactions Assume attackers can control the network We will talk about how they do this later Attackers can intercept packets, tamper with or suppress them, and inject arbitrary packets Encryption

Encryption Ciphertext Plain Text Encryption Algorithm Ad44fgt6&55tgt Ciphertext Ee8e0w8e*WEdlGlr98& d(D9ED- …. Encryption Algorithm Plain Text Dear Sally, The secret ... Encryption

Decryption Plain Text Ciphertext Decryption Algorithm Dear Sally, Ad44fgt6&55tgt Plain Text Decryption Algorithm Dear Sally, The secret ... Ciphertext Ee8e0w8e*WEdlGlr98& d(D9ED- …. Encryption

Secure Message Ciphertext Plain Text Plain Text ????? Encryption Ee8e0w8e*WEdlGlr98&d(D9ED fssdfsdf sfd sd- Dear Sally, The secret ... Dear Sally, The secret ... Plain Text Plain Text ????? Encryption

Encryption Destination Source insecure key Plaintext Plaintext key Algorithm Encrypted message Algorithm Plaintext key Encryption

Cryptanalysis breaking the code with brute force computation attack Types Ciphertext-only attack Known-plaintext attack Chosen-plaintext attack Adaptive-chosen-plaintext attack Others... Encryption

Symmetric Key Encryption Both parties must have the same key Often encryption and decryption done by the exact same algorithm Typically the algorithm is publicly known (only the key is secret) Called the “secret key” method, since secrecy of key is essential Encryption

One-time pad Method Each character from the plaintext is encrypted by a modular addition with a character from a secret random key (or pad) of the same length as the plaintex Key must be length of message Must be random, never reused Encryption

One Time Pad Method Message: "THE BRITISH ARE COMING” Key: DKJFOISJOGIJPAPDIGN A B C D E F G H I J K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Encryption (T(19)+D(03)=22) MOD 26 = 22 = W (H(07)+K(10)=17) MOD 26 = 17 = R (E(04)+J(09)=13) MOD 26 = 13 = N (B(01)+F(05)=06) MOD 26 = 06 = G (R(17)+O(14)=31) MOD 26 = 05 = F Encryption

One Time Pad THEBRITISHARECOMING DKJFOISJOGIJPAPDIGN Result: WRNGFQLRGNIATCDPQTT Decryption (W(22)-D(03)= 19 +26) MOD 26 = 19 = T (R(17)-K(10)= 07 +26) MOD 26 = 07 = H (N(13)-J(09)= 04 +26) MOD 26 = 04 = E (G(06)-F(05)= 01 +26) MOD 26 = 01 = B (F(05)-O(14)=-09 +26) MOD 26 = 17 = R Encryption

Stream ciphers Generate a long key with a pseudo random number generator. Encryption

Block Cipher DES, AES Build a key for each block from the start key, and the previous block Encryption

Strong Symmetric Key Encryption Weak encryption is vulnerable to cryptanalysis Strong encryption is an algorithm for which cryptanalysis is intractable (possible, but takes too long) Strength of an algorithm is related to key length (algorithm complexity) Encryption

Symmetric Key Encryption - Algorithms DES (Data Encryption Standard) 56-bit key Adopted in 1977 by the National Bureau of Standards. Originally proposed key length of 128-bits. Powerful computers can now break DES. Double and Triple DES - use two or three keys for greater safety Encryption

Major Systems Data Encryption Standard (DES) 1978 56-bit keys very hard to break a key requires 255 steps on average never been broken in genera, but can be broken for a specific key given enough CPU power. Usually implemented in hardware Encryption

Major Systems Advanced Encryption Standard adopted by the U.S. government and is now used worldwide Algorithm well known, generally trusted Attacks: Brute Force Cryptoanalysis In 2011 a key-recovery attack created which is about 4 times faster then brute force. Encryption

Symmetric Key Problems How do we safely exchange keys? How do we authenticate the source (I.e. who really sent this message) Encryption

Encryption secret-key Sender and receiver must have an identical key Key is used for both encryption and decryption Problems: Secret keys must be exchanged in private. Each side must trust each other with their secret key. Called the key management problem. Encryption

Encryption public-key Solution to key management problem. Each persons has a pair of keys, a public key and a private key Public key is published in trusted directory Private key known only to owner. Encryption

Encryption public-key Anyone can use public key to encrypt data to be sent to the owner of the public key. ONLY the owner of the private key can decrypt the message. Thus security is assured across unsecure media. Encryption

Public-key Encryption Destination Source insecure Private key Plaintext Algorithm Encrypted message Algorithm Plaintext Public key Encryption

Authentication process whereby the receiver of a digital message can be confident of the identity of the sender or the integrity of the message Encryption

Authentication Public-key Encryption provides concept of digital signature General operation: Bob sends to Mary Mary’s Public key Mary’s Private key Message decryption algorithm Message encryption algorithm encrypted message Bob’s Public key A mathematical relationship that will hold ONLY if Bob’s private key was used. function Digital signature Bob’s Private key function Encryption

Advantages of Public Key Systems Private keys need not be transmitted Digital signature possible Messages can be proven authentic to a third party (such as judge) allowing for legal agreements via network Encryption

Disadvantages of Public Key Systems Speed symmetrical (secret) key algorithms much, much faster Public key very computationally intensive Encryption

Disadvantages of Public Key Systems Solution to speed problem: For a transfer, generate a random session key Send the session key using a public key method Use the session key with a symmetrical key algorithm for actual data transfer. Encryption

Crypto Policy Perspectives Issues Law Enforcement National Security Right to Privacy Encryption