Cryptography: an overview

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Encryption Methods By: Michael A. Scott
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Cryptography 101 Frank Hecker
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Chapter 21 Distributed System Security Copyright © 2008.
Network Security Lecture 23 Presented by: Dr. Munam Ali Shah.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices (Part B)
Csci5233 computer security & integrity 1 Cryptography: an overview.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Introduction to Network Systems Security Mort Anvari.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Lifecycle Metadata for Digital Objects October 9, 2002 Transfer / Authenticity Metadata.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Fundamentals of Network Security Ravi Mukkamala SCI 101 October 6, 2003.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
The Secure Sockets Layer (SSL) Protocol
Cryptography: an overview
Cryptography: an overview
Basics of Cryptography
Security Outline Encryption Algorithms Authentication Protocols
Unit 3 Section 6.4: Internet Security
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
Cryptographic Hash Function
e-Health Platform End 2 End encryption
CSCE 715: Network Systems Security
Encryption
Introduction to security goals and usage of cryptographic algorithms
S/MIME T ANANDHAN.
Presented by: Dr. Munam Ali Shah
NET 311 Information Security
Pooja programmer,cse department
Chapt. 10 – Key Management Dr. Wayne Summers
Security.
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
The Secure Sockets Layer (SSL) Protocol
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
Lecture 6: Digital Signature
Lecture 10: Network Security.
CDK: Chapter 7 TvS: Chapter 9
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Basic of Modern Cryptography
Chapter 8 roadmap 8.1 What is network security?
Chapter 5 Computer Security
Presentation transcript:

Cryptography: an overview csci5233 computer security & integrity

csci5233 computer security & integrity Outline Security components Security mechanisms: Symmetric Cryptography Asymmetric Cryptography Cryptographic Checksums Digital Signatures csci5233 computer security & integrity

csci5233 computer security & integrity Security components aka. Security Goals Confidentiality: Data is only for the authorized. data integrity: Data is correct. origin integrity: Origin of the data is correct. non-repudiability: There exists a mechanism to prove that the actor (sender, receiver, writer, retrieval, …) indeed performed that action. availability: Data is available to the authorized. access control anonymity etc. What components to implement depends on the application’s security policy/requirements. csci5233 computer security & integrity

csci5233 computer security & integrity Security components What components to implement depends on the application’s security policy/requirements. Example applications that demand the various security components? csci5233 computer security & integrity

Security components: Exercise You are part of a project team, which is developing an information system for command, communication and control between a command center and nuclear submarines. Of course, the communication between the command center and the submarine must be secured from potential faults and attacks. Explain how each of the following goals could be achieved by providing detailed protocols (showing the actors and their respective actions). Goal #1: The communication must remain secret. That is, only the targeted recipient of a message should have access to the content of the message. Goal #2: The correctness of the messages/commands must be verifiable. That is, if the message ever gets altered, the change should be detected. Goal #3: The recipient of a message should be able to verify the true identity of the sender. That is, an unauthentic sender should be detected. Goal #4: A command issued by A cannot later be denied by A. That is, A cannot later deny either the content or the action of sending that message. csci5233 computer security & integrity

csci5233 computer security & integrity Security Mechanisms A security component is provided by one or more mechanisms. Common security mechanisms: Symmetric Cryptography Asymmetric Cryptography Cryptographic Checksums Digital Signatures Digital Certificates Firewalls IDS Kerberos 802.11i WEP IPSec SSL … csci5233 computer security & integrity

Classical Cryptography Sender, receiver share common key Keys may be the same, or trivial to derive from one another Also called symmetric cryptography csci5233 computer security & integrity

Public Key Cryptography Sender, receiver use keys that are inverse An entity has a key pair (public key, private key) The public key is usually public, but the private key is known only to the owner. Also called asymmetric cryptography csci5233 computer security & integrity

Cryptographical Checksums Message Digest A checksum of the data Sent or stored along with the source data The receiver or the user of the data verifies the digest to determine the correctness. csci5233 computer security & integrity

Cryptographical Checksums Message Authentication Code (MAC) Keyless checksum is not secure. Why? MAC is usually used for data integrity. Some sort of “protection” must be in place if keyless message digest is used. csci5233 computer security & integrity

csci5233 computer security & integrity Digital Signatures Powerful but expensive security mechanism Provides data integrity, origin integrity, and sender non-repudiability. How? csci5233 computer security & integrity