Chapter 4 Cryptography / Encryption

Slides:



Advertisements
Similar presentations
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
03 December 2003 Public Key Infrastructure and Authentication Mark Norman DCOCE Oxford University Computing Services.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Security Management.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Encryption Methods By: Michael A. Scott
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography, Authentication and Digital Signatures
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Midterm Review Cryptography & Network Security
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
CPIS 312 Chapter Four: PUBLIC KEY CRYPTO. Index 2 A.Introduction A.1 Asymmetric Key Cryptography- Introduction A.2 General ideas about the Public Key.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Fundamentals of Network Security Ravi Mukkamala SCI 101 October 6, 2003.
Network security Cryptographic Principles
Web Security.
Key management issues in PGP
Digital Signatures.
Public Key Infrastructure (PKI)
Basics of Cryptography
Symmetric and Asymmetric Encryption
Computer Communication & Networks
CS480 Cryptography and Information Security
Chapter 15 Key Management
Public-Key Cryptography and RSA
Public Key Encryption and the RSA Algorithm
Basic Network Encryption
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Introduction to security goals and usage of cryptographic algorithms
IS3230 Access Security Unit 9 PKI and Encryption
Message Security, User Authentication, and Key Management
Public Key Infrastructure
Pooja programmer,cse department
PART VII Security.
Secure Electronic Transaction (SET) University of Windsor
NET 311 Information Security
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
NET 311 Information Security
Diffie-Hellman key exchange/agreement algorithm
Install AD Certificate Services
Public-Key, Digital Signatures, Management, Security
Chapter 3 - Public-Key Cryptography & Authentication
Chapter 29 Cryptography and Network Security
PKI (Public Key Infrastructure)
Basic Network Encryption
Basic of Modern Cryptography
Asymmetric Cryptographic Algorithms
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Fluency with Information Technology Lawrence Snyder
Security in Distributed Systems
Chapter 15 Key Management
Introduction to Cryptography
Presentation transcript:

Chapter 4 Cryptography / Encryption

Introduction to Cryptography

Figure 30.1 Cryptography components The confidentiality principle mandates that information should solely be viewed by people with appropriate and correct privileges. It is achieved either by authorization / authentication i.e. providing right access and validating it at the time of accessing information or by cryptography, which involves encryption and decryption methods.

Figure 30.2 Categories of cryptography

Figure 30.3 Symmetric-key cryptography For symmetric encryption, the private key needs to be shared between both the communicating parties and there are multiple mechanisms like Diffie Hellman and RSA to achieve that. These mechanisms use asymmetric key i.e. Public Key Infrastructure to share the Secret Key.

Note In symmetric-key cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared.

Assymetric Encryption: In this type of Encryption, a pair of keys known as Public Key and Private Key is used. As name indicates, Public Key is shared and known to everyone where as Private Key is with the person himself. Sender while Encrypting will use Receiver’s Public Key and encrypt the message whereas Receiver will use his/her Private Key to decrypt the message and read it.

Figure 30.4 Asymmetric-key cryptography

Figure 30.5 Keys used in cryptography

Example 30.1 The following shows a plaintext and its corresponding ciphertext. Is the cipher monoalphabetic? Solution The cipher is probably monoalphabetic because both occurrences of L’s are encrypted as O’s.

Digital Certificate An attachment to an electronic message used for security purposes. The most common use of a digital certificate is to verify that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode a reply. Now, you would think how to discover Public Key of others? The answer is Digital Certificate. A Digital Certificate contains information about its owner like name, Public Key, Validity of certificate etc. All the browsers recognize Digital Certificates and will download them automatically. They will extract the Public Key to decrypt the message before they show the content to the receiver. Hence, Digital Certificates is commonly used mechanism to share Public Key with each other.

PKI(Public Key Infrastructure ) There are 3 key roles in PKI as below: Certificate Authority (CA): A Certificate Authority issues digital certificates to person or organization which requests for it. In many cases, it will also play role of Verification Authority (VA) and verify the digital certificates. E.g. Here are some of Comodo, Symantec, GoDaddy, GlobalSign, DigiCert Registration Authority (RA): Registration Authority is responsible for accepting requests for digital certificates and authenticating the person or organization making the request. This authority will verify identity of person / organization and ensure that person / organization is what it is claiming. Validation Authority (VA): A Validation Authority (VA) is an organization which verifies the digital certificates. It is often a 3rd party organization i.e. a separate organization than CA or RA.

Certification Authority (CA) People, processes responsible for creation, delivery and management of digital certificates Organized in a hierarchy (use delegation) Root CA CA-1 CA-2

Registration Authority People, processes and/or tools that are responsible for Authenticating the identity of new entities (users or computing devices) Requiring certificates from CA’s.

Certificate Repository A database which is accessible to all users of a PKI, contains: Digital certificates, Certificate revocation information Policy information

Example Bob generates his own key pair Alice generates her own key pair public key Alice private key Bob generates his own key pair public key Bob private key Both send their public key to a CA and receive a digital certificate

Example Bob gets Alice’s public key from the CA Alice gets Bob’s public key from the CA private key Alice public key Bob Bob gets Alice’s public key from the CA private key Bob public key Alice

Key Establishment Method 2: Diffie-Hellman Key Exchange Agree on two numbers n, g; both numbers can be made public! Alice and Bob pick two secret numbers x and y n=10, g=7, x=3, g^x mod n = 3; y=5, g^{xy} mod n = 3; g^y mod n = 7; g^{xy} mod n = 3.