Foundations of Network and Computer Security

Slides:



Advertisements
Similar presentations
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Advertisements

Network Security: Lab#2 J. H. Wang Apr. 28, 2011.
Problem 1 3/10/2011Practical Aspects of Modern Cryptography.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
MITP 458 Application Layer Security By Techjocks.
Foundations of Network and Computer Security J J ohn Black Lecture #8 Sep 15 th 2005 CSCI 6268/TLEN 5831, Fall 2005.
Foundations of Network and Computer Security J J ohn Black Lecture #13 Sep 26 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #22 Oct 21 st 2009 CSCI 6268/TLEN 5550, Fall 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #12 Sep 23 rd 2009 CSCI 6268/TLEN 5550, Fall 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #17 Oct 9, 2009 CSCI 6268/TLEN 5550, Fall 2009.
Chapter 3 Encryption Algorithms & Systems (Part C)
Electronic mail security -- Pretty Good Privacy.
Foundations of Network and Computer Security J J ohn Black Lecture #27 Nov 6 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Foundations of Network and Computer Security J J ohn Black Lecture #27 Nov 7 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #15 Oct 19 th 2004 CSCI 6268/TLEN 5831, Fall 2004.
Foundations of Network and Computer Security J J ohn Black Lecture #14 Oct 1 st 2007 CSCI 6268/TLEN 5831, Fall 2007.
Public-Key Cryptology An Asymmetrical Approach to Encryption.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2013.
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2015.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Pretty Good Privacy (PGP) Security for Electronic .
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
Access The L Line The Express Line to Learning 2007 L Line L © Wiley Publishing All Rights Reserved.
CS/COE 1501 Recitation Extended Euclidean Algorithm + Digital Signatures.
Public / Private Key Example Dan Fleck CS 469: Security Engineering Coming up: Today 11.
Network Security: Lab#2 J. H. Wang Oct. 9, Objectives To learn to use message digests –MD5 To learn to use secure hash functions –SHA-1, SHA-2 To.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Tutorial on Creating Certificates SSH Kerberos
Computer Communication & Networks
e-Health Platform End 2 End encryption
CSCE 715: Network Systems Security
Unix System Administration
Introduction Used for communication to verify
Bitcoin Mining by David Kopczyk.
Foundations of Network and Computer Security
Sindhusha Doddapaneni
Practical work with PKI
Digital signatures.
Simplified IDEA Cryptography and Network Security.
* Firstly download your Avast Antivirus setup file from the following links and then save it to your computer where you want to * After downloading your.
For any QuickBooks user who aspires to work on payroll, it is quite essential to at least know how one gets started with QuickBooks payroll. We will now.
Digital Signature Schemes and the Random Oracle Model
Keys Campbell R. Harvey Duke University, NBER and
Campbell R. Harvey Duke University and NBER
MAC: Message Authentication Code
LAB # 2 – MESSAGE AUTHENTICATION STUDENTS MANUAL
Foundations of Network and Computer Security
Kerberos.
Campbell R. Harvey Duke University and NBER
Secure Electronic Transaction (SET) University of Windsor
A Programmer’s Guide to Secure Connections
Electronic Mail Security
CS 394B Introduction Marco Canini.
One Time Signature.
Cryptography Lecture 14.
Asymmetric Cryptographic Algorithms
Cryptography Lecture 13.
Cryptography Fundamentals
Sioux City Community Schools Computer System
One-way Hash Function Network Security.
HMAC and its Design Objectives
Digital Signature Standard (DSS)
How to Use Charm Crypto Lib
LAB 3: Digital Signature
Presentation transcript:

Foundations of Network and Computer Security John Black CSCI 6268/TLEN 5550, Spring 2013

Verifying my Sig I signed the first two “chunks” of my message (encrypted session key, encrypted message) I used base64 first, removed all newlines, hashed with sha1, then signed the hash This was all discussed in the project 2 slides

Generating a Sig Suppose I have the encrypted session key in “key.enc” and the symmetrically encrypted message in “msg.enc” then to sign I might use $ cat key.enc msg.enc | tr -d '\n' | openssl sha1 | openssl rsautl -sign -inkey jrblack-priv.pem | openssl base64 -e

To Verify a Sig You want to verify, so 1) Extract the sig from the message into a file called “sig” Remember to un-base64 it 2) Extract the first two chunks, delete newlines, hash, and save the output to “expected” 3) Run openssl rsautl –verify –in sig –inkey senders_cert.pem -certin 4) Compare the output to “expected”. If they match, you’re good