EEC 688/788 Secure and Dependable Computing

Slides:



Advertisements
Similar presentations
ECE454/CS594 Computer and Network Security
Advertisements

Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
1 Lect. 9 : Mode of Operation. 2 Modes of Operation – ECB Mode  Electronic Code Book Mode Break a message into a sequence of plaintext blocks Each plaintext.
Chapter 5 Cryptography Protecting principals communication in systems.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC-484/584 Computer Networks Lecture 16 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 16 Wenbing Zhao
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC-484/584 Computer Networks Lecture 18 Wenbing Zhao (Part of the slides are based on materials supplied by Prentice-Hall)
Chapter 8 Network Security 4/17/2017
Feb 19, 2002Mårten Trolin1 Previous lecture Practical things about the course. Example of cryptosystem — substitution cipher. Symmetric vs. asymmetric.
Network Security Chapter
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
Network Security Chapter 8 12/13/ Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.
EEC 688/788 Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Understanding Cryptography by Christof Paar and Jan Pelzl These slides were prepared by Christof Paar and Jan Pelzl Chapter 12.
Modes of Operation block ciphers encrypt fixed size blocks – eg. DES encrypts 64-bit blocks with 56-bit key need some way to en/decrypt arbitrary amounts.
Hervey Allen Phil Regnauld 15 June 2009 Papeete, French Polynesia DNSSEC Tutorial: Public / Private.
Practical Aspects of Modern Cryptography Josh Benaloh & Brian LaMacchia.
CS480 Cryptography and Information Security
Basic Encryption: methods and tools
Security Outline Encryption Algorithms Authentication Protocols
Computer and Network Security
Symmetric Cryptography
IT443 – Network Security Administration Instructor: Bo Sheng
Crypto in information security
Cryptographic Hash Functions
EEC 688/788 Secure and Dependable Computing
Chapter 8 Network Security.
Outline Desirable characteristics of ciphers Stream and block ciphers
Cryptographic Hash Functions
Presented by: Dr. Munam Ali Shah
EEC 688/788 Secure and Dependable Computing
Cryptography Basics and Symmetric Cryptography
Efficient CRT-Based RSA Cryptosystems
EEC 688/788 Secure and Dependable Computing
Chapter 8 Network Security.
PART VII Security.
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
Introduction to Symmetric-key and Public-key Cryptography
Algorithm Types & Algorithm Modes
csci5233 computer security & integrity (Chap. 4)
Security Of Wireless Sensor Networks
EEC 688/788 Secure and Dependable Computing
Symmetric-Key Encryption
Cryptography and Network Security
Block vs Stream Ciphers
EEC 688/788 Secure and Dependable Computing
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Security of Wireless Sensor Networks
Cryptography Lecture 12.
Practical Aspects of Modern Cryptography
Encryption Basics Types of ciphers Algorithms Modes Key Length
Hashing Hash are the auxiliary values that are used in cryptography.
Counter Mode, Output Feedback Mode
Secret-Key Encryption
A General Introduction to Modern Cryptography
Presentation transcript:

EEC 688/788 Secure and Dependable Computing Discussion#1 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Administrative Next Tuesday’s class (9/29) is canceled – I will attend a workshop at OAI Midterm this Thursday (9/24) Hand written cheat sheet (US Letter size) allowed No smart phone please TI-83, TI-84 calculator or equivalent allowed Volunteers needed for a human subject test for my research 1% extra credit will be award Each test will take no more than 2 minutes Unfortunately you will have to wait for your turn Today: 4-5pm, and 8-9pm

Q1. Assuming that the DES block cipher is used in the Electronic Code Book mode. If one bit in a block of ciphertext is inverted during transmission, how many bits will likely be damaged after decryption at the receiver? 8/19/2019 8/19/2019 EEC693: Secure and Dependable Computing EEC688: Secure & Dependable Computing Wenbing Zhao

Q2. Assuming that the DES block cipher is used in the Cipher Block Chaining mode. If one bit of ciphertext is inverted during transmission, how many bits will likely be damaged after decryption at the receiver? 8/19/2019 8/19/2019 EEC693: Secure and Dependable Computing EEC688: Secure & Dependable Computing Wenbing Zhao 4

Q3. Assuming that the DES block cipher is used in the Cipher Feedback mode. If one bit of ciphertext is inverted during transmission, how many bits will likely be damaged after decryption at the receiver (for both variations)? 8/19/2019 8/19/2019 EEC693: Secure and Dependable Computing EEC688: Secure & Dependable Computing Wenbing Zhao 5

Q4. Assuming that the DES block cipher is used in the Stream Cipher mode (it is also called output feedback mode). If one bit of ciphertext is inverted during transmission, how many bits will likely be damaged after decryption at the receiver? 8/19/2019 8/19/2019 EEC693: Secure and Dependable Computing EEC688: Secure & Dependable Computing Wenbing Zhao

EEC688: Secure & Dependable Computing Q5. Recall that the following authentication protocol is vulnerable to the reflection attack. Make one change to the protocol so that it is no longer vulnerable to the reflection attack. Software control will be elaborated in more details in the next slide 8/19/2019 EEC688: Secure & Dependable Computing Wenbing Zhao 7

EEC688: Secure & Dependable Computing Q6. Considering the following way of producing a digital signature using message digests. If the one-way hash function used is not robust and one can easily find the collision on the hash. Which requirement (or requirements) of the digital signature would be violated? Software control will be elaborated in more details in the next slide 8/19/2019 EEC688: Secure & Dependable Computing Wenbing Zhao 8

EEC688: Secure & Dependable Computing Q7. Design an efficient secure email mechanism based on public key cryptography. Software control will be elaborated in more details in the next slide 8/19/2019 EEC688: Secure & Dependable Computing Wenbing Zhao 9