Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.

Slides:



Advertisements
Similar presentations
MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
Advertisements

“Advanced Encryption Standard” & “Modes of Operation”
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Cryptography1 CPSC 3730 Cryptography Chapter 6 Triple DES, Block Cipher Modes of Operation.
Chapter 5 Cryptography Protecting principals communication in systems.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
A Survey of Authentication Protocol Literature: Version 1.0 Written by John Clark and Jeremy Jacob Presented by Brian Sierawski.
Lecture 4 Page 1 CS 136, Fall 2014 More on Cryptography CS 136 Computer Security Peter Reiher October 14, 2014.
Lecture 4 Page 1 CS 136, Fall 2012 More on Cryptography CS 136 Computer Security Peter Reiher October 9, 2012.
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
3DES and Block Cipher Modes of Operation CSE 651: Introduction to Network Security.
Chapter 9: Algorithms Types and Modes Dulal C. Kar Based on Schneier.
More About DES Cryptography and Network Security Reference: Sec 3.1 of Stallings Text.
Lecture 4 Page 1 CS 236 Stream and Block Ciphers Stream ciphers convert one symbol of plaintext immediately into one symbol of ciphertext Block ciphers.
Lecture 2 Page 1 CS 236, Spring 2008 More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Lecture 5 Page 1 CS 236 Online Public Key Encryption Systems The encrypter and decrypter have different keys C = E(K E,P) P = D(K D,C) Often, works the.
Lecture 4 Page 1 CS 236 Stream and Block Ciphers Stream ciphers convert one symbol of plaintext immediately into one symbol of ciphertext Block ciphers.
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Modes of Operation block ciphers encrypt fixed size blocks – eg. DES encrypts 64-bit blocks with 56-bit key need some way to en/decrypt arbitrary amounts.
CS480 Cryptography and Information Security
Basics of Cryptography
IT443 – Network Security Administration Instructor: Bo Sheng
Outline Desirable characteristics of ciphers Stream and block ciphers
Outline Desirable characteristics of ciphers Stream and block ciphers
Cryptography Much of computer security is about keeping secrets
Public Key Encryption Systems
CSCE 715: Network Systems Security
Outline Desirable characteristics of ciphers Uses of cryptography
Outline Introduction Authentication Access control Cryptography.
Basic Network Encryption
Cryptography.
Outline Desirable characteristics of ciphers Stream and block ciphers
Outline Desirable characteristics of ciphers Uses of cryptography
Outline Desirable characteristics of ciphers Stream and block ciphers
Cryptography and Security Fall 2009 Steve Lai
Cryptography This week we are going to use OpenSSL
Outline Desirable characteristics of ciphers Stream and block ciphers
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Security through Encryption
PART VII Security.
Outline Desirable characteristics of ciphers Stream and block ciphers
Algorithm Types & Algorithm Modes
The Secure Sockets Layer (SSL) Protocol
Block vs Stream Ciphers
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Outline Using cryptography in networks IPSec SSL and TLS.
Network Security - A Lecture 1 - NETW4006 NETW4006-Lecture01 1.
Outline Desirable characteristics of ciphers Stream and block ciphers
Lecture 10: Network Security.
Padding Oracle Attacks
Basic Network Encryption
Public Key Encryption Systems
Public Key Encryption Systems
Counter Mode, Output Feedback Mode
Elect. Codebook, Cipher Block Chaining
Secret-Key Encryption
Outline Introduction Authentication Access control Cryptography.
Presentation transcript:

Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014

Outline Cryptographic modes Symmetric cryptosystems Asymmetric cryptosystems Common ciphers of each type Combined use of the two types

Cryptographic Modes A cryptographic mode is a way of applying a particular cipher Block or stream The same cipher can be used in different modes But other things are altered a bit A cryptographic mode is a combination of cipher, key, and feedback Plus some simple operations

An Example Mode Cipher block chaining (CBC) The encrypted version of the previous block is used to encrypt this block For block X+1, XOR the plaintext with the ciphertext of block X Then encrypt the result Each block’s encryption depends on all previous blocks’ contents Decryption is similar

What About the First Block? If we send the same first block in two messages with the same key, Won’t it be encrypted the same way? Might easily happen with message headers or standardized file formats CBC as described would encrypt the first block of the same message sent twice the same way both times

Initialization Vectors A technique used with CBC And other crypto modes Abbreviated IV Ensures that encryption results are always unique Even for duplicate message using the same key XOR a random string with the first block plaintext  IV Then do CBC for subsequent blocks

Encrypting With An IV First block of message Second block of message 1 1 Initialization vector Use previous msg for CBC 1 XOR IV and message Apply CBC 1 1 1 1 Encrypt msg and send IV plus message Encrypt and send second block of msg No need to also send 1st block again

How To Decrypt With Initialization Vectors? First block received decrypts to P = plaintext  IV plaintext = P  IV No problem if receiver knows IV Typically, IV is sent in the message Subsequent blocks use standard CBC So can be decrypted that way

An Example of IV Decryption Encrypted data And XOR with the plaintext IV Initialization vector IP header The message probably contains multiple encrypted blocks 1 1 1 1 1 1 Now decrypt the message

For Subsequent Blocks Use previous ciphertext block instead of IV And XOR with the previous ciphertext block 1 1 1 1 1 Now decrypt the message

Some Important Crypto Modes Electronic codebook mode (ECB) Cipher block chaining mode (CBC) Cipher-feedback mode (CFB) and Output-feedback mode (OFB) Both convert block to stream cipher

Symmetric and Asymmetric Cryptosystems Symmetric - the encrypter and decrypter share a secret key Used for both encrypting and decrypting Asymmetric – encrypter has different key than decrypter

Description of Symmetric Systems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations

Advantages of Symmetric Key Systems Encryption and authentication performed in a single operation Well-known (and trusted) ones perform faster than asymmetric key systems Doesn’t require any centralized authority Though key servers help a lot

Disadvantage of Symmetric Key Systems Encryption and authentication performed in a single operation Makes signature more difficult Non-repudiation hard without servers Key distribution can be a problem Scaling

Sample Symmetric Key Ciphers The Data Encryption Standard The Advanced Encryption Standard There are many others

Asymmetric Cryptosystems Often called public key systems The encrypter and decrypter have different keys C = E(KE,P) P = D(KD,C) Often, works the other way, too

Practical Use of Public Key Cryptography Keys are created in pairs One key is kept secret by the owner The other is made public to the world If you want to send an encrypted message to someone, encrypt with his public key Only he has private key to decrypt

Authentication With Shared Keys If only two people know the key, and I didn’t create a properly encrypted message - The other guy must have But what if he claims he didn’t? Or what if there are more than two? Requires authentication servers

Authentication With Public Keys If I want to “sign” a message, encrypt it with my private key Only I know private key, so no one else could create that message Everyone knows my public key, so everyone can check my claim directly

Key Management Issues To communicate via shared key cryptography, key must be distributed In trusted fashion To communicate via public key cryptography, need to find out each other’s public key “Simply publish public keys”

Issues of Key Publication Security of public key cryptography depends on using the right public key If I am fooled into using the wrong one, that key’s owner reads my message Need high assurance that a given key belongs to a particular person Which requires a key distribution infrastructure

Implementation of Asymmetric Cryptosystems Unlike symmetric systems, asymmetric systems are usually based on math Built using a known hard problem in mathematics E.g., factoring large numbers Strength depends on these mathematical properties

Some Commonly Used Ciphers Symmetric DES AES RC4 Asymmetric RSA Elliptic curve algorithms

Important Characteristics of Cipher Styles Symmetric algorithms are typically faster Symmetric algorithms are not good for most authentication problems Asymmetric algorithms are typically much slower Asymmetric algorithms offer better authentication options

Combined Use of Symmetric and Asymmetric Cryptography Common to use both in a single session Asymmetric cryptography essentially used to “bootstrap” symmetric crypto Use RSA (or another PK algorithm) to authenticate and establish a session key Use AES with that session key for the rest of the transmission

Combining Symmetric and Asymmetric Crypto Alice wants to share the key only with Bob Alice Bob Bob wants to be sure it’s Alice’s key But there are problems Only Bob can decrypt it KEA KDA Only Alice could have created it KEB KDB KEB KEA C=E(KS,KEB) KS=D(C,KDB) C=D(M,KEA) M KS M=E(C,KDA)