1 Information Security – Theory vs. Reality 0368-4474-01, Winter 2011 Lecture 2: Crypto review, fault attacks Eran Tromer (This lecture was given mostly.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
1 Beyond Authentication Don’t Trust, Just Verify Eran Tromer BRCMF Inaguration Ceremony 21 Nov 2013.
Rennes, 23/10/2014 Cristina Onete Putting it all together: using multiple primitives together.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 456 Introduction to Cryptography
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
COMP 170 L2 Page 1 Part 2 of Course Chapter 2 of Textbook.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Introduction to Modern Cryptography Instructor: Amos Fiat Strongly based on presentation and class by Benny Chor School of Computer Science Tel- Aviv Univ.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
1 Introduction to Information Security , Spring 2015 Lecture 7: Applied cryptography: asymmetric Eran Tromer Slides credit: John Mitchell, Stanford.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
ASYMMETRIC CIPHERS.
Foundations of Cryptography Rahul Jain CS6209, Jan – April 2011
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Cryptography Lecture 1: Introduction Piotr Faliszewski.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
RSA By: Abhishek Naik Viswanath Chennuru CPSC 624.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Network Security Section 1: Introduction to security.
Cryptographic Hash Functions Message Authentication Digital Signatures.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Public-Key Encryption
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
×Key Distribution : Negotiation ×Key Management : N*(N-1)/2.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.
1 Information Security – Theory vs. Reality , Winter Lecture 10: Garbled circuits and obfuscation Eran Tromer Slides credit: Boaz.
1 Network Security Basics. 2 Network Security Foundations: r what is security? r cryptography r authentication r message integrity r key distribution.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
Cryptographic Hash Functions Prepared by Dr. Lamiaa Elshenawy
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
Lecture 5.1: Message Authentication Codes, and Key Distribution
COMP 424 Computer Security Lecture 09 & 10. Protocol ● An orderly sequence of steps agreed upon by two or more parties in order to accomplish a task ●
Various Attacks on Cryptosystems slides (c) 2012 by Richard Newman.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
1 Introduction to Information Security , Spring 2016 Lecture 4: Applied cryptography: asymmetric Zvi Ostfeld Slides credit: Eran Tromer.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Trusted Component Deployment Trusted Components Bernd Schoeller January 30 th, 2006.
Network security Cryptographic Principles
Security Outline Encryption Algorithms Authentication Protocols
Overview on Hardware Security
Digital signatures.
CAS CS 538 Cryptography.
Unit 2: Cryptography & Cryptographic Algorithm
Introduction to Cryptography
Presentation transcript:

1 Information Security – Theory vs. Reality , Winter 2011 Lecture 2: Crypto review, fault attacks Eran Tromer (This lecture was given mostly on the whiteboard.)

2 Administrative Course website: Lecture slides after talk Tentative list of topics Mailing list Questionnaire Registration To: Subject: ISTvR registration

3 Crypto review Encryption –Security defined as indistinguishability game –Chosen plaintext attack –Chosen message attack Digital signatures and message authentication codes –Unforgeability Hash functions –Collision-resistance –Heuristic pseudorandomness

4 Hardware faults Differential Fault Analysis of Arbitrary Ciphers Biham, Shamir, Differential Fault Analysis of Secret Key Cryptosystems (section 3) RSA via Chinese Remainder Theorem DeMillo, Lipton, On the importance of eliminating errors in cryptographic protocols (section 2) JVM single memory error

5 F-35 Joint Strike Fighter 73 chips made in China

6 Information technology supply chain: headlines ( May 9, 2008) “F.B.I. Says the Military Had Bogus Computer Gear” ( October 6, 2008) “Chinese counterfeit chips causing military hardware crashes” (May 6, 2010) “A Saudi man was sentenced […] to four years in prison for selling counterfeit computer parts to the Marine Corps for use in Iraq and Afghanistan.” DARPA DARPA Trust in ICs Argonne APS

7 High-level goal Ensure properties of a distributed computation when parties are mutually untrusting, faulty, leaky & malicious.

8 Proof-Carrying Data