Digital Signatures. Anononymity and the Internet.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

Security Through Encryption. Different ways to achieve security of communication data Keep things under lock and key – Physical Encryption Through password.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Cryptography in World War II Jefferson Institute for Lifelong Learning at UVa Spring 2006 David Evans Class 4: Modern Cryptography
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Cryptography 101 How is data actually secured. RSA Public Key Encryption RSA – names after the inventors –Rivest, Shamir, and Adleman Basic Idea: Your.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Cryptography and Internet Security How mathematics makes it safe to shop on-line John Lindsay Orr University of Nebraska - Lincoln.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Computer Science Public Key Management Lecture 5.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 12 Cryptography (slides edited by Erin Chambers)
COMP 416 :: Fall 2010 Security Lecture 17 COMP 416 Fall 2010.
How HTTPS Works J. David Giese. Hyper Text Transfer Protocol BrowserHTTP Server GET / HTTP/1.1 HOST: edge-effect.github.io HEADERS BODY HTTP/ OK.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
CS110: Computers and the Internet Encryption and Certificates.
Encryption Coursepak little bit in chap 10 of reed.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Pertemuan-13 Enkripsi and Authentication. Symmetric-key Cryptography  Data encrypted and decrypted with same key  Classical examples: Caesar cipher,
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
David Evans CS200: Computer Science University of Virginia Computer Science Class 36: Public-Key Cryptography If you want.
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
1 Public-Key Cryptography and Message Authentication.
System Security: Cryptography Technologies CPE Operating Systems
Encryption / Security Victor Norman IS333 / CS332 Spring 2014.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Public Key Encryption.
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Encryption CS110: Computer Science and the Internet.
Cryptography Readings Encryption, Decryption, & Digital Certificates.
Chapter 4: Public Key Cryptography
Cryptography Deffie hellman. organization Foundations Symmetric key Symmetric key weaknesses Assymmetric key Deffie hellman – key exchange RSA – public.
1 Internet data security (HTTPS and SSL) Ruiwu Chen.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Digital Signatures.
Unit 3 Section 6.4: Internet Security
Symmetric and Asymmetric Encryption
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
Public Key Encryption Systems
PART VII Security.
The Secure Sockets Layer (SSL) Protocol
MSIT 543 Cryptography Concepts and Techniques How RSA Encryption Works
NET 311 Information Security
Public-Key, Digital Signatures, Management, Security
Fluency with Information Technology Lawrence Snyder
Public Key Encryption Systems
Presentation transcript:

Digital Signatures

Anononymity and the Internet

Potential For Mischief Microsoft You Hacker Controlled Website

Signature Signature - verifies identity What could go wrong?

Signature Bank Record of signatures

Physical Signature Sign a message by locking with a key you own

Physical Key Back Still need a trusted entity to manage keys

Asymmetric Cryptography Symmetric cryptography: Key for encoding same as key for decoding – Shift three letters Asymmetric cryptography: Key for encoding different than for decoding

Simple Example Encryption Key : – Multiply by 6, clock size 11 – Encode 5 = 5 * 6 clock 11 = 30 clock 11 = 8

Decoding If x * 6 clock 11 = y then y * 2 clock 11 = x

Decryption Key 2 is the decryption Key for encryption key 6 and clock size 11

Picking Keys Pick clock size C – Prime clock sizes work best Find x and y such that x * y clock C = 1

Public / Private One key is kept private Other key made public – Give to anyone who wants it

Private Key Any message encrypted with a private key MUST have been written by the person who signed it Anyone can decrypt the message – Encryption for authentication not secrecy

How Do We Know Public Key Is Good? Ravi You Hacker Controlled Website

Authenticating a Key Official key bank??

Can't Really Trust a Bank Key Bank You Hacker Controlled Website

Authenticating a Key Key bank "signs" people's public keys by encrypting them

Authenticating a Key Browsers come with public keys of known banks called Certification Authorities

2 Part Message Send two things: – Message encrypted with private key – Public key encrypted by trusted authority

Chain Of Trust Reality may involve chain of locks

Encrypting With Public Key Anyone can use public key to secretly send message to holder of private key Locked with Private Key Authentication Locked with Public Key Secrecy

Web Security HTTPS : Secure web connection – Browser asks server for public key – Browser picks shared secret, encrypts with public key, sends to server

RSA Multiplication keys too easy to break…

RSA Multiplication keys too easy to break… …use exponents RSA (Rivest, Shamir, Adelman) invented algorithm in 1977

RSA Math Private key : raise to x power, clock size C Public key : raise to y power, clock size C Message: clock 22 = 64 clock 22 = 20 Encrypted: clock 22 = 4

Picking Keys Start with two prime numbers p, q – multiply to make clock size Pick private key, calculate public key from private, p and q using multiplication trick

Picking Keys Start with two prime numbers p, q – multiply to make clock size Pick private key, calculate public key from private, p and q using multiplication trick If anyone figures out p and q they can figure out your private key

Factoring Factoring large numbers is hard – But we are getting faster

Factoring Factoring large numbers is hard – But we are getting faster Larger keys : 2048 bits (prime numbers with 100's of digits)

Factoring Factoring large numbers is hard – But we are getting faster Larger keys : 2048 bits (prime numbers with 100's of digits) May need to move to different kinds of math: relatively-easy-to-understand-primer-on- elliptic-curve-cryptography/2/ relatively-easy-to-understand-primer-on- elliptic-curve-cryptography/2/

Two messages: My public key: exponent 3, clock 34 encrypted ^ exponent mod clock = message Which 1 of these messages is NOT from me? – Three should check out, one should not Message Encrypted Version