Introduction to Cryptography

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Chapter 5 Network Security Protocols in Practice Part I
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
Introduction to PKI, Certificates & Public Key Cryptography Erwan Lemonnier.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography.
Guide to Network Defense and Countermeasures Second Edition
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Chapter 20: Network Security Business Data Communications, 4e.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Cryptography 101 Frank Hecker
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Secure Socket Layer (SSL)
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
Module 9: Fundamentals of Securing Network Communication.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
4-Jun-164/598N: Computer Networks Differentiated Services Problem with IntServ: scalability Idea: segregate packets into a small number of classes –e.g.,
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
Cryptography CSS 329 Lecture 13:SSL.
Secure Sockets Layer (SSL)
The Secure Sockets Layer (SSL) Protocol
Presentation transcript:

Introduction to Cryptography

Objectives A conceptual understanding of secret-key, public-key, and hashing cryptographic algorithms and how they fit into the notion of certificates and how these certificates form the basis of Public Key Infrastructure (PKI).

Why Cryptography Scramble data to keep it private Detect whether data has been changed Provide proof of origin, receipt, transaction.. Provide digital identities

Cryptographic Functions Three types - each with strengths and weaknesses depending upon their intended use. Secret-Key (Symmetric) Cryptography - Same shared key Public-Key (Asymmetric) Cryptography - Different but related keys Hash Function

Secret-Key Cryptography Characteristics Relatively fast Poses key delivery challenges when faced with large numbers of senders/receivers Popular Implementations Data Encryption Standard (DES) 56 bit key (plus 8 parity bits) Triple DES RSA’s RC2, RC4, RC5

Secret-Key Cryptography Examples of usage Encryption of bulk data and protection of ATM PINs

Public-Key Cryptography Characteristics Slower than secret-key cryptography Designed to accommodate key delivery and scalability Key Strengths 512 to 2048 bits Popular Implementations RSA - encryption and digital signature El Gamal and DSS - digital signatures Diffie-Hellman -secret-key establishment

Public-Key Cryptography Examples of Usage Authentication - encrypting challenge Key Distribution - encrypting session key

Hash Algorithms Characteristics Message of length n - Hash Function ------> h (Fixed length, short number Characteristics Easy to compute There is no way to get from the hash to the original message, that is any simpler than going though all possible values of the original message and computing the hash for each one It should be computationally infeasible to find two messages that hash to the same thing. Popular implementations - SHA-1, MD2, MD4, MD5

Hash Algorithms Examples of Usage System can store hashes of passwords instead of the password itself Message integrity - send messages and the hash of (message/secret-password) Digital signature

Digital Signatures Alice Signs with her Private Key - emails / file transfer/ floppy ----> Recipient Verifies with Alice’s Public Key Definition/Characteristics A digital signature is a number associated with a message, generated using the private key of the sender Anyone with Alice’s public key can verify that it is Alice’s signature Proves the message has not been altered in any way since the signature was applied Provides non-reputable source of origin

Digital Signatures Popular implementations - RSA+MD5, RSA+SHA-1, DSS+SHA-1 Examples of Usage Signed mail Signed code (Java applets, Active X controls)

Hashes and Digital Signatures SHA-1 Signed Alice’s Plain text h Alice signs the hash (encrypts the hash with her private key) Signed Bob decrypts the signed hash with Alice’s Public key h Bob If hashed match Only Alice could have signed Plain text did not change h Bob hashes the plain text to derive the hash

Certificates (x.509 V3) Question - Can I trust the Public Key? Answer - Yes, if it backed up by some trustworthy authority. User Certificates Trusted Method to Store Public Key Binds Public Key to User CA Certificates Well Known Public Key for Signature Verification Delivered with Browser, Server, Mutually installed on Browser / Server

Encryption Can be employed at Different Levels Field Level - Client Browser ---> s-HTTP Web Server Status- not supported - being dropped from products Message Level - Mail Sender ---> S-MIME /Open PGP - Mail Server - Advantage - Mail is often intended to be kept secret as an entire unit Transport Level - Client Browser ---> SSL/TLS - Web Server - Advantage - Useful when a session’s interactions needs to be kept secret Datagram Level - Firewall ---> IPSec Firewall - Advantage Encrypted pipe enables multiple sessions to be encrypted with only single IPSec setup overhead

Public-Key Infrastructure (PKI)

PKI - Continued

PKI - Continued

PKI Aspects - Establishing Trust Need to establish trust with other CA’s divisions of a corporation trading partners suppliers competitors Trust Models Flat certificate model Hierarchical certificate model Cross-certification - allows one CA to recognize the authority of another - CAs certify each other Link X.500 directories

PKI Aspects - CAs & RAs Certificate Authority Registration Authority Policy Profile CA key management Handle exceptions Support users Registration Authority Authenticate applicants Select attributer Approve and forward Request revocation Help manage policy

Network Security -SSL Secure Sockets Layer (SSL) Cryptographic protocol for protecting digital communication between client & server Can also be used server to server Standard, efficient and widely deployed (Web Servers - Apache, Netscape, Microsoft -IIS …etc)

SSL- How it works Negotiate Options Authenticate Distribute Keys One or Two way Authentication Which Crypto Suite Authenticate Exchange Certificate(s) Validate Certificate(s) Random Number Challenge(s) Distribute Keys Generate Secret Keys Exchange Secret Keys Flow Secure Data Encryption Modification Detection Compression

SSL- How it works Client Server (Alice) (Bob) <--------------------------------> Negotiate Options Authenticate Distribute Keys Flow Secure Data <---------------------------------->

History of SSL/TLS SSL Version 1 - was quickly replaced by SSL version 2 . Not in use today SSL Version 2 - some security problems; 1-way (server) authentication Private Communication Technology (PCT) - Microsoft’s response to SSL 2.0. Fixes some problems, but supplanted by SSL V3. SSL version 3 - Complete redesign of SSL. Fixed the problems in previous versions and added many features Transport Layer Security (TLS) - IETF standard, based on SSL V3, under development

IPSec Overview A framework that provides network layer security via protection for IP datagram transit Origin authentication, integrity, confidentiality, and key management Basis for virtual private networks (VPNs) IPSec support in TCP/IP Firewall - All connections among IP-Addressable entities Involves 3 protocols: Authentication Header (AH) protocol Encapsulating security payload (ESP) ISAKMP/Oakley

IPSec Enables Virtual Private Networks Via the internet, the corporate network can be securely extended to include remote nodes/networks IPSec enables a secure pipe or tunnel to be established

ISAKMP/Oakley Internet Security Association and Key Management Protocol IETF Standardized Framework Negotiate security associations Crypto key generation/refresh Oakley is the mandatory key management protocol within ISAKMP Essential for success/growth of VPNs Secure key exchange is most important element Automated key distribution, without manual intervention facilitates scalability

IPSec Modes - Tunnel and Transport IPSec tunnel and transport work together to allow tailoring of protection: end-to-end and tunnel specific Transport modes: end-to-end original IP datagram header is used for routing intranet addresses typical example - exchanges between a server in one intranet and client in another Tunnel modes: tunnel-specific protection outer IP header created and used for routing internet addresses typical example - firewall to firewall VPN

IP Authentication Header (AH) Two Modes: Transport and Tunnel Datagram content is clear text AH provides data integrity and data origin authentication Protection for entire datagram Data integrity is assured by the checksum generated by a message authentication code (MD5)

Encapsulating Security Payload (ESP) Two Modes: Transport and Tunnel IP datagram can be encrypted entirely (Tunnel Mode), or payload only (transport mode) Also provides data integrity and origin authentication ESP’s encryption uses a symmetric shared key