Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
Lesson Title: RFID Modulation, Encoding, and Data Rates Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Lesson Title: Threat Modeling Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
Lesson Title: Tag Threats, Risks, and Mitigation Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas
Digital Signatures and Hash Functions. Digital Signatures.
Cryptography Introduction Last Updated: Aug 20, 2013.
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
Principles of Information Security, 2nd edition1 Cryptography.
Lesson Title: Threats to and by an RFID system Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Lesson Title: Electromagnetics and Antenna Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Singulation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material.
Chapter 8 Network Security 4/17/2017
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Lesson Title: Hacking RFID and other RF devices Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Fast Fourier Transform Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: RFID Frequency Bands Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Introduction to RFID Applications Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Cryptography, Authentication and Digital Signatures
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Lesson Title: Privacy Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
Lesson Title: RFID Stakeholders Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Lesson Title: EPCglobal and ISO/IEC Item Management Standards Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Lesson Title: Types of RFID Tags Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Lesson Title: Guidelines for Securing RFID Systems Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lecture 2: Introduction to Cryptography
Lesson Title: EPCglobal Gen2 Tag Finite State Machine Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Network Security Chapter 8 12/13/ Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.
Lesson Title: Social Implications of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Media Interface Threats, Risks, and Mitigation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: FCC Rules for ISM Band Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Network Security Celia Li Computer Science and Engineering York University.
Lesson Title: ThingNet Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material.
Lesson Title: Tag Architecture Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Animal Identification Standards Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Lesson Title: RFID Nominal Read Range in Far Field Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Chapter 8 Network Security.
Lesson Title: Reader Architecture and Antenna Configurations
Copyright © 2008 by Dale R. Thompson Dale R. Thompson
Lesson Title: Regulations Affecting RFID
Presentation transcript:

Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material is based upon work supported by the National Science Foundation under Grant No. DUE Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation (NSF). Copyright © 2008 by Dale R. Thompson

Cryptography Cryptography is the study of encryption and decryption schemes. – Used to uphold the security principles of confidentiality and integrity 2

Symmetric-key cryptography terms Also know as secret-key or single-key cryptography Plaintext – It is the original message or data Encryption algorithm – It scrambles the message by performing substitutions and transformations on the plaintext based upon a key. The output of the encryption algorithm is called ciphertext. Ciphertext – It is the scrambled version of the plaintext that the encryption algorithm produces. Key – It determines the particular type of transformations and substitutions performed by the encryption algorithm. A different key produces a different ciphertext. The key must be kept secret. The key is usually a bit string representing a number. If the algorithm is secure/good, the bigger the length of the key the more secure the data is. Decryption algorithm – It is the algorithm that unscrambles the ciphertext to the original plaintext given the correct key. 3

Symmetric-key Cryptography 4

Exclusive-OR (XOR) Cryptography 5

Block vs. Stream Ciphers Block cipher – It is an encryption/decryption algorithm in which data is processed in blocks. A block of plaintext produces an equal-length block of ciphertext. Stream cipher – It is an encryption/decryption algorithm in which the data is processed one bit or byte at a time. 6

Examples of block ciphers Data encryption standard (DES) – 1977 – NIST – 64-bit blocks – 56-bit key – Too small for many applications today Triple DES (3DES) – Apply DES three times – Two-key version (2x56 = 112-bit key) – Three-key version (3x56 = 168-bit key) Advanced encryption standard (AES) – NIST Standard in 2001 after contest – 128-bit block size – Key sizes: 128-, 192-, or 256-bit key – Larger block size more efficient and secure – High throughput (fast) – Efficient 7

Stream cipher 8

RC4 stream cipher Variable key: bytes Uses – Secure sockets layer (SSL) – Transport layer security (TLS) – Wired equivalent privacy (WEP) – WiFi protected access (WPA) 9

Asymmetric-key cryptography Two different related keys – Public key for encryption – Private key for decryption Based on functions that are easy to calculate one way but computationally difficult to calculate the other way. Two problems are solved – Key distribution – Digital signatures 10

Asymmetric key generation 11

Asymmetric-key Cryptography Alice encrypts message for Bob 12

Asymmetric-key cryptography examples RSA – 1024-, and 2048-bit keys are common – Cannot compare length of keys directly to symmetric cryptography key lengths Elliptic curve cryptography (ECC) – For the same key length, ECC is more secure than RSA 13

Hash function Hash function – It accepts a variable-length message and outputs a hash value (hash code, message digest) 14

Hash function examples MD5 – Produces 128-bit hash value Secure hash algorithm (SHA-1) – 160-bit hash value SHA-256, SHA-384, SHA-512 – Created after AES 15

Hash function threat An attacker can substitute file and recalculate the hash value of the new file. 16

Message authentication code (MAC) Also called a cryptographic checksum The MAC is a function of the message and a secret key shared between the sender and receiver to authenticate the sender to the receiver An attacker cannot create the correct MAC because he does not know the secret key. 17

MAC calculation by sender 18

MAC verification by receiver 19

MAC examples Use a block cipher HMAC – Use standard hash function – key 20

Digital signature Requirements – Verify author, date, time of signature – Authenticate the message – Verifiable by a third party to resolve disputes Examples – Any asymmetric-key cryptography like RSA or ECC – Digital signature algorithm (DSA) 21

Asymmetric-key Cryptography for Digital Signature Alice signs message and Bob verifies it 22

Authentication protocol terms Authentication – It is the process of determining if an entity, whether an individual or an object, is who/what they claim to be. Some evidence has to be provided to prove the claim such as what they know, what they have, or what they are. Passwords are the most common form of authentication and are an example of what a user knows. Protocols – Protocols define the series of messages exchanged between two or more entities and their meaning. Mutual authentication protocol – It permits parties to verify each other’s identity. This is important before exchanging keys or data. 23

Authentication protocol threat Replay attack 24

Asymmetric-key cryptography to establish a session key (simple authentication protocol) 25

Contact Information Dale R. Thompson, Ph.D., P.E. Associate Professor Computer Science and Computer Engineering Dept. JBHT – CSCE University of Arkansas Fayetteville, Arkansas Phone: +1 (479) FAX: +1 (479) WWW:

Copyright Notice, Acknowledgment, and Liability Release Copyright Notice – This material is Copyright © 2008 by Dale R. Thompson. It may be freely redistributed in its entirety provided that this copyright notice is not removed. It may not be sold for profit or incorporated in commercial documents without the written permission of the copyright holder. Acknowledgment – These materials were developed through a grant from the National Science Foundation at the University of Arkansas. Any opinions, findings, and recommendations or conclusions expressed in these materials are those of the author(s) and do not necessarily reflect those of the National Science Foundation or the University of Arkansas. Liability Release – The curriculum activities and lessons have been designed to be safe and engaging learning experiences and have been field-tested with university students. However, due to the numerous variables that exist, the author(s) does not assume any liability for the use of this product. These curriculum activities and lessons are provided as is without any express or implied warranty. The user is responsible and liable for following all stated and generally accepted safety guidelines and practices. 27