1 資訊安全 Network Security Instructor: 孫宏民 Room: EECS 6402, Tel:03-5742968, Fax : 886-3-572-3694.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Cryptography encryption authentication digital signatures
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
1 Lect. 3 : Basic Terms Lots of new terminologies in every new fields…
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Digital Signatures and Hash Functions. Digital Signatures.
Intro 1 Introduction Intro 2 Good Guys and Bad Guys  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”
L0. Introduction Rocky K. C. Chang, January 2013.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Network Security Sorina Persa Group 3250 Group 3250.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Information Security Principles (ESGD4222)
I-4 security.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Cryptography, Authentication and Digital Signatures
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
ITMS – 3153 Information Systems Security
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Lecture 3 Basic Security Concepts cont.. Homework 1. Score: 10 points Due: September 12, :00 am via dropbox Last day to submit with 4%/day penalty:
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Textbook  Cryptography and Network Security: Principles and Practice (second/third edition) by William Stalling  密码学与网络安全:原理与实践(第 3 版) -- 刘玉珍 等译 电子工业出版社.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Intro to Cryptography Lesson Introduction
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Network Security Celia Li Computer Science and Engineering York University.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
INCS 741: Cryptography Overview and Basic Concepts.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Introduction (Pendahuluan)  Information Security  Criptography.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
2 nd lecture.  Plaintext – ciphertext – encryption – decryption.  Cryptography – cryptanalysis – cryptanalyst – cryptology.  Authentication – Integrity.
Cryptography.
Introduction Of System Security
Cryptography.
Computer Security Chapter Two
Presentation transcript:

1 資訊安全 Network Security Instructor: 孫宏民 Room: EECS 6402, Tel: , Fax :

2 Textbook: C. Kaufman, R. Perlman, and M. Speciner, Network Security, Second Edition, Prentice-Hall PTR, Reference Books: 1. W. Ford, Computer Communications Security: principles, Standard Protocols, and Techniques, Prentice Hall, W. Stallings, Network Security Essentials, Second Edition, Prentice Hall, Grading Scheme: Project 50%, Paper 25%, Exams 25%

3 Chapter 2 Introduction to Cryptography Instructor: 孫宏民

4 2.1 What is Cryptography Plaintexts (cleartexts): A message is a plaintext. Code (digits): representation of data (e.g., ASCII) Another code: A = 00, B = 01, C = 02,..., Z = 25 Sender, Receiver, and Intruder (or Interceptor): (Senders and receivers want to make sure an intruder cannot read the messages.)

5 Cipher(Cryptosystem): secret method of writing Ciphertexts: An encrypted messages Sender Receiver Intruder Model of Conventional Cryptosystem

6 Cryptography is the study of creating and using secret writing, or the art and science of keeping messages secure. Encryption (Enciphering): The encryption is the process of disguising a message in such a way as to hide its substance. Notation: C=E(M) or E K (M) or E K1 (M) Decryption (Deciphering): The process of turning ciphertext back into plaintext. Notation: M=D(C) or D K (C) or D K2 (C)

7 Cryptanalysis: The art and science of breaking ciphertexts. Cryptographers v.s. Cryptanalysts Cryptology = Cryptography+ Cryptanalysis

8 Four Basic Services of Cryptography Confidentiality (Secrecy): The intruder cannot read the encrypted message form the ciphertext. Authentication: It should be possible for the receiver of a message to ascertain its origin; an intruder should not be able to masquerade as someone else.

9 Four Basic Services of Cryptography Integrity: It should be possible for the receiver of a message to verify that it has not been modified in transit; an intruder cannot substitute a false message for a legitimate one. Nonrepudiation: A sender should not be able to falsely deny later that he sent a message.

Breaking an Encryption Scheme(1) A cipher is breakable if it is possible to find plaintext or key from ciphertext, or to find the key from plaintext-ciphertext pairs. Cryptanalysis = study (methods) of breaking system, that is, deciphering without the key (K2), using :

Breaking an Encryption Scheme(2)  (a) Ciphertext only (C) Most difficult to break  (b) Known plaintext (M, C) E.g., encrypted programs (while, if, else,...)  (c) Chosen plaintext (M*, C) Get the sender to encipher M* (your choice) for you.  (d) Chosen ciphertext (M, C*) Get the receiver to decipher C* (your choice) for you.

Breaking an Encryption Scheme(3)  (e) Chosen text (M*, C) and (M, C*) Combine (c) and (d).

13 Some other types of Cryptanalytic Attacks(1) Adaptive-chosen-plaintext Attacks (a special case of a chosen-plaintext attack): The intruder not only can choose the plaintext that is encrypted, but he can also modify his choice based on the results of previous encryption. Chosen-key Attacks: The intrduer has some knowledge about the relationship between different keys.

14 Some other types of Cryptanalytic Attacks(2) Bruce-force Attacks (Exhaustive search): To try every possible key one by one and to check whether the resulting plaintext is meaningful.

Type of Cryptographic Function Hash Function Secret Key Function Public Key Function

Secret Key Cryptography Secret Key Cryptosystems: The encryption & decryption keys are the same.(E K (M)= C & D K (C)= M).  Stream ciphers: The operation unit on the plaintext is a single bit (or byte), such as RC4 and A5.  Block ciphers: The operation unit on the plaintext is a group of bits (a block), such as DES, IDEA, and AES.

17 plaintext encryption ciphertext key ciphertext plaintext decryption

18 Example of a Cipher m i, c i  {00, 01, 02,..., 25} To encipher: M=m1m1 m2m2 m3m3 … C=c1c1 c 2 c 3 …

19 To decipher:

20 Caesar Cipher Shift each letter in the English alphabet forward by K positions (shift past Z cycle back to A). K is the key to the cipher. Example: k=3 TSINGHUAUNIVERSITY WVLQJKXDXQLYHUVLWB

21 Code Book Plaintext words or phrases are entered into the code book together with their ciphertext substitutes. The code book is the key. Example: ATTACK JAPAN  WordCode BOMB1701 JAPAN5603 ATTACK4008 NIGHT3790 

Public Key Cryptosystems Public Key Cryptosystems: Encryption & decryption keys are different (E K1 (M)=C & D K2 (C)=M), such as RSA, ElGamal, and McEliece.  The encryption key (public key) can be public while the decryption key (secret key) cannot be calculated from the public key.

23 Encryption and decryption are two mathmatical functions that incerses of each other. plaintext encryption ciphertext Private key ciphertext plaintext decryption Public key

24 There is an additional thing one can do with public key technology, which is to generate a digital signature on a message. plaintext signing Signed message public key Signed message plaintext verification private key

Hash Algorithm A cryptographic hash function is a mathematical transformation that takes a message of arbitrary length and computes from it a fixed-length number. We will call the hash of a message m, h(m).

26 It has the following property:  For any message, it is easy to compute h(m).  Given h(m), there is no way to find a m that hashes to h(m) in a way that is substantially easier than going through all possible values of m and computing h(m) for each one.  It is computationally infeasible to find two value that hash to the same thing.

27 Security Attacks Normal flow: Interruption: Interception:

28 Modification: Fabrication:

29 Interruption  This is an attack on availability.  Examples: cutting of a communication line, or destruction of a piece of hardware. Interception  This is an attack on secrecy.  Examples: wiretapping to capture data in network, or illicit copying of files or programs.

30 Modification  This is an attack on integrity.  Examples: changing values in a data file, or altering a program so that it performs differently. Fabrication  This is an attack on authenticity.  Examples: insertion of fake messages in network, or addition of records to a file.

31 Security Threats Passive threats  Interception (Secrecy) Active threats  Interruption (Availability)  Modification (Integrity)  Fabrication (Authenticity)

32 Data Security(1) Data security is the science and study of methods of protecting data in computer and communications systems. Data security studies four kinds of control:  Cryptography  Access  Information flow Prevent leakage  Inference  People shouldn't be able to infer something that shouldn't be inferred

33 Data Security(2) Threats to data in computer systems  Secrecy Browsing, Leakage, Inference  Authenticity Tampering, Accidental destruction Browsing Searching through main memory or secondary storage

34 Data Security(3) Leakage Transmission of data to unauthorized users by processes with legitimate access to the data (e.g., compilers, text editors,...) Inference In a statistical database, you may infer the info of an individual from average.

35 Data Security(4) Tampering  Replay  insert  Delete Accidental destruction  Unintentional overwriting  Caused by faulty software (e.g., an array subscript is out-of-range)  Access controls are needed to prevent programs from writing into memory regions of other programs

36 Data Security(5)  Unintentional deletion  Caused by software or hardware failure or user mistakes (e.g., a disk crash)  Backup is needed to recover from destruction

37 Other Threats to Data Security Ciphertext searching xyzxyz  salary (example) You don't know what xyz is, but know they are the same. Know one of them  Know both Masquerading Write programs to simulate login procedure to get other people's password.

38 Computer System

39 Cryptographic System For a given K, DK is the inverse of E K ; that is, D K (E K (M)) = M Requirements for cryptosystems:   K, E K and D K are efficient (run in polynomial time)  System is easy to use (no 200 digits keys has to be typed)  Security depends only on the secrecy of K, not on E or D