CSE331: Introduction to Networks and Security Lecture 21 Fall 2002.

Slides:



Advertisements
Similar presentations
Sri Lanka Institute of Information Technology
Advertisements

Digital Signatures and Hash Functions. Digital Signatures.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Chapter 4  Hash Functions 1 Overview  Cryptographic hash functions are functions that: o Map an arbitrary-length (but finite) input to a fixed-size output.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
1 Information System Security AABFS-Jordan Summer 2006 Digital Signature and Hashing Functions Prepared by: Maher Abu Hamdeh & Adel Hamdan Supervised by:
CS526Topic 5: Hash Functions and Message Authentication 1 Computer Security CS 526 Topic 5 Cryptography: Cryptographic Hash Functions And Message Authentication.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
1 Message Authentication and Hash Functions Authentication Requirements Authentication Functions Message Authentication Codes Hash Functions Security of.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
MAC and HASH Functions Unit 5. AUTHENTICATION REQUIREMENTS In the context of communications across a network, the following attacks can be identified:
Lecture 15 Lecture’s outline Public algorithms (usually) that are each other’s inverse.
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
Message Authentication  message authentication is concerned with: protecting the integrity of a message protecting the integrity of a message validating.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
1 Chapter 11: Message Authentication and Hash Functions Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
Hash Functions A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value h = H(M) Principal object is.
IT 221: Introduction to Information Security Principles Lecture 6:Digital Signatures and Authentication Protocols For Educational Purposes Only Revised:
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Fall 2002CS 395: Computer Security1 Chapter 11: Message Authentication and Hash Functions.
Message Authentication and Hash Functions Chapter 11.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Network Security David Lazăr.
CSCI 172/283 Fall 2010 Hash Functions, HMACs, and Digital Signatures.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Slide 1 EJ Jung Hash Functions. Integrity checks.
Lecture 8 Overview. Secure Hash Algorithm (SHA) SHA SHA SHA – SHA-224, SHA-256, SHA-384, SHA-512 SHA-1 A message composed of b bits.
Cryptographic Hash Functions and Protocol Analysis
Lecture 2: Introduction to Cryptography
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Modern Cryptography.
Chapter 11 Message Authentication and Hash Functions.
Cryptographic Hash Functions Prepared by Dr. Lamiaa Elshenawy
Hash Functions Ramki Thurimella. 2 What is a hash function? Also known as message digest or fingerprint Compression: A function that maps arbitrarily.
Cryptography and Network Security
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 11 September 23, 2004.
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Hashes Lesson Introduction ●The birthday paradox and length of hash ●Secure hash function ●HMAC.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 13.Message Authentication.
@Yuan Xue 285: Network Security CS 285 Network Security Message Authentication Code Data integrity + Source authentication.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Cryptographic Hash Functions & Digital Signatures
Cryptographic Hash Functions
Cryptographic Hash Function
CSCE 715: Network Systems Security
Digital Signatures A digital signature is a protocol that produces the same effect as a real signature: It is a mark that only the sender can make but.
Cryptographic Hash Functions
NET 311 Information Security
Chapter 11 – Message Authentication and Hash Functions
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Digital Signatures Reference: Pfleeger , Charles P., Security in Computing, 2nd Edition, Prentice Hall, /7/2019 Ref: Pfleeger96, Ch.4.
Chapter 3 - Public-Key Cryptography & Authentication
Hashing Hash are the auxiliary values that are used in cryptography.
Hash Function Requirements
CRYPTOGRAPHY & NETWORK SECURITY
Presentation transcript:

CSE331: Introduction to Networks and Security Lecture 21 Fall 2002

CSE331 Fall Announcements Reminder: Project 2 is due Today Project 3 will be on the web pages this afternoon.

CSE331 Fall Recap Diffie-Hellman Key Exchange Today: –Cryptographic Hashes –Digital Signatures –Primality Testing

CSE331 Fall Cryptographic Hashes Creates a hard-to-invert summary of input data Useful for integrity properties –Sender computes the hash of the data, transmits data and hash –Receiver uses the same hash algorithm, checks the result Like a check-sum or error detection code –Uses a cryptographic algorithm internally –More expensive to compute Sometimes called a Message Digest Examples: –Secure Hash Algorithm (SHA) –Message Digest (MD4, MD5)

CSE331 Fall Hash Algorithms Take a variable length string Produce a fixed length digest –Typically bits (Bad) Examples we’ve already seen: –Parity (or byte-wise XOR) –CRC Realistic Example –The NIST Secure Hash Algorithm (SHA) takes a message of less than 2 64 bits and produces a digest of 160 bits Hash

CSE331 Fall Uses of Hash Algorithms Hashes are used to protect integrity of data –Virus Scanners –Program fingerprinting in general –Modification Detection Codes (MDC) Message Authenticity Code (MAC) –Includes a cryptographic component –Send (msg, hash(msg, key)) –Attacker who doesn’t know the key can’t modify msg (or the hash) –Receiver who knows key can verify origin of message Make digital signatures more efficient

CSE331 Fall Desirable Properties The probability that a randomly chosen message maps to an n-bit hash should ideally be 2 -n. –Attacker must spend a lot of effort to be able to modify the source message without altering the hash value Hash functions h for cryptographic use as MDC’s fall in one or both of the following classes. – Collision Resistant Hash Function: It should be computationally infeasible to find two distinct inputs that hash to a common value ( ie. h(x) = h(y) ). – One Way Hash Function: Given a specific hash value y, it should be computationally infeasible to find an input x such that h(x)=y.

CSE331 Fall Secure Hash Algorithm (SHA) Pad message so it can be divided into 512-bit blocks, including a 64 bit value giving the length of the original message. Process each block as bit words called W(t) for t from 0 to 15. Expand from these 16 words to 80 words by defining as follows for each t from 16 to 79: –W(t) := W(t-3)  W(t-8)  W(t-14)  W(t-16) Constants H0, …, H5 are initialized to special constants Result is final contents of H0, …, H5

CSE331 Fall SHA Chaining Variables Shift A left 5 bits

CSE331 Fall Physical Signatures Consider a paper check used to transfer money from one person to another Signature confirms authenticity –Only legitimate signer can produce signature In case of alleged forgery –3 rd party can verify authenticity Checks are cancelled –So they can’t be reused Checks are not alterable –Or alterations are easily detected

CSE331 Fall Digital Signatures: Requirements I A mark that only one principal can make, but others can easily recognize Unforgeable –If P signs a message M with signature S{P,M} it is impossible for any other principal to produce the pair (M, S{P,M}). Authentic –If R receives the pair (M, S{P,M}) purportedly from P, R can check that the signature really is from P.

CSE331 Fall Digital Signatures: Requirements II Not alterable –After being transmitted, (M,S{P,M}) cannot be changed by P, R, or an interceptor. Not reusable –A duplicate message will be detected by the recipient.

CSE331 Fall Digital Signatures with Shared Keys K AT K TB AliceBartTom K AT K TB K AT {msg}K TB {Alice,msg,K AT {msg}} Tom is a trusted 3 rd party (or arbiter). Authenticity: Tom verifies Alice’s message, Bart trusts Tom. No Forgery: Bart can keep msg, K AT {msg}, which only Alice could produce

CSE331 Fall Preventing Reuse and Alteration To prevent reuse of the signature –Incorporate a timestamp (or sequence number) Alteration –If a block cipher is used, recipient could splice- together new messages from individual blocks. To prevent alteration –Timestamp must be part of each block –Or… use cipher block chaining

CSE331 Fall Digital Signatures with Public Keys Assumes the algorithm is commutative: –D(E(M, K), k) = E(D(M, k), K) Let K A be Alice’s public key Let k A be her private key To sign msg, Alice sends D(msg, k A ) Bart can verify the message with Alice’s public key Works! RSA: (m e ) d = m ed = (m d ) e

CSE331 Fall Digital Signatures with Public Keys k A, K A, K B AliceBart D(msg,k A ) - No trusted 3 rd party. - Simpler algorithm. - More expensive - No confidentiality k B, K B, K A

CSE331 Fall Variations on Public Key Signatures Timestamps again (to prevent replay) Add an extra layer of encryption to guarantee confidentiality –Alice sends K B {D(msg, k A )} to Bart Combined with hashes: –Send {msg, D(Hash(msg), k A )}

CSE331 Fall Protocol Sample Threat Common strategy: –Encrypt for confidentiality. –Sign for integrity. Is it better to sign then encrypt? Or is it better to encrypt then sign? There is a pitfall.

CSE331 Fall Two Possible Messages A sends to B : K B {msg, D(msg,k A )} –B decodes with D(—, k B ) –Verifies with E: K A {D(msg, k B )} = M ? A sends to B : K B {msg}, D(K B {msg}, k A ) –B decodes with D(—, k B ) –Verifies with E: K A {D(K B {msg}, k B )} = K B {msg}?

CSE331 Fall Pitfall Interception Scenario A sends to B : K B {msg}, D(K B {msg}, k A ) –O intercepts O sends to B: K B {msg}, D(K B {msg}, k O ) B might think that msg came from O. Is this really a problem? To be safe: sign then encrypt.