Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.

Slides:



Advertisements
Similar presentations
MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
Advertisements

Encipherment Using Modern Symmetric-Key Ciphers. 8.2 Objectives ❏ To show how modern standard ciphers, such as DES or AES, can be used to encipher long.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Cryptography Basic (cont)
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Introduction to Public Key Cryptography
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Cryptography Lecture 1: Introduction Piotr Faliszewski.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Chapter 8: Scrambling Through Cryptography Security+ Guide to Network Security Fundamentals Second Edition.
Information Systems Security
Cryptography, Authentication and Digital Signatures
Public-Key Cryptography CS110 Fall Conventional Encryption.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Security: An Overview of Cryptographic Techniques /440 With slides from: Debabrata Dash, Nick Feamster, Gregory Kesden, Vyas Sekar and others.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Network Security David Lazăr.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
1 The Elements of Cryptography Chapter 7 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall.
1 The Elements of Cryptography Chapter 7 Copyright 2003 Prentice-Hall.
Lecture 2: Introduction to Cryptography
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Lecture 23 Symmetric Encryption
1 Part 3: Cryptography u Large Numbers u Random Numbers u Cryptographic Hashes u Symmetric Encryption u Asymmetric Encryption (public keys) u Digital Signatures.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Message Authentication Codes CSCI 5857: Encoding and Encryption.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Basics of Cryptography
Computer Communication & Networks
NET 311 Information Security
Presentation transcript:

Cryptography (continued)

Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m

Kerckhoff’s Principle Bob needs two things to decrypt the ciphertext – the decryption algorithm and the key The security of the encryption method depends only on the secret of the key, not on the security of the algorithm(s) –Algorithms are hard to change whereas key are not –Protects the longevity of the algorithm –If the cryptographic systems is built for multiple (millions of) users everyone uses the same algorithm but different keys Public algorithms are amenable to more robust testing Moral – Don’t trust proprietary crypto systems

Four Issues Confidentiality Authentication Integrity Non-repudiation

Confidentiality Assures that encrypted files can only be decrypted by those who hold the secret key What’s missing? –Who is on the other end of the line? –Has the file you received been tampered with?

Authentication Who is on the other end? Challenge response 1)Pick a random number 2)Challenge the computer sending you a message to encrypt it using the secret key 3)If successful, authentication has occurred Note re. the randomness of random numbers

Integrity Also known as message authentication and digital fingerprinting Message Authentication Codes (MACs) –Use a hashing algorithm –Use one way compression so for example a 50MB document produces a 8B MAC –Avalanche effect

Non-repudiation Assurance that a sender cannot deny a file was sent Not possible with a shared secret key

Some Attacks Ciphertext only Known plaintext Chosen plaintext Chosen ciphertext Birthday and Meet in the Middle attacks

Block Ciphers An encryption function for fixed sized blocks (today 128 bits). Blocks are split into words, usually 32 bits Common key sizes – 128 and 256 bits Algorithms consist of multiple rounds of operations on words, e.g. Boolean operations AND, XOR, NOT

Block Cipher Examples DES – 64 bit block size, 56 bit key AES – NIST RFP from Crypto community. Winner was Rijndael Twofish – AES finalist Serpent – AES finalist All support 128, 192, and 156 bit keys. Larger than 128 bits is necessary to avoid collision attacks.

Hashing A hash uses a secret key and an algorithm to create a new value from a message of a fixed size. Also known as a message digest. Should be a one way function. Should have collision resistance.

Hashing Example Example – key = 194, plain text = 45678, Multiply by 194 = , Reverse the number = , Take the 5 most significant digits = Send the hash (23516) along with the message (45678)

Secret Key Exchange Distribution and escrow Vulnerability of a trusted 3 rd party

Public Exchange of Secret Keys Exchange a file of (key, serial #) pairs 1)Pick one 2)Send serial number 3)Use associated key to encrypt and decrypt Encrypt the file using a single key and a known algorithm 1)Decrypt the file 2)Pick a pair 3)Send serial # 4)Use associated key to encrypt and decrypt

Public Exchange of Secret Keys (cont.) Encrypt each pair in the file separately 1)Pick a pair and decrypt it 2)Send the serial # 3)Use the associated key to encrypt and decrypt

Asymmetric Ciphers (e.g. Diffie-Hellman) Keys for encryption and decryption are different, but related A key made publicly is shared How does it work?

Public Key Encryption Math Inverse operations Inverse numbers Circle analogy Modular arithmetic Primes and relative primes

PK Math 1)Pick p and q that are relatively prime 2)n = p*q 3)Find d and e where d*e = (p-1)(q- 1)+1 4)The receiver makes n and e public 5)Encryption m e mod n = c 6)Decryption c d mod n = m

PK Example 1)p = 17, q = 5, n = 85 2)d * e = (17 – 1)(5 – 1) + 1 = 65, d = 13, e = 5 3)Encrypt the letter x, x = 24

PGP Developed by Phil Zimmerman Used RSA patented algorithms to produce freeware strong encryption Copied widely around the world MIT published PGP code and made it available on their websites

Steganography Steganography means hidden writing Hiding a message in an image Ancient technique

Steganography Steganography - hiding a message in an image or a sound file Every image is made of pixels There often is one byte per pixel for each color: red, green, and blue One bit in each byte is the least significant— changing it will be indistinguishable to the human eye

Uses of Steganography Al-Qaida Digital Watermarking Using steganography to hide identifying information in a document To prove copyright ownership To identify different copies of a document

Replay Attacks –Retransmit an intercepted message –Message is encrypted so that replay attacker cannot read it Why Replay Attacks –Repetition might work—for instance, replaying an encrypted username and password might result in access to a poorly designed system

Replay Attacks Preventing Replay Attacks –Insert a time stamp in messages and accept messages only if they are very recent –Insert a sequence number in each message –Insert a nonce (random number selected for the occasion) in a request message; only accept a reply message with the same nonce. Other party does not accept a request message with a previous nonce