Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.

Slides:



Advertisements
Similar presentations
Encipherment Using Modern Symmetric-Key Ciphers. 8.2 Objectives ❏ To show how modern standard ciphers, such as DES or AES, can be used to encipher long.
Advertisements

Modern Symmetric-Key Ciphers
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Sri Lanka Institute of Information Technology
Cryptography and Network Security Chapter 3
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Principles of Information Security, 2nd edition1 Cryptography.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Applied Cryptography for Network Security
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Lecture 23 Symmetric Encryption
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Decryption Algorithms Characterization Project ECE 526 spring 2007 Ravimohan Boggula,Rajesh reddy Bandala Southern Illinois University Carbondale.
Encryption Methods By: Michael A. Scott
Network Security Sorina Persa Group 3250 Group 3250.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Cryptography, Authentication and Digital Signatures
Chapter 20 Symmetric Encryption and Message Confidentiality.
Fall 2002CS 395: Computer Security1 Chapter 11: Message Authentication and Hash Functions.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Lecture 2: Introduction to Cryptography
Chapter 11 Message Authentication and Hash Functions.
Lecture 23 Symmetric Encryption
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Chapter 2 Symmetric Encryption.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Network Security Celia Li Computer Science and Engineering York University.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
SYMMETRIC ENCRYPTION.
Presentation transcript:

Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system and network security –Relate security services to security attacks –Describe the basic operation of encryption through Feistel cypher structure –Compare different symmetric encryption algorithms: DES and AES –Design a simple encryption algorithm

Security Internet Management & Security 06 Introduction With the high availability of resources on the Internet, security has become a very relevant issue. The main aim is to protect the resources on the Internet so that they cannot: –Be accessed –Be changed –Be deleted by non-authorised or malicious users

Security Internet Management & Security 06 Vulnerability of systems and networks A B C D Malicious user Malicious user Malicious user Malicious user

Security Types of Security Attacks Attacks can be categorised as : – Passive Security Attacks – Active Security Attacks Internet Management & Security 06

Security Internet Management & Security 06 Passive security attacks A passive attack is an attack where an unauthorized attacker monitors or listens in on the communication between two parties.

Security Internet Management & Security 06 Passive security attacks Passive attacks –Obtain information being transmitted or stored in a system –Do not alter the contents of messages or files –Difficult to detect Solution: –Prevent the attack: data confidentiality –Encrypt information, strongly authenticate access

Security Internet Management & Security 06 Active security attacks Active attacks requires the attacker to be able to transmit data to one or both of the parties, or block the data stream in one or both directions. –Modify or delete data stored or being transmitted Masquerade Replay Modification Denial of service –Easier to detect –Harder to prevent

Security Internet Management & Security 06 Active security attacks –the attacker can stop all or parts of the data sent by the communicating parties. –This attacker can e.g. try to take the place of the client (or server) when the authentication procedure has been performed. –Without integrity checks of the received data, the server will not detect that the origin of the data is not the authenticated person. –A clever programmer can, with not to much effort, implement a system like this on a computer acting as a gateway (bridge) between two subnets.

Security Internet Management & Security 06 Active security attacks The following are examples of different attacks this person could impose. –Inserting his own data into the data stream. –Playback of data from another connection. –Playback of data that had previously been sent in the same and opposite direction on the same connection. –Deletion of data. –Man-in-the-middle attack. The man-in-the-middle-attack is an attack where the intruder sits in the middle of the communication link, intercepting messages and substituting them with his own messages. In this way, he tries to fool the parties to believe they are talking to each other directly, while they really are talking to the attacker him-selves.

Security Internet Management & Security 06 Active security attacks Solution: –Authentication –Access control –Data confidentiality –Data integrity –Non-repudiation –Availability

Security Internet Management & Security 06 Conclusions Security strategies are important because they: –help maintain good performance of resources on a network –guarantee users that their information is safe and private –deter potential attacks on resources

Security Internet Management & Security 06 Resources Stallings W., Network Security Essentials, 2 nd Edition, Prentice Hall, 2002 (Chapter 1) RFC 2828 Internet Security Glossary /node1.html

Security Internet Management & Security 06 Cryptography Cryptography modifies the content of a message according to a predetermined pattern only known by sender and receiver with the aim to prevent other parties from reading the content An encrypted message is: 1 Transformed 2 Transmitted 3 Unchanged The predetermined pattern or key needs to be transmitted separately

Security Internet Management & Security 06 Symmetric cryptography Process of cryptography: Message Encryption algorithm Secret key Cipher text Decryption algorithm (the success of the process relies on the secrecy of the key, but it must be known by the sender and the receiver)

Security Cryptography on the Internet Internet Management & Security 06 An iterated block cipher maybe be used to get a few rounds of security

Security Internet Management & Security 06 Iterated Block Cipher An iterated block cipher is one that encrypts a plaintext block by a process that has several rounds. In each round, the same transformation or round function is applied to the data using a subkey. The set of subkeys are usually derived from the user-provided secret key by a key schedule. The number of rounds in an iterated cipher depends on the desired security level and the consequent trade-off with performance. In most cases, an increased number of rounds will improve the security offered by a block cipher, but for some ciphers the number of rounds required to achieve adequate security will be too large for the cipher to be practical or desirable.

Security Internet Management & Security 06 Feistel Cipher Feistel ciphers are a special class of iterated block ciphers where the cipher text is calculated from the plaintext by repeated application of the same transformation or round function. Feistel ciphers are also sometimes called DES-like ciphers. In a Feistel cipher, the text being encrypted is split into two halves. The round function f is applied to one half using a subkey and the output of f is exclusive- ored with the other half. The two halves are then swapped. Each round follows the same pattern except for the last round where there is no swap. A nice feature of a Feistel cipher is that encryption and decryption are structurally identical, though the subkeys used during encryption at each round are taken in reverse order during decryption. It is possible to design iterative ciphers that are not Feistel ciphers, yet whose encryption and decryption (after a certain re-ordering or re-calculation of variables) are structurally the same

Security Internet Management & Security 06 Feistel Cipher Structure Let F be the round function and let be the sub-keys for the rounds respectively. Then the basic operation is as follows: Split the plaintext block into two equal pieces, (L 0, R 0 )For each round, compute. Then the ciphertext is (Rn,Ln). (Commonly the two pieces Rn and Ln are not switched after the last round.)Decryption of a ciphertext (Rn,Ln) is accomplished by computing for Then (L 0,R 0 ) is the plaintext again.

Security Internet Management & Security 06 Data Encryption Standard (DES) An algorithm described in this standard specifies both enciphering and deciphering operations which are based on a binary number called a key. A key consists of 64 binary digits ("O"s or "1"s) of which 56 bits are randomly generated and used directly by the algorithm. The other 8 bits, which are not used by the algorithm, are used for error detection. The 8 error detecting bits are set to make the parity of each 8-bit byte of the key odd, i.e., there is an odd number of "1"s in each 8-bit byte1. Authorised users of encrypted computer data must have the key that was used to encipher the data in order to decrypt it. The encryption algorithm specified in this standard is commonly known among those using the standard. The unique key chosen for use in a particular application makes the results of encrypting data using the algorithm unique. Selection of a different key causes the cipher that is produced for any given set of inputs to be different. The cryptographic security of the data depends on the security provided for the key used to encipher and decipher the data.

Security Internet Management & Security 06 Data Encryption Standard (DES) Data can be recovered from cipher only by using exactly the same key used to encipher it. Unauthorised recipients of the cipher who know the algorithm but do not have the correct key cannot derive the original data algorithmically. However, anyone who does have the key and the algorithm can easily decipher the cipher and obtain the original data. A standard algorithm based on a secure key thus provides a basis for exchanging encrypted computer data by issuing the key used to encipher it to those authorized to have the data.

Security Internet Management & Security 06 Data Encryption Standard (DES) It is a symmetric block cipher algorithm: 64 bit code 56 bit key Sixteen rounds (iterations), hence 16 subkeys need to be generated Advantages: No one has found a fatal weakness of the algorithm Disadvantages: It has been broken by “brute-force” (2 56 possible keys) in 1998 by the Electronic Frontier Foundation with their DES-cracker

Security Internet Management & Security 06 Triple DES What we all call Triple DES is EDE (encrypt, decrypt, encrypt). The way that it works is that you take three 56-bit keys, and encrypt with K1, decrypt with K2 and encrypt with K3. There are two-key and three-key versions. Think of the two-key version as merely one where K1=K3. Note that if K1=K2=K3, then Triple DES is really Single DES.

Security Internet Management & Security 06 Triple DES The same as DES but it uses three executions of the full DES algorithm with three different keys Used in financial applications C=E K 3 [D K 2 [E K 1 [P]]] C – cipher text P – plaintext E K [X] – encryption of X using key K D K [X] – decryption of X using key K Advantage – effective key of 128 bits Disadvantage – more processing power needed

Security Internet Management & Security 06 Advanced Encryption Standard (AES) AES – first thought of to replace 3DES with a lighter algorithm that provides the same security as 3DES Block length – 128 bits Supports keys of – 128, 192 and 256 bits (most common key is 128) NOT a Feistel structure

Security Internet Management & Security 06 AES

Security Internet Management & Security 06 AES

Security Internet Management & Security 06 AES

Security Internet Management & Security 06 AES

Security Internet Management & Security 06 Other symmetric algorithms IDEA Blowfish RC5

Security Internet Management & Security 06 Conclusions Encrypted information has more probabilities of remaining private Most common symmetrical encryption algorithms use Feistel’s cipher The length of the block and the key determine the efficiency of the cipher based algorithms AES solves the problem of processing power and key sizes The transmission of the key remains a problem

Security Internet Management & Security 06 Resources Stallings W., Network Security Essentials, 2 nd Edition, Prentice Hall, 2002 (Chapter 2) FIPS Advanced Encryption Standard, FIPS DES Data Encryption Standard, 2.htmhttp:// 2.htm