Protocol Building Blocks 1.Protocols are multi-agent algorithms 2.Agents know protocol 3.Protocol unambiguous, well-defined 4.Protocol complete, action.

Slides:



Advertisements
Similar presentations
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Advertisements

Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Basic Protocols Schneier Ch. Three. Key Exchange w/ Symmetric Crypto 1.Desire A and B on network, sharing secret key with KDC. How??? 2.A request session.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
 Public key (asymmetric) cryptography o Modular exponentiation for encryption/decryption  Efficient algorithms for this o Attacker needs to factor large.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Attacks on Digital Signature Algorithm: RSA
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
1 Chap 1: Introduction Some background –The message is usually represented as M or P (plaintext), the encryption result is usually represented as C (ciphertext).
Cryptography Prof. Seth D. Bergmann Rowan University Computer Science.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Chapter 9 Cryptographic Protocol Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Introduction to Public Key Cryptography
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
Public Key Cryptography July Topics  Symmetric and Asymmetric Cryptography  Public Key Cryptography  Digital Signatures  Digital Certificates.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
May 2002Patroklos Argyroudis1 A crash course in cryptography and network security Patroklos Argyroudis CITY Liberal Studies.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
IT 221: Introduction to Information Security Principles Lecture 6:Digital Signatures and Authentication Protocols For Educational Purposes Only Revised:
Chapter 4: Intermediate Protocols
Authentication and Authorization Authentication is the process of verifying a principal’s identity (but how to define “identity”?) –Who the person is –Or,
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Chapter 2: Protocol Building Blocks
Cryptography, Authentication and Digital Signatures
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
IS 302: Information Security and Trust Week 5: Integrity 2012.
Chapter 3: Basic Protocols Dulal C. Kar. Key Exchange with Symmetric Cryptography Session key –A separate key for one particular communication session.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Based on Schneier Chapter 5: Advanced Protocols Dulal C. Kar.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Week 4 - Wednesday.  What did we talk about last time?  RSA algorithm.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Digital Signatures, Message Digest and Authentication Week-9.
Protocols Chapter 2 Protocol: A series of steps, involving two or more parties, designed to accomplish a task. All parties involved must know the protocol.
1 Needham-Schroeder A --> S: A,B, N A S --> A: {N A,B,K AB,{K AB,A} KBS } KAS A --> B:{K AB,A} KBS B --> A:{N B } KAB A --> B:{N B -1} KAB.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Introduction to Cryptography Summarized from “ Applied Cryptography, Protocols, Algorithms, and Source Code in C ”, 2nd. Edition, Bruce Schneier, John.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
14-1 Last time Internet Application Security and Privacy Basics of cryptography Symmetric-key encryption.
Chapter ADCS CS262/0898/V1 Chapter 3 Applied Cryptography Digital Signature "Vision without action is a daydream. Action without vision is a nightmare"
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Protocol Building Block. INTRODUCTION TO PROTOCOL Protocol? ● Def : Series of steps to accomplish a task with two or more parties Cryptographic protocol?
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Dr. Nermin Hamza.  Attacks:  Traffic Analysis : traffic analysis occurs when an eavesdroppers observes message traffic on network. Not understand the.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Software Security Seminar - 1 Chapter 2. Protocol Building Blocks 발표자 : 최두호 Applied Cryptography.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Basics of Cryptography
NET 311 Information Security
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

Protocol Building Blocks 1.Protocols are multi-agent algorithms 2.Agents know protocol 3.Protocol unambiguous, well-defined 4.Protocol complete, action for any situation 5.Effects limited: can’t do or learn more than protocol specifies

Personalities 1.Alice, Bob, Carol: agents in protocol 2.Eve: eavesdropper 3.Mallory: malicious active attacker 4.Trent: trusted arbitrator 5.Walter: warden to guard A and B 6.Peggy: prover 7.Victor: verifier

Some Protocol Types 1.Arbitrated: trusted 3rd party, maybe computer, in middle. Bottleneck and weakpoint. 2.Adjudicated: executed when there is a dispute. 3.Self-enforcing: guarantees fairness, no disputes, cheating, etc.

Protocol Attacks 1.Attack encryption, algorithm implementations, or protocols. 2.Eavesdropping is a passive attack to gain information -- hard to detect. 3.Active attacks alter protocols, introduce, delete, replay, substitute msgs, impersonate, disrupt, alter. 4.If party attacks protocol, he’s a cheater (active or passive).

Symmetric Key Communication 1.A and B agree on Encryption and Key 2.A encrypts msg with key 3.A sends ciphertext to B 4.B decrypts with key and algorithm.

Symmetric Key Communications Attacks 1.Eve wants to hear key selection and algorithm as well as msg. Key management is big topic 2.Mallory could break cipher, break comm. Channel, replace msgs… 3.Alice could give copy of key to Eve, or copy Bob’s msgs to NY Times…trust! 4.Losing key disastrous.

One Way Function 1.Easy to compute but hard to invert 2.Trapdoor one-way fns have secret key to make inversion easy.

One-way Hash Functions 1.Also called compression fn, checksum, message integrity check. 2.Maps variable-length pre-image to fixed-length hash value…e.g XOR of all input bytes. 3.One-way hash hard to find pre-image for that hash value. 4.Best if no collisions…could verify files same without sending them.

Comms with PK Crypto 1.A and B agree on cryptosystem 2.B sends A his public key 3.A encrypts msg with that key, sends to B. 4.B decrypts with private key. 5.No key management: Asymmetric cryptosystem. Often a database of public keys.

Hybrid Cryptosystems 1.B sends A his private key. 2.A generates random session key K, encrypts with B’s public key, sends to B. 3.B decrypts with his private key, gets K. 4.A and B now use K to encrypt comms 5.No symmetric key sits around long 6.Faster!

Digital Signatures 1.Authentic, Convincing, unforgeable, not reusable, unalterable, non- repudiatable (ideally) (as in seismometers for test-ban compliance monitoring).

Symmetric Ciphers and Arbitrator 1.Trent shares K A with Alice, K B with Bob. 2.A encrypts msg to B with K A, sends to Trent. 3.Trent decrypts msg with K A 4.T encrypts msg, stmt it’s from A thru T, using K B and sends the bundle to B. 5.B decrypts all with K B. Has msg, certification.

Observations on Symm.+Trent 1.T knows msg is from A since her key worked. 2.If B takes T’s certification and pastes it onto another msg “from A” -- B is impersonating T. B can’t supply info justifying his msg (see notes). 3.To forward msg to C need T again. How would you automate T? Security of signature database?

Signing with PK 1.A encrypts doc with her private key, thus “signing” it. 2.A sends signed doc to B. 3.B decrypts doc with A’s public key, thus verifying signature. 4.Signature not reusable since mixed in with doc by the cryptosystem. Altering doc. means it won’t be verified by PK. Timestamps kill future use. Other criteria OK too (check!)

Signing with PK and Hash 1.Why encrypt whole doc? 2.A and B agree on one-way hash fun, signature algorithm 3.A encrypts hash of doc. with her private key. This is signature. 4.A sends doc and signed hash to B 5.B produces hash of doc, decrypts signed hash with A’s public key. If match, valid and signed.

More on signing with hash 1.Here signature separate from doc, so smaller storage requirements. 2.Archive could just store hash, not doc. Can verify you have right doc by comparing hashes. 3.So timestamp +hash means you could copyright document you keep secret!

Multiple Signatures 1.A and B sign separate copies…bulky! 2.OR, A signs, B signs A-signed doc. OK but have to verify both if want to verify A’s sig. 3.One-way hash: A, B sign hash of doc. 4.B sends signature to A 5.A sends doc. and 2 sigs to C 6.C verifies A’s or B’s sig or both.

Repudiation 1.A can repudiate a signature. After signing, she publishes her private key on ur.general and claims it was stolen. 2.Timestamps can help 3.Private keys residing in tamper-proof modules can help. 4.Old signatures should not be invalidated by disputes about recent ones….use Trent.

Digital Signatures & Encryption:envelope & sig 1.A signs msg with private key: S A (M). 2.A encrypts signed msg with B’s PK and sends it to him: E B (S A (M)) 3.B decrypts with private key: D B (E B (S A (M))) = S A (M) 4.B verifies with A’s public key. 5.Different encryption and signing keys make sense: can give up one w/o losing the other. 6.Timestamps can ack receipt.

Signatures and Verification 1.A signs, encrypts: E B (S A (M)). 2.B decrypts, verifies: V A (D B (E B (S A (M)))) = M 3.Bob signs M with his PK, encrypts with A’s PK and sends back: E A (S B (M)). 4.Alice decrypts, verifies B’s sig with his PK, sees its him and he sent back same msg she sent.

Resend Attack 1.If same alg. For encryption and sigs… 2.Mallory in system with own public and private keys. 3.He intercepts and records A’s msg to B. 4.Later he sends it to B, claiming it came from Mallory. Bob decrypts etc. with M’s keys but gets rubbish: E M (D B (E B (D A (M)= E M (D A (M)). 5.BUT he (or his “secure comm. Script”) continues….

Resend Attack Continued 1.So Bob continues, sending Mallory a receipt: E M (D B (E M (D A (M)))) 2.So now M just needs to decrypt with his own key, encrypt with B’s PK, decrypt with his key again, Encrypt with A’s PK, and he’s got M. 3.Foil with != keys for sig, encrypt. Or timestamps so incoming, outgoing msgs ae different, or use hashes.

Public Key Management 1.Need write-protected (but for Trent) public database (don’t want people substituting their keys for yours). 2.M substitutes during transmission? 3.T signs each PK with his private key. Then he’s a Key Dist. Ctr. Or Key Cert. Authority. 4.If A stores the KDC’s public key, suppose M substituted his own PK for it? He could impersonate KDC.

Random Numbers 1.Knuth Vol 2. Still a good reference! 2.Test your favorite RNG…about same number of each digit (1,0), about half the runs of 1 or 0 should be of length 1, 1/4 of length 2, etc. Should not compress. 3.Finite state implies pseudorandom sequence bit periods are possible. 4.Cryptographically secure: unpredictable given algorithm and all previous bits.