04/07/06 1 …x[l]x[2]x[1] VIL CRHF from FIL CRHF: adding IV Build VIL CRHF h:{0,1} *  {0,1} m from FIL CRHF c:{0,1} n  {0,1} m.

Slides:



Advertisements
Similar presentations
Web security: SSL and TLS
Advertisements

Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
Public Key Encryption Algorithm
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Goal Ensure integrity of messages, even in presence of
Hash functions a hash function produces a fingerprint of some file/message/data h = H(M)  condenses a variable-length message M  to a fixed-sized fingerprint.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
The RSA Cryptosystem and Factoring Integers (II) Rong-Jaye Chen.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Csci5233 Computer Security & Integrity 1 Cryptography: Basics (2)
CS470, A.SelcukHash Functions1 Cryptographic Hash Functions CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CS526Topic 5: Hash Functions and Message Authentication 1 Computer Security CS 526 Topic 5 Cryptography: Cryptographic Hash Functions And Message Authentication.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Lecture 15 Lecture’s outline Public algorithms (usually) that are each other’s inverse.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Hashing Algorithms: Basic Concepts and SHA-2 CSCI 5857: Encoding and Encryption.
Chapter 21 Public-Key Cryptography and Message Authentication.
Public-Key Encryption
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
Network Security David Lazăr.
1 Hash Functions. 2 A hash function h takes as input a message of arbitrary length and produces as output a message digest of fixed length
RSA and its Mathematics Behind July Topics  Modular Arithmetic  Greatest Common Divisor  Euler’s Identity  RSA algorithm  Security in RSA.
Cryptographic Hash Functions and Protocol Analysis
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Internet Security CSCE 813 IPsec. CSCE813 - Farkas2 TCP/IP Protocol Stack Application Layer Transport Layer Network Layer Data Link Layer.
1 SSL/TLS. 2 Web security Security requirements Secrecy to prevent eavesdroppers to learn sensitive information Entity authentication Message authentication.
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Data encryption with big prime numbers DANIEL FREEMAN, SLU.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 13.Message Authentication.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Data Integrity / Data Authentication. Definition Authentication (Signature) algorithm - A Verification algorithm - V Authentication key – k Verification.
CS555Spring 2012/Topic 141 Cryptography CS 555 Topic 14: CBC-MAC & Hash Functions.
@Yuan Xue 285: Network Security CS 285 Network Security Hash Algorithm Yuan Xue Fall 2012.
Chapter 12 – Hash Algorithms
Public Key Cryptography
RSA Slides by Kent Seamons and Tim van der Horst
CSE 4905 IPsec.
Chapter 18 IP Security  IP Security (IPSec)
ICS 454 Principles of Cryptography
Virtual Private Networks (VPNs)
Analysis of the RSA Encryption Algorithm
SSL (Secure Socket Layer)
ICS 454 Principles of Cryptography
Encryption INST 346, Section 0201 April 3, 2018.
Virtual Private Networks (VPNs)
Cryptography Lecture 13.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

04/07/ …x[l]x[2]x[1] VIL CRHF from FIL CRHF: adding IV Build VIL CRHF h:{0,1} *  {0,1} m from FIL CRHF c:{0,1} n  {0,1} m 1 st Idea: use iterative process, compressing block by block 2 nd idea: use a fixed IV as first block y 0 =IV  {0,1} m Let the input x=x[1]||… where |x[i]|=(n-m) [i>0] For i=1,..l, let y i =c(x[i],y i-1 ); output h(x)=y l+1 Suppose h(x)=h(x’), x≠x’:  If |x|=|x’|  c(x[i],y i-1 )=c[x’[i],y’ i-1 ) for ≠  Else: collision or preimage for IV (contradiction to OWF?) c IV=y 0 c c h(x)=y l =c(x[l],y l-1 ) IV Construction, notation: IV[c](x)=c(x[2],c(x[1],IV))

04/07/ …|x| x[l]|| 10 k x[2]x[1] Merkle-Damgard VIL Construction Let pad(x)=x||1||0 k ||bin n-m (|x|) Let y 0 =IV be some fixed m bits (IV=Initialization Value) For i=1,..|pad(x)|/(n-m), let y i =c(x[i],y i-1 ) Output MD[c]( x) =IV[c](pad(x))=y l+1 c IV c c c MD[c](x)=y l+1 =c(|x|,y l ) Bounded length, but: 1.Up to |x|=2 n-m 2.Can use bin n-m (|x|/(n-m)) 3.64 bits enough (SHA) 4.Easy to extend to to unbounded length

04/07/ Example: MD5 (Message Digest #5) Developed by RSA Inc. Output is 128 bit  Collisions by birthday paradox: 2 64 time, storage Compression function: Cascade of four 128b+512b  128b compression functions Collisions found  1996: compression function (pseudo-collisions)  2004: full MD5 chosen prefix collision attack  Some results allowing two different prefixes Still widely used, but being `phased out`

04/07/ SHA-1 (Secure Hash Algorithm) Developed by NIST, published as FIPS Output is 160 bit  New versions: 256b, 384b and 512b proposed Widely used; `closed` design process, criteria  Similar design to MD5  160b chaining block  brute force collisions complexity 2 80 Chosen-prefix collisions in 2 63 guesses [W06, WYY05]  Chaining value added (mod 2 32 ) to output of compression m[i] CV[i] CV[i+1] 160b 512b 160b

04/07/06 Exploiting Chosen-Prefix Attacks Hash trees are vulnerable to collision attacks! Recall chosen prefix collision attacks  Allow attacker to chose prefix  Known for MD5, SHA0, others; suspect for SHA1 For any prefix p Attack finds two collisions c, c’ S.t. for any suffix s holds: h(p||c||s)=h(p||c’||s) Implications / exploits?  Colliding, different executables, documents (ps…)  Duplicate `tickets` (sign m=“ticket #”||n, n by subject)

04/07/06 X.509 Public Key Certificates

04/07/06 Sequence Numbers in IP-Sec Send (authenticated) sequence number with packet  Initial number = zero (when SA established)  Sender increments per outgoing packet  Not cyclic: change key before seq# reaches 2 32  Receiver advances to highest received seq# (if MAC Ok) Discard packets identified as replay [why?]  Replay = repeated seq # (within `window`) Deliver out-of-order packets (within `window`)  Since IP does not preserve order  Discard if not within window: block (very) old packets

04/07/06 AH - Authentication Header The Authentication Header AH) authenticates the entire IP packet, including the IP header (except TTL etc.), AH header itself, and the payload 32 bits SPI (Security Parameters Index) Sequence Number Protocol Authentication Data (variable length) Payload length Reserved

04/07/06 ESP – Encapsulating Security Payload SPI Sequence Number Initialization Vector (if needed for encryption) Payload Authentication Tag (MAC) Padding Pad Length Protocol 32 bits Encrypted MAC

04/07/06 Euler Theorem & Function Φ(n) The Euler function of n, denoted Φ(n), is the number of positive integers less than n and co-prime to n. For every prime p holds Φ(p)=p-1 For primes p, q holds Φ(pq)=(p-1)(q-1) Euler’s Theorem: if a, n are co-primes then a Φ(n) =1 mod n  Fermat’s Theorem: if p is primes then a p-1 =1 mod p  Also: a x mod Φ(n) =a x mod n; a 1 mod Φ(n) =a mod n  Also: a -1 =a Φ(n)-1 mod n  easy to compute inverse mod n n Φ(n )

04/07/ Turing Award RSA Public Key Cryptosystem Select two large primes p,q and let n=pq Let Φ(n)=(p-1)(q-1) [Euler function] Select random public exponent e which is prime  Or co-prime to Φ(n), i.e. no common divisor Let d=e -1 mod Φ(n), i.e. ed=1 mod Φ(n).  Find d from Φ(n) with extended Euclidean (GCD) algorithm (simple… see e.g. in Wikipedia)Wikipedia Public key is, private key is d.  Notice: given p,q it is easy to find Φ(n)=(p-1)(q-1) and from it d  Assumption: it is hard to find d (or Φ(n), or p,q ) given only RSA.E e,n (m)=m e mod n RSA.D d,n (c)=c d mod n = (m e ) d = m ed mod n  Euler: m ed = m (1 mod Φ(n)) = m mod n This is called `textbook RSA` (in practice, pad message first)

04/07/06 SSL Handshake – Overview Client Server Possible Cipher-suites, Client_random Chosen cipher-suite, Server_random,Certificate Certificate=SignCA( Encrypted shared key Confirmation (MAC of handshake messages) Client, Server change to new,computed keys (`Cipher Spec`) Confirmation (MAC of handshake messages) Confirms cipher-suites, no replay, client really sent Pre_Master_Secret In order of preference