Security 2 Distributed Systems Lecture# 15. Overview Cryptography Symmetric Assymeteric Digital Signature Secure Digest Functions Authentication.

Slides:



Advertisements
Similar presentations
AUTHENTICATION AND KEY DISTRIBUTION
Advertisements

Digital Signatures. Anononymity and the Internet.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Cryptographic Techniques Instructor: Jerry Gao Ph.D. San Jose State University URL: May,
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Chapter 12 Cryptography (slides edited by Erin Chambers)
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Network Security. Information secrecy-only specified parties know the information exchanged. Provided by criptography. Information integrity-the information.
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
9/21/2015B.Ramamurthy1 Security Chapter 7. 9/21/2015B.Ramamurthy2 Introduction What is the security model of your system? There are many issues: 1. Security.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Slides for Chapter 7: Security From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 3, © Addison-Wesley 2001.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
SECURITY Chapter 7.3 – 7.5 Presentation by Deepthi Reddy.
David Evans CS200: Computer Science University of Virginia Computer Science Class 36: Public-Key Cryptography If you want.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Chapter 21 Public-Key Cryptography and Message Authentication.
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Slides for Chapter 11: Security.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Cryptography Deffie hellman. organization Foundations Symmetric key Symmetric key weaknesses Assymmetric key Deffie hellman – key exchange RSA – public.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Digital Signatures.
Slides for Chapter 11: Security
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
CDK: Chapter 7 TvS: Chapter 9
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Presentation transcript:

Security 2 Distributed Systems Lecture# 15

Overview Cryptography Symmetric Assymeteric Digital Signature Secure Digest Functions Authentication

Cyptography Symmetric (secret key): TEA, DES – secret key shared between principals – encryption with non-destructive operations (XOR) plus transpose – decryption possible only if key known – brute force attack (check {M}K for all values of key) hard (exponential in no of bits in key) Asymmetric (public key): RSA – pair of keys (very large numbers), one public and one private – encryption with public key – decryption possible only if private key known – factorising large numbers (over 150 decimal digits) hard

Tiny Encryption Algorithm (TEA) written in C [Wheeler & Needham 1994] How it works key 128 bits (k[0]..k[3]) plaintext 64 bits (2 x 32 bits, text[0], text[1]) in 32 rounds combines plaintext and key, swapping the two halves of plaintext uses reversible addition of unsigned integers, XOR (^ ) and bitwise shift ( >) combines plaintext with constant delta to obscure key Decryption via inverse operations.

Encryption Algo void encrypt(unsigned long k[], unsigned long text[]) { unsigned long y = text[0], z = text[1]; 1 unsigned long delta = 0x9e3779b9, sum = 0; int n; 2 for (n= 0; n < 32; n++) { 3 sum += delta; 4 y += ((z > 5) + k[1]); 5 z += ((y > 5) + k[3]); 6 } text[0] = y; text[1] = z; 7 }

TEA Decryption void decrypt(unsigned long k[], unsigned long text[]) { unsigned long y = text[0], z = text[1]; unsigned long delta = 0x9e3779b9, sum = delta << 5; int n; for (n= 0; n < 32; n++) { z -= ((y > 5) + k[3]); y -= ((z > 5) + k[1]); sum -= delta; } text[0] = y; text[1] = z; }

Other secret key encryption algos TEA – simple & concise, yet secure and reasonably fast DES (The Data Encryption Standard 1977) – US standard for business applications till recently – 64 bit plaintext, 56 bit key – cracked in 1997 (secret challenge message decrypted) – triple-DES (key 112 bits) still secure, poor performance AES (Advanced Encryption Standard) – invitation for proposals 1997 – in progress – key size 128, 192 and 256 bits

Assymetric (Public-private) Rivest, Shamir and Adelman ‘78 How it works – relies on N = P ォ Q (product of two very large primes) – factorisation of N hard – choose keys e, d such that e ォ d = 1 mod Z where Z = (P-1) ォ (Q-1) It turns out... – can encrypt M by Me mod N – can decrypt by Cd mod N (C is encrypted message) Thus – can freely make e and N public, while retaining d

RSA In – Rivest et al thought factorising numbers > would take more than four billion years Now (ca 2000) – faster computers, better methods – numbers with 155 (= 500 bits) decimal digits successfully factorised – 512 bit keys insecure! The future? – keys with 230 decimal digits (= 768 bits) recommended – 2048 bits used in some applications (e.g. defence)

Digital Signatures Why needed? – alternative to handwritten signatures – authentic, difficult to forge and undeniable How it works – relies on secure hash functions which compress a message into a so called digest – sender encrypts digest and appends to message as a signature – receiver verifies signature – generally public key cryptography used, but secret key also possible

Digital Signatures with Public- key Keys – sender chooses key pair Kpub and Kpri; key Kpub made public Sending signed message M – sender uses an agreed secure hash function h to compute digest h(M) – digest h(M) is encrypted with private key Kpri to produce signature S = {h(M)}Kpri; the pair M, S sent Verifying signed message M, S – when pair M, S received, signature S decrypted using Kpub, digest h(M) computed and compared to decrypted signature Note – RSA can be used, but roles of keys reversed.

Secure Digest Functions Based on one-way hash functions: – given M, easy to compute h(M) – given h, hard to compute M – given M, hard to find another M’ such that h(M) = h(M’) Note – operations need not be information preserving – function not reversible Example: MD5 [Rivest 1992][ – 128 bit digest, using non-linear functions applied to segments of source text

Authentication Definition – protocol for ensuring authenticity of the sender Secret-key protocol [Needham & Schroeder ‘78] – based on secure key server that issues secret keys – flaw corrected ‘81 – implemented in Kerberos Public-key protocol [Needham & Schroeder ‘78] – does not require secure key server (7 steps) – flaw discovered with CSP/FDR – SSL (Secure Sockets Layer) similar to it

Needham-Schroeder Authentication Principals – client A (initiates request), server B – secure server S Secure server S – maintains table with name + secret key for each principal – upon request by client A, issues key for secure communication between client A and server B, transmitted in encrypted form (‘ticket’) Messages – labelled by nonces (integer values added to message to indicate freshness)

Problems In step 3 – message need not be fresh... So... – intruder with KAB and {KAB, A}KB (left in cache, etc) can initiate exchange with B, impersonating A – secret key KAB compromised Solution – add nonce or timestamp to message 3, yielding {KAB, A,t}KBpub – B decrypts message and checks t recent – adapted in Kerberos