Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
Public Key Cryptography & Message Authentication By Tahaei Fall 2012.
1 Authentication Applications Digital Signatures Security Concerns X.509 Authentication Service Kerberos Based on slides by Dr. Lawrie Brown of the Australian.
Public Key Algorithms …….. RAIT M. Chatterjee.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Public Key Cryptography and the RSA Algorithm
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
Chapter3 Public-Key Cryptography and Message Authentication.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
PULIC –KEY CRYPTOGRAPHY AND MESSAGE AUTHENTICATION.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Behzad Akbari Spring In the Name of the Most High.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Prime Numbers Prime numbers only have divisors of 1 and self
Network and Communications Network Security Department of Computer Science Virginia Commonwealth University.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Network Security Lecture 17 Presented by: Dr. Munam Ali Shah.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Midterm Review Cryptography & Network Security
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
453 Network Security Section 3b: Message Authentication and Public-Key Cryptography Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology -
Chapter 21 Public-Key Cryptography and Message Authentication.
Information Security -- Part II Public-Key Encryption and Hash Functions Frank Yeong-Sung Lin Information Management Department National Taiwan University.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
CSCE 815 Network Security Lecture 8 SHA Operation and Kerberos.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
IT 221: Introduction to Information Security Principles Lecture 4: Public-Key Cryptography For Educational Purposes Only Revised: September 15, 2002.
Cryptography and Network Security Public Key Cryptography and RSA.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively as the true name and the good name, or the.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
1 Public Key Cryptography. 2 Public Key Cryptography Agenda: Message authentication – authentication codes and hash functions Public key encryption –
Public Key Encryption ● Diffie and Hellman – 1976 Famous Paper: New Directions In Cryptography New Directions In Cryptography ● First revolutionary.
Asymmetric-Key Cryptography
1. Public Key Encryption (A Simple Case)
Public-Key Cryptography and Message Authentication
Public-Key Cryptography and Message Authentication
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Introduction to Cryptography
Presentation transcript:

Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Public-Key Cryptography Principles The use of two keys has consequences in: key distribution, confidentiality and authentication. The scheme has six ingredients –Plaintext –Encryption algorithm –Public and private key –Ciphertext –Decryption algorithm Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Encryption using Public-Key system Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Authentication using Public- Key System Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Applications for Public-Key Cryptosystems Three categories: –Encryption/decryption: The sender encrypts a message with the recipient’s public key. –Digital signature: The sender ”signs” a message with its private key. –Key exchange: Two sides cooperate to exhange a session key. Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Requirements for Public Key Cryptography 1.Computationally easy for a party B to generate a pair (public key KU b, private key KR b ) 2.Easy for sender to generate ciphertext: 3.Easy for the receiver to decrypt ciphertect using private key: Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Requirements for Public Key Cryptography 4.Computationally infeasible to determine private key (KR b ) knowing public key (KU b ) 5.Computationally infeasible to recover message M, knowing KU b and ciphertext C 6.Either of the two keys can be used for encryption, with the other used for decryption: Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Public Key Algorithms- RSA RSA (1977, Ron Rivest, Adi Shamir and Len Adleman), MIT Most popular and widely implemented Block cipher Plain text and cipher text are integers between 0 and (n-1) for some n Based on factorising large integers –C = M e mod n –M = C d mod n Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Public key Algorithms- RSA Both sender and receiver know n and e Only receiver knows d Public key = {e,n} Private key = {d,n} Requirements –Should be possible to find e, d, n such that M ed = M mod n for all M < n Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Requirements continued… Easy to calculate M e and C d for all M < n Infeasible to determine d, given e and n First two requirements are easy. Third one is also possible if e, n are large Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

The RSA Algorithm – Key Generation 1.Select p,q p and q both prime 2.Calculate n = p x q 3.Calculate temp = (p-1)(q-1) 4.Select integer e 1 < e < temp and relatively prime 5.Calculate dde mod (temp) = 1 6.Public KeyK U = {e,n} 7.Private keyK R = {d,n} Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Example of RSA Algorithm Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Another Public Key Algorithm Diffie-Hellman Used for key exchange First introduced by Diffie-Hellman in 1976 Like RSA, uses athematical functions (rather than simple operations on bit patterns as in DES) Effective because of the difficulty in computing discrete logarithms Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Diffie-Hellman basics AliceBob Pick secret, random X Pick secret, random Y g y mod p g x mod p Compute k=(g y ) x =g xy mod p Compute k=(g x ) y =g xy mod p Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Diffie-Hellman Key Echange Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Other Public-Key Cryptographic Algorithms Digital Signature Standard (DSS) –Makes use of the SHA-1 –Not for encryption or key echange Elliptic-Curve Cryptography (ECC) –Good for smaller bit size –Low confidence level, compared with RSA –Very complex Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Digital signatures A digital signature is an encryption of a document with the creator’s private key It is attached to a document that validates the creator of the document Any one can validate it by decrypting the signature with the claimed creator’s public key Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Some Misconceptions Some misconceptions, corrected –Public key cryptography is NOT more secure than symmetric key –Public key cryptography does NOT Makes symmetric key obsolete –Central agent is needed for both public key and conventional cryptography Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Alternatively…. Digital signatures on hashes A more efficient way for a digital signature is by creating an authenticator of the document first (a hash) Then sign the hash (i.e. encrypt the hash using private key) If M is the message (or document) and Alice wants Bob to be certain that M is from her. M is not confidential –H = Hash(M) –Authenticator = E KR A i.e. encrypting H with Alice’s private key Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Digital Signatures: The basic idea ? private key public key AliceBob Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Key management Distribution of public keys –Well, what’s the issue? –Can’t we just trust Mallory if she claims a key as her public key? ? private key public key AliceBob Mallory Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Public keys to exchange secret keys Using public-keys to exchange secret keys –why exchange secret keys? –aren’t public keys sufficient? Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Authenticity of public keys ? Problem: How does Alice know that the public key she received is really Bob’s public key? private key Alice Bob public key Bob’s key Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Public-key certificates Anyone can forge public-keys Therefore, use public-key certificates A public-key certificate is a public-key that was signed by a trusted third party (called a certificate authority or CA) See figure on next slide Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Key Management Public-Key Certificate Use Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW