Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Sri Lanka Institute of Information Technology
Cryptography and Network Security
Digital Signatures and Hash Functions. Digital Signatures.
Public Key Cryptography & Message Authentication By Tahaei Fall 2012.
Information Security Principles & Applications Topic 4: Message Authentication 虞慧群
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Information Security and Management 11
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Chapter3 Public-Key Cryptography and Message Authentication.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Cryptography and Network Security Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown/Mod. & S. Kondakci.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
SCSC 455 Computer Security
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Lecture 3: Cryptographic Tools
1 Message Authentication and Hash Functions Authentication Requirements Authentication Functions Message Authentication Codes Hash Functions Security of.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Behzad Akbari Spring In the Name of the Most High.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
Message Authentication  message authentication is concerned with: protecting the integrity of a message protecting the integrity of a message validating.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
1 Chapter 11: Message Authentication and Hash Functions Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
Hash Functions A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value h = H(M) Principal object is.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Fall 2002CS 395: Computer Security1 Chapter 11: Message Authentication and Hash Functions.
Chapter 21 Public-Key Cryptography and Message Authentication.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 2 “Cryptographic Tools”.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Cryptographic Hash Functions and Protocol Analysis
Chapter 11 Message Authentication and Hash Functions.
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security
Cryptographic Hash Functions Prepared by Dr. Lamiaa Elshenawy
Cryptography and Network Security (CS435) Part Nine (Message Authentication)
Cryptography and Network Security
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
1 Public Key Cryptography. 2 Public Key Cryptography Agenda: Message authentication – authentication codes and hash functions Public key encryption –
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
CS457 Introduction to Information Security Systems
B. R. Chandavarkar CSE Dept., NITK Surathkal
ICS 454 Principles of Cryptography
ICS 454 Principles of Cryptography
Introduction to Cryptography
Diffie-Hellman Key Exchange
Hash Function Requirements
Digital Signature Standard (DSS)
Message Authentication
Presentation transcript:

Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings

Chapter 3 Public Key Cryptography and Message Authentication

Approaches to Message Authentication Using conventional encryption Symmetric encryption alone is not a suitable tool for data authenticationSymmetric encryption alone is not a suitable tool for data authentication We assume that only the sender and receiver share a key, so only the genuine sender would be able to encrypt a message successfully The receiver assumes that no alterations have been made and that sequencing is proper if the message includes an error detection code and a sequence number If the message includes a timestamp, the receiver assumes that the message has not been delayed beyond that normally expected for network transit Without message encryption An authentication tag is generated and appended to each message for transmissionAn authentication tag is generated and appended to each message for transmission The message itself is not encrypted and can be read at the destination independent of the authentication function at the destinationThe message itself is not encrypted and can be read at the destination independent of the authentication function at the destination Because the message is not encrypted, message confidentiality is not providedBecause the message is not encrypted, message confidentiality is not provided

One-way Hash Functions Accepts a variable-size message M as input and produces a fixed-size message digest H( M ) as outputAccepts a variable-size message M as input and produces a fixed-size message digest H( M ) as output Does not take a secret key as inputDoes not take a secret key as input To authenticate a message, the message digest is sent with the message in such a way that the message digest is authenticTo authenticate a message, the message digest is sent with the message in such a way that the message digest is authentic

Secure Hash Functions Is important not only in message authentication but in digital signaturesIs important not only in message authentication but in digital signatures Purpose is to produce a “fingerprint” of a file, message, or other block of dataPurpose is to produce a “fingerprint” of a file, message, or other block of data To be useful for message authentication, a hash function H must have the following properties:To be useful for message authentication, a hash function H must have the following properties: 1. H can be applied to a block of data of any size. 2. H produces a fixed-length output. 3. H(x) is relatively easy to compute for any given x, making both hardware and software implementations practical. 4. For any given code h, it is computationally infeasible to find x such that H(x) = h. A hash function with this property is referred to as one-way or preimage resistant. 5. For any given block x, it is computationally infeasible to find y with H(y) = H(x). A hash function with this property is referred to as second preimage resistant. This is sometimes referred to as weak collision resistant. 6. It is computationally infeasible to find any pair (x, y) such that H(x) = H(y). A hash function with this property is referred to as collision resistant. This is sometimes referred to as strong collision resistant.

Security of Hash Functions There are two approaches to attacking a secure hash function:There are two approaches to attacking a secure hash function: CryptanalysisCryptanalysis Involves exploiting logical weaknesses in the algorithmInvolves exploiting logical weaknesses in the algorithm Brute-force attackBrute-force attack The strength of a hash function against this attack depends solely on the length of the hash code produced by the algorithmThe strength of a hash function against this attack depends solely on the length of the hash code produced by the algorithm

The sha Secure Hash function SHA was developed by NIST and published as a federal information processing standard (FIPS 180) in 1993SHA was developed by NIST and published as a federal information processing standard (FIPS 180) in 1993 Was revised in 1995 as SHA-1 and published as FIPS 180-1Was revised in 1995 as SHA-1 and published as FIPS The actual standards document is entitled “Secure Hash Standard”The actual standards document is entitled “Secure Hash Standard” Based on the hash function MD4 and its design closely models MD4Based on the hash function MD4 and its design closely models MD4 Produces 160-bit hash valuesProduces 160-bit hash values In 2005 NIST announced the intention to phase out approval of SHA-1 and move to a reliance on SHA-2 by 2010In 2005 NIST announced the intention to phase out approval of SHA-1 and move to a reliance on SHA-2 by 2010

Table 3.1 Comparison of SHA Parameters Note: All sizes are measured in bits.

Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical functions rather than on simple operations on bit patternsBased on mathematical functions rather than on simple operations on bit patterns Is asymmetric, involving the use of two separate keysIs asymmetric, involving the use of two separate keys Public-key encryption is more secure from cryptanalysis than conventional encryption Public-key encryption is a general-purpose technique that has made conventional encryption obsolete There is a feeling that key distribution is trivial when using public-key encryption, compared to the rather cumbersome handshaking involved with key distribution centers for conventional encryption Misconceptions:

Applications for public-key cryptosystems Public-key systems are characterized by the use of a cryptographic type of algorithm with two keys, one held private and one available publiclyPublic-key systems are characterized by the use of a cryptographic type of algorithm with two keys, one held private and one available publicly Depending on the application, the sender uses either the sender’s private key, the receiver’s public key, or both to perform some type of cryptographic functionDepending on the application, the sender uses either the sender’s private key, the receiver’s public key, or both to perform some type of cryptographic function The use of public-key cryptosystems can be classified into three categories: Encryption/decryption The sender encrypts a message with the recipient’s public key Digital signature The sender “signs” a message with its private key Key exchange Two sides cooperate to exchange a session key

Table 3.2 applications for public-key cryptosystems

Diffie-Hellman Key Exchange First published public-key algorithmFirst published public-key algorithm A number of commercial products employ this key exchange techniqueA number of commercial products employ this key exchange technique Purpose of the algorithm is to enable two users to exchange a secret key securely that then can be used for subsequent encryption of messagesPurpose of the algorithm is to enable two users to exchange a secret key securely that then can be used for subsequent encryption of messages The algorithm itself is limited to the exchange of the keysThe algorithm itself is limited to the exchange of the keys Depends for its effectiveness on the difficulty of computing discrete logarithmsDepends for its effectiveness on the difficulty of computing discrete logarithms

Digital Signature standard (DSS) FIPS PUB 186FIPS PUB 186 Makes use of the SHA-1 and presents a new digital signature technique, the Digital Signature Algorithm (DSA)Makes use of the SHA-1 and presents a new digital signature technique, the Digital Signature Algorithm (DSA) Originally proposed in 1991 and revised in 1993 and again in 1996Originally proposed in 1991 and revised in 1993 and again in 1996 Uses an algorithm that is designed to provide only the digital signature functionUses an algorithm that is designed to provide only the digital signature function Unlike RSA, it cannot be used for encryption or key exchangeUnlike RSA, it cannot be used for encryption or key exchange

Elliptic-curve cryptology (ECC) Technique is based on the use of a mathematical construct known as the elliptic curveTechnique is based on the use of a mathematical construct known as the elliptic curve Principal attraction of ECC compared to RSA is that it appears to offer equal security for a far smaller bit size, thereby reducing processing overheadPrincipal attraction of ECC compared to RSA is that it appears to offer equal security for a far smaller bit size, thereby reducing processing overhead The confidence level in ECC is not yet as high as that in RSAThe confidence level in ECC is not yet as high as that in RSA

Summary Approaches to message authenticationApproaches to message authentication Authentication using conventional encryptionAuthentication using conventional encryption Message authentication without message encryptionMessage authentication without message encryption Secure hash functionsSecure hash functions Hash function requirementsHash function requirements Security of hash functionsSecurity of hash functions Simple hash functionsSimple hash functions The SHA secure hash function SHA-3The SHA secure hash function SHA-3 Digital signaturesDigital signatures Public-key cryptography principlesPublic-key cryptography principles Public-key encryption structure Applications for public-key cryptosystems Requirements for public-key cryptography Public-key cryptography algorithmsPublic-key cryptography algorithms The RSA public-key encryption algorithm Diffie-Hellman key exchange Other public-key cryptography algorithms