1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.

Slides:



Advertisements
Similar presentations
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Advertisements

“Advanced Encryption Standard” & “Modes of Operation”
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 ITNS and CERIAS CISSP Luncheon Series: Cryptography Presented by Addam Schroll, CISSP.
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
Cryptography.
Web Security for Network and System Administrators1 Chapter 4 Encryption.
 Stream ciphers o Encrypt chars/bits one at a time o Assume XOR w the key, need long key to be secure  Keystream generators (pseudo-random key) o Synchronous.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
CMSC 414 Computer (and Network) Security Lecture 5 Jonathan Katz.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Modes of Operation CS 795. Electronic Code Book (ECB) Each block of the message is encrypted with the same secret key Problems: If two identical blocks.
EEC-484/584 Computer Networks Lecture 16 Wenbing Zhao
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
K. Salah1 Cryptography Module II. K. Salah2 Data Encryption Standards DES.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Lecture 23 Symmetric Encryption
Chapter 8 Network Security 4/17/2017
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
CN8816: Network Security1 Confidentiality, Integrity & Authentication Confidentiality - Symmetric Key Encryption Data Integrity – MD-5, SHA and HMAC Public/Private.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Chapter 8: Scrambling Through Cryptography Security+ Guide to Network Security Fundamentals Second Edition.
Crypto Bro Rigby. History
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Chapter 8: Scrambling Through Cryptography Security+ Guide to Network Security Fundamentals Second Edition.
Chapter 20 Symmetric Encryption and Message Confidentiality.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Part 9, Basic Cryptography 1. Introduction A cryptosystem is a tuple: ( M,K,C, E,D) where M is the set of plaintexts K the set of keys C the set of ciphertexts.
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Lecture 2: Introduction to Cryptography
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Lecture 23 Symmetric Encryption
Exam 1 Review CS461/ECE422 Fall Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like.
Ln Lou Modern Cyphers. 0. Security System Key Plain Text Cipher Text Encryption (K × P → C) Decryption (K × C → P)
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Network Security Chapter 8 12/13/ Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Cryptography Presented By: Yogita Dey Amardeep Kahali Dipanjan Devnagar Minhaajuddin Ahmad Khan ECE4, NIT Securing the Information Age.
Chapter 8 Network Security.
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Elect. Codebook, Cipher Block Chaining
Presentation transcript:

1 Chapter 4 Encryption

2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms Recognize popular asymmetric encryption algorithms Understand a variety of hash encryption algorithms Identify a variety of cryptanalytic attacks

3 Encryption Basics

4

5 Transposition vs. substitution –With transposition ciphers, data is rearranged –With substitution ciphers, data is replaced Block vs. stream –With block ciphers, data is broken into chunks The encryption algorithm and key are then applied to each chunk –With stream ciphers, the encryption algorithm and key are applied to each piece of data continuously until the entire message is transformed into ciphertext

6 Encryption Basics General Problems –Algorithm privacy –Randomness –Performance –Processing power –Key security

7 Symmetric Encryption A symmetric encryption algorithm is generally defined as a system that uses the same key for both encryption and decryption

8 Symmetric Encryption

9 Digital Encryption Standard (DES) Consists of both an algorithm and a key 56-bit key 16-bit blocks 16 rounds Four operating modes ECB (Electronic Codebook) CBC (Cipher Block Chaining) CFB (Cipher Feedback) OFB (Output Feedback)

10 Symmetric Encryption

11 Symmetric Encryption DES Electronic Codebook (ECB) Block cipher 64-bit blocks 48-bit key Each 48-bit block XORed with 48-bit key

12 Symmetric Encryption DES Cipher Block Chaining (CBC) Block cipher 64-bit blocks 48-bit key First block XORed with random block of data then encrypted Each block XORed with previous 64-bit encrypted block

13 Symmetric Encryption DES Cipher Feedback (CFB) Block cipher 64-bit blocks 48-bit key Random block of 64-bit data encrypted by DES First block of data then XORed with encrypted random data then encrypted using DES Each block XORed with previous 64-bit encrypted block

14 Symmetric Encryption DES Output Feedback (OFB) Block cipher 64-bit blocks 48-bit key Similar to CFB, but does not chain ciphertext Previous DES output is used as input

15 Symmetric Encryption 3DES 168-bit key (effective length) 16-bit blocks 16 rounds Four operation modes DES-EEE3 DES-EDE3 DES-EEE2 DES-EDE2

16 Symmetric Encryption 3DES DES-EEE3 Data encrypted with 3 different keys

17 Symmetric Encryption 3DES DES-EDE3 Data encrypted with Key 1 Data decrypted with Key 2 Data encrypted with Key 3

18 Symmetric Encryption 3DES DES-EEE2 Data encrypted with Key 1 Data encrypted with Key 2 Data encrypted with Key 1

19 Symmetric Encryption 3DES DES-EDE2 Data encrypted with Key 1 Data decrypted with Key 2 Data encrypted with Key 1

20 Symmetric Encryption Advanced Encryption Standard (AES) Rijndael algorithm Variable length key Variable length blocks

21 Symmetric Encryption Commercial algorithms RC2 RC4 RC5 RC6 IDEA Blowfish Twofish

22 Symmetric Encryption Key Management Password-based encryption (PBE) Hardware-based keys Smart cards Biometrics

23 Asymmetric Encryption

24 Asymmetric Encryption

25 Asymmetric Encryption RSA 1.Computes the product of two large primary numbers of equal length: (n = p * q). The length is usually 154-bit or 512-bit. 2.Chooses a random public key, e, so that e < n and relatively prime to the product of (p-1)(q-1). 3.Chooses a random public key component, e, so that e < n and relatively prime to the product of (p-1)(q-1). 4.Computes the private key component, d, using the equation: d = e-1 mod [(p-1)(q-1)]. 5.The private key is then expressed as (d,n) and the public key is expressed as (e,n). To encrypt a message, p, the formula is c = pe mod n where c is the final ciphertext. To decrypt a message, the formula is p = cd mod n.

26 Asymmetric Encryption Digital Signature Standard (DSS) RSA DSA ECDSA

27 Asymmetric Encryption Public-key Infrastructure (PKI) Digital certificate

28 Asymmetric Encryption Public-key Infrastructure (PKI) Certificate authority (CA) Registration authority (RA) Certificate directory Key backup and recovery server

29 Hash Algorithms Message Digest algorithms MD MD2 MD3 MD4 MD5

30 Hash Algorithms

31 Hash Algorithms Secure Hash Algorithm (SHA-1) NIST standard 160-bit digest

32 Cryptanalytic Attacks Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext Brute force Dictionary

33 Cryptanalytic Attacks Man-in-the-middle Meet-in-the-middle Recreate the key Rubber hose

34 Summary Encryption algorithms produce ciphertext through transposition or substitution. There are two major categories of encryption algorithms: block and stream. Four major problems apply to encryption algorithms: algorithms are not tested sufficiently when kept private, computers do not adequately produce random numbers by default, encryption results in reduced performance, and increased processing power can ultimately break encryption.

35 Summary Symmetric encryption uses the same key for both the encryption and decryption processes. DES, 3DES, AES, RC, IDEA, Blowfish, and Twofish are popular symmetric encryption algorithms. PBE, tokens, smart cards, and biometrics offer a number of ways to protect symmetric keys. Asymmetric encryption uses two keys, one key to encrypt the plaintext and the other to decrypt. The Diffie-Hellman Key Exchange, RSA algorithm, and DSS are robust foundations for public-key encryption.

36 Summary PKI is designed to manage the keys necessary to perform public-key encryption. PKI consists of digital certificates, a certificate authority (CA), a registration authority (RA), certificate directory, and a key backup and recovery server. Hash algorithms take a variable plaintext input and produce a fixed length output. The most popular hash algorithms are the MD series and SHA-1 algorithms. Many cryptanalytic attacks pose threats to today’s encryption systems.