Network Security Philadelphia UniversityAhmad Al- Ghoul 2010-20111 Module 3 Encryption Protocols and Practices  MModified by :Ahmad Al Ghoul  PPhiladelphia.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptographic Technologies
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Cryptography and Network Security Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown/Mod. & S. Kondakci.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Encryption Methods By: Michael A. Scott
Network Security Sorina Persa Group 3250 Group 3250.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Public Key Model 8. Cryptography part 2.
Chapter 31 Network Security
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Secure Electronic Transaction (SET)
Message Authentication  message authentication is concerned with: protecting the integrity of a message protecting the integrity of a message validating.
1 Chapter 11: Message Authentication and Hash Functions Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
IT 221: Introduction to Information Security Principles Lecture 6:Digital Signatures and Authentication Protocols For Educational Purposes Only Revised:
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
4. Using Encryption Wisely U NIVERSITY THE of ULSA T Sujeet Shenoi Center for Information Security Department of Computer Science University of Tulsa,
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Chapter 2: Protocol Building Blocks
Cryptography, Authentication and Digital Signatures
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Fall 2002CS 395: Computer Security1 Chapter 11: Message Authentication and Hash Functions.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Network Security David Lazăr.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices (Part B)
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Chapter 11 Message Authentication and Hash Functions.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
Private key
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Software Security Seminar - 1 Chapter 2. Protocol Building Blocks 발표자 : 최두호 Applied Cryptography.
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Basics of Cryptography
Computer Communication & Networks
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
CDK: Chapter 7 TvS: Chapter 9
Digital Signatures Reference: Pfleeger , Charles P., Security in Computing, 2nd Edition, Prentice Hall, /7/2019 Ref: Pfleeger96, Ch.4.
Cryptographic Protocols
Presentation transcript:

Network Security Philadelphia UniversityAhmad Al- Ghoul Module 3 Encryption Protocols and Practices  MModified by :Ahmad Al Ghoul  PPhiladelphia University  FFaculty Of Administrative & Financial Sciences  BBusiness Networking & System Management Department  RRoom Number  E Address:

Network Security Philadelphia UniversityAhmad Al- Ghoul Objectives  Definition of Prtocol.  Types Of Protocols.  Key Distribution.  Digital Signature.  Key Escrow.  Voting By Computer.  Oblivious Transfer.  Certified Mail.

Network Security Philadelphia UniversityAhmad Al- Ghoul Definition of Protocols  Definition of Protocols –A protocol is an orderly sequence of steps two or more parties take to accomplish some task  A good protocol has the following  Characteristics –Established in advance: the protocol is completely designed before it is used. –Mutually subscribed: all parties to the protocol agree to follow its steps, in order. –Unambiguous: no party can fail to follow a step properly because the party has misunderstand the step. –Complete: for every situation that can occur there is a prescribed action to be taken.

Network Security Philadelphia UniversityAhmad Al- Ghoul Protocols  Protocols are also used in computer- to – computer communication. A computer needs to know when to “speak”, when to “listen”, with whom it is communicating, whether it has received all of a particular communication, and so forth. In a two- computer communication, both computers must follow the same protocol in order for either to participate.

Network Security Philadelphia UniversityAhmad Al- Ghoul Kinds of Protocols  Certain task, such as negotiating contracts, voting, distributing information, are simple human activities. However, many of these tasks depend on a witness to ensure fairness.  We must develop protocols by which two suspicious parties can interact with each other and be convinced of fairness.

Network Security Philadelphia UniversityAhmad Al- Ghoul Kinds of Protocols  Process vs. Mechanism –protocols separate the process of accomplishing a task from the mechanism by which it is done –a protocol specifies only the rules of behavior we verify the correctness of the process at a high level –after becoming convinced of the correctness of the design, we implement the protocol using some mechanism using some particular language or encryption system we need only verify that the mechanism correctly reflects the design we can later change the implementation without affecting the design

Network Security Philadelphia UniversityAhmad Al- Ghoul Kinds of Protocols  Fairness –in order to use computers more effectively, we must develop protocols by which two suspicious parties can interact with each other and be convinced of fairness  Types of Protocols –Arbitrated Protocols –Adjudicated Protocols –Self-Enforcing Protocols

Network Security Philadelphia UniversityAhmad Al- Ghoul Types of Protocols  Arbitrated Protocols  In a computer protocol arbiter is a trustworthy third party who ensures fairness. The arbiter might be a person, a program, or a machine. For example, in a network an arbiter might be a program running on one machine of the network. The program receives and forwards messages between users. The user trust that when the arbiter forwards a message saying it comes from A, the message really did come from user A.the notion of an arbiter is the basis for type of secure protocol called an arbitrated protocol.

Network Security Philadelphia UniversityAhmad Al- Ghoul Arbitrated Protocols disadvantages  1- The two sides may not be able to find a neutral third party that both sides trust. Suspicious users are rightfully suspicious of unknown arbiter in a network.  2- Maintaining the availability of an arbiter represents a cost to the users or the network ; that cost may be high.  3- Arbitration causes a time delay in communication because a third party must receive, act on, and then forward every transaction.  4- If the arbitration service is heavily used, it may become a bottleneck in the network as many users try to access a single arbiter.  5- Secrecy becomes vulnerable, because the arbiter has access to much sensitive information.

Network Security Philadelphia UniversityAhmad Al- Ghoul Types of Protocols  Adjudicated Protocols Its disinterested third party to judge fairness based on evidences. Not only can a third party determine whether two parties acted fairly, that is, within the rules of the protocol, but third party can also determine who cheated. Adjudicated protocols involve the services of a third party only in case of a dispute. Therefore, they are usually less costly, in terms of machine time or access to a trusted third party software judge, than arbitrated protocols. However, adjudicated protocols detect a failure to cooperate only after the failure has occurred

Network Security Philadelphia UniversityAhmad Al- Ghoul Types of Protocols  Self-Enforcing Protocols Is one that guarantees fairness. If either party tries to cheat, that fact becomes evident to the other party. No outsider is needed to ensure fairness.

Network Security Philadelphia UniversityAhmad Al- Ghoul Kinds of Protocols

Network Security Philadelphia UniversityAhmad Al- Ghoul Protocols to Solve Problems  When two humans interact directly, they do so differently than if there is a computer between them. Although there may be differences in the approach, we want to devise protocols for the automated environment by which people can carry out everyday tasks.  The following problems will be considered  Voting by Computer  Oblivious Transfer  Contract Signing  Certified Mail

Network Security Philadelphia UniversityAhmad Al- Ghoul Digital Signature  A digital signature is a protocol that produces the same effect as a real signature –two primary conditions Unforgeable: if a person P signs message M with signature S(P,M), it is impossible for anyone else to produce the pair [M,S(P,M)] Authentic: if a person R receives the pair [M,S(P,M)] each one from P, R can check that the signature is really from P. only P could have created this signature, and the signature is firmly attached to M

Network Security Philadelphia UniversityAhmad Al- Ghoul Digital Signature –two desirable conditions not alterable:after being transmitted, M cannot be changed by S,R, or an interceptor. not reusable: a pervious message presented will instantly detected by R

Network Security Philadelphia UniversityAhmad Al- Ghoul Cryptography  Why? –The word cryptography comes from the Greek: Kruptos which means hidden Graphien which means to write –Cryptography is the art of encoding data by means of the encryption process. –To satisfy the following needs: Authentication Confidentiality Integrity Non-repudiation

Network Security Philadelphia UniversityAhmad Al- Ghoul Cryptography  A few definitions (cont’d)! –Encryption Algorithm: A series of operations used to encrypt and decrypt data –Encryption Key: A sequence of symbols used by the encryption algorithm when data encryption and decryption takes place. Without it, it is impossible to return to plaintext. –Cryptology: Cryptology is a mathematical science comprising two streams: cryptography and cryptanalysis. –Cryptanalysis: The opposite of cryptography, cryptanalysis seeks weaknesses in order to decrypt ciphertext.

Network Security Philadelphia UniversityAhmad Al- Ghoul Cryptography –Regular text algorithm crypto-text Algorithm only –Secret and vulnerable algorithm Algorithm + key = lock –Public algorithm remains secure. –The key is the key to the secret. Plaintext Algorithm Ciphertext Encryption key

Network Security Philadelphia UniversityAhmad Al- Ghoul Cryptography  Limitations of the public key –Keys that are shorter than 512 bits (154 digits) are not secure –1,024 is ideal (308 digits) –Keys can be distributed or reset on a public key server –Key authentication is necessary

Network Security Philadelphia UniversityAhmad Al- Ghoul

Network Security Philadelphia UniversityAhmad Al- Ghoul Cryptography  Examples of encryption algorithms… –Asymmetrical: (or public key) RSA ElGamal DSA –Symmetrical: (or secret key) DES and triple DES (3DES) IDEA RC-4, RC-5, RC-6 AES

Network Security Philadelphia UniversityAhmad Al- Ghoul Cryptography  Digital signatures  Objective: to ensure the integrity of the data and the authentication of the message  Characteristics: authentic, unalterable, cannot be re- used or copied –The signature is a cryptography. –The signature is different every time. –Operates in the same manner as encrypted public keys

Network Security Philadelphia UniversityAhmad Al- Ghoul Cryptography  Key management  … involves five major steps: –Generates keys that are difficult to crack –Distributes them in a secure manner –Certifies that they are usable –Protects them at the time of their use –Revokes them when they are compromised

Network Security Philadelphia UniversityAhmad Al- Ghoul Cryptography  Key management –Generates keys that are difficult to crack =

Network Security Philadelphia UniversityAhmad Al- Ghoul

Network Security Philadelphia UniversityAhmad Al- Ghoul Cryptography  Key management –Certifies that they are usable –Protects them at the time of their use –Revokes them when they are compromised

Network Security Philadelphia UniversityAhmad Al- Ghoul Cryptography  Secret key management KDC computer pirate shared key shared key shared key shared key shared key

Network Security Philadelphia UniversityAhmad Al- Ghoul Cryptography  Digital certificates –Digital certificates are electronic folders containing the public key and information on the user as well as the CA’s signature. –The following information is found on a X.509 certificate: The certificate’s version number The certificate’s serial number The algorithm used to sign the certificate The certificate’s issuer The certificate’s retention period The public key issuer Information on the public key Extensions introduced by versions 2 and 3 The issuer’s digital signature

Network Security Philadelphia UniversityAhmad Al- Ghoul Symmetric Key Digital Signature (1)  With a private key encryption system the secrecy of the key guarantees the authenticity of the massage, as well as its secrecy.  Symmetric key encryption doesn't prevent forgery, the receiving party can create an identical message, because it has the same key, so there is no protection against the repudiation ( denial of sending a message ).  To solve this problem, there must be trusted third party A

Network Security Philadelphia UniversityAhmad Al- Ghoul Symmetric Key Digital Signature(2)  Symmetric Key Digital Signature –using arbiter, A S(sender) share a secret key with A R(receiver) share a secret key with A –using symmetric encryption –protocol : SKDS-1 arbiter S R

Network Security Philadelphia UniversityAhmad Al- Ghoul Digital Signature without Encryption(1)  If S and R are not concerned with secrecy, they can agree on a cryptographic sealing to use as a signature, the seal is a stamp, mark to prove the authenticity. A sealing function is a mathematical function affected by every bit of its input.  Suppose S and R have each registered a personal sealing function with arbiter  Let fs and fR be these two functions.  S sends M and fs(m) to A.  A also computes fs(M) from the copy of M received from S.  If two values match the massage is authenticated.  A sends M, s, fs(m), and fR((M,S)) to R.  R cannot interrupt fs(M) but can use it as evidence that S sent M.

Network Security Philadelphia UniversityAhmad Al- Ghoul Digital Signature without Encryption(2)  Digital Signature without Encryption –using arbiter, A –using cryptographic sealing function: e.g. keying hash function like HMAC-SHA –protocol : SKDS-2 arbiter S R

Network Security Philadelphia UniversityAhmad Al- Ghoul Digital Signature without Encryption(3)  Preventing Reuse or Alternation –SKDS-1 and SKDS-2 satisfy two primary conditions for digital signature: unforgeable and authentic –do not satisfy two desirable conditions for digital signature: not alterable and not reusable –solution not reusable : use time stamp not alterable : make each piece depend on time stamp

Network Security Philadelphia UniversityAhmad Al- Ghoul  Preventing Reuse or Alternation

Network Security Philadelphia UniversityAhmad Al- Ghoul Digital signature Paul Plain text Signature Plaintext Simon private key Simon public key Sign Verify Verifies? Yes, NO Simon

Network Security Philadelphia UniversityAhmad Al- Ghoul  Public key solution is much less cumbersome than the single key solution  One disadvantage is that the message is authentic but not private (as everyone can decrypt with the public key)  This can be overcome by using two encryption –in the first you encrypt the message with the public key of the recipient - the message can be read only by the recipient - it is private - confidentiality is provided –in the second (the envelope) you encrypt the encrypted message with your secret key - the message was sent only by you as only you know your private key - the message is authentic

Network Security Philadelphia UniversityAhmad Al- Ghoul

Network Security Philadelphia UniversityAhmad Al- Ghoul Cryptography  Hashing functions MD5  Produces a 128-bit checksum  Processes incoming data in blocks of 512 bits (16 32-bit blocks)  4 repetitions of 16 operations  The result is 4 32-bit blocks SHA  Produces a 160-bit checksum  Processes incoming data in blocks of 512 bits (16 32-bit blocks–> bit blocks)  4 repetitions of 20 operations  The result is 5 32-bit blocks

Network Security Philadelphia UniversityAhmad Al- Ghoul

Network Security Philadelphia UniversityAhmad Al- Ghoul Hash Function Requirements A hash function H must have the following properties: 3 H can be applied to a block of data of any size 3 H produces a fixed-length output 3 H(x) is relatively easy to compute for any given x, making both hardware and software implementations practical 3 For any given code h, it is computationally infeasible to find x such that h(x)=h 3 For any given block x, it is computationally infeasible to find y  x with h(y)=h(x) 3 It is computationally infeasible to find any pair (x, y) such that h(x)=h(y)

Network Security Philadelphia UniversityAhmad Al- Ghoul Message Authentication Using a One- way Hash Function (1) H H E D Message Compare K K Using conventional encryption AB

Network Security Philadelphia UniversityAhmad Al- Ghoul Message Authentication Using a One- way Hash Function (2) H H E D Message Compar e K private K public Using public-key encryption (Digital Signature) AB

Network Security Philadelphia UniversityAhmad Al- Ghoul Report  Discus one of these topics  1- man in middle attack.  2- (RSA)Rivest, Shamir, and Adleman, A method for obtaining digital signatures and public-key cryptosystems.  3-Brute force attack.