Cryptography COS 461: Computer Networks Princeton University 1.

Slides:



Advertisements
Similar presentations
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Advertisements

Sri Lanka Institute of Information Technology
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Digital Signatures and Hash Functions. Digital Signatures.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Public Key Algorithms …….. RAIT M. Chatterjee.
6/9/2015Madhumita. Chatterjee1 Overview of Computer Security.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Network and Communication Security COS 461: Computer Networks Spring 2010 (MW 3:00-4:20 in COS 105) Mike Freedman
Cryptography and Network Security Chapter 9 Fourth Edition by William Stallings.
Network and Communication Security Section COS 461: Computer Networks Spring 2011 Mike Freedman
Cryptography and Network Security Chapter 9. Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively.
Public Key Cryptography and the RSA Algorithm
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Cryptography and Network Security Chapter 9 5th Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Introduction to Public Key Cryptography
Public Key Cryptography July Topics  Symmetric and Asymmetric Cryptography  Public Key Cryptography  Digital Signatures  Digital Certificates.
CSE 486/586 CSE 486/586 Distributed Systems Security Steve Ko Computer Sciences and Engineering University at Buffalo.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Public Key Cryptography and the RSA Algorithm Cryptography and Network Security by William Stallings Lecture slides by Lawrie Brown Edited by Dick Steflik.
Applied Cryptography (Public Key) RSA. Public Key Cryptography Every Egyptian received two names, which were known respectively as the true name and the.
Symmetric and Asymmetric Ciphers. Symmetric Encryption  or conventional / private-key / single-key  sender and recipient share a common key  all classical.
I-4 security.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Cryptography, Authentication and Digital Signatures
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both sender and receiver  if this key is disclosed.
Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both sender and receiver  if this key is disclosed.
Public-Key Encryption
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Cryptography and Network Security Public Key Cryptography and RSA.
Cryptography and Network Security Chapter 9 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Cryptography COS 461: Computer Networks Precept: 04/20/2012 Princeton University 1.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Security Steve Ko Computer Sciences and Engineering University at Buffalo.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Cryptography and Network Security Chapter 9 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Intro to Cryptography Lesson Introduction
Cryptography and Network Security Chapter 9 Fourth Edition by William Stallings.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Network Security Celia Li Computer Science and Engineering York University.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
CSE 486/586 Distributed Systems Security --- 1
Security through Encryption
Introduction to Symmetric-key and Public-key Cryptography
CSE 486/586 Distributed Systems Security --- 1
Presentation transcript:

Cryptography COS 461: Computer Networks Princeton University 1

Overview Network security and definitions Brief introduction to cryptography – Cryptographic hash functions – Symmetric-key crypto – Public-key crypto – Hybrid crypto 2

Internet’s Design: Insecure Designed for simplicity “On by default” design Readily available zombie machines Attacks look like normal traffic Internet’s federated operation obstructs cooperation for diagnosis/mitigation 3

Basic Components Confidentiality: Concealment of information or resources Authenticity: Identification and assurance of origin of info Integrity: Trustworthiness of data or resources in terms of preventing improper and unauthorized changes Availability: Ability to use desired info or resource Non-repudiation: Offer of evidence that a party indeed is sender or a receiver of certain information Access control: Facilities to determine and enforce who is allowed access to what resources (host, software, network, …) 4

Eavesdropping - Message Interception (Attack on Confidentiality) Unauthorized access to information Packet sniffers and wiretappers (e.g. tcpdump) Illicit copying of files and programs A B Eavesdropper 5

Integrity Attack - Tampering Stop the flow of the message Delay and optionally modify the message Release the message again A B Perpetrator 6

Authenticity Attack - Fabrication Unauthorized assumption of other’s identity Generate and distribute objects under identity A B Masquerader: from A 7

Attack on Availability Destroy hardware (cutting fiber) or software Modify software in a subtle way Corrupt packets in transit Blatant denial of service (DoS): – Crashing the server – Overwhelm the server (use up its resource) A B 8

9 Introduction to Cryptography

10 What is Cryptography? Comes from Greek meaning “secret writing” – Primitives also can provide integrity, authentication Cryptographers invent secret codes to attempt to hide messages from unauthorized observers Modern encryption: – Algorithm public, key secret and provides security – May be symmetric (secret) or asymmetric (public) plaintext ciphertext plaintext encryptiondecryption

11 Cryptographic Algorithms: Goal One-way functions: cryptographic hash – Easy to compute hash – Hard to invert “Trapdoor” functions: encryption/signatures – Given ciphertext alone, hard to compute plaintext (invert) – Given ciphertext and key (the “trapdoor”), relatively easy to compute plaintext – “Level” of security often based on “length” of key

12 Cryptographic hash functions

13 Cryptography Hash Functions Take message, m, of arbitrary length and produces a smaller (short) number, h(m) One-way function – Easy to compute h(m) – Hard to find an m, given h(m) – Often assumed: output of hash fn’s “looks” random Collision resistance: – Strong: Find any m != m’ such that h(m) == h(m’) – Weak: Given m, find m’ such that h(m) == h(m’) – For 160-bit hash (SHA-1) Strong collision are birthday paradox: 2^{160/2} = 2^80 Weak collision requires 2^160

14 Example use #1: Passwords Can’t store passwords in a file that could be read – Concerned with insider attacks! Must compare typed passwords to stored passwords – Does hash (typed) == hash (password) ? Actually, a “salt” is often used: hash (input || salt)

15 Example use #2: Self-certifying naming File-sharing software (LimeWire, BitTorrent) – File named by F name = hash (data) – Participants verify that hash (downloaded) == F name If check fails, reject data To successfully “forge” data’, must find weak collision Recursively applied… – BitTorrent file has many chunks – Control file downloaded from tracker includes: \forall chunks, F chunk name = hash (chunk) – BitTorrent client verifies each individual chunk

16 Symmetric (Secret) Key Cryptography

17 Symmetric Encryption Also: “conventional / private-key / single-key” – Sender and recipient share a common key – All classical encryption algorithms are private-key – Dual use: confidentiality or authentication/integrity Encryption vs. msg authentication code (MAC) Was only type of encryption prior to invention of public-key in 1970’s – Most widely used – (Much) more computationally efficient than “public key”

18 Symmetric Cipher Model

Distribution of Symmetric Keys Options: (between A and B). – A selects a key and physically delivers it to B. – If A and B already have have a viable key, it can be used to distribute a new key. – A trusted third party key distribution center (KDC) selects a key and physically delivers it to A and B (through a secure channel). 19

Distribution of Symmetric Keys Manual delivery is challenging… The number of keys grows quadratically with the number of endpoints (n*(n-1)/2) – Further complexity for application/user level encryption Key distribution center (KDC) a good alternative – Only n master keys required – KDC generate session key for Alice and Bob 20

21 Public-Key Cryptography

Why Public-Key Cryptography? Developed to address two key issues: – Key distribution: Secure communication w/o having to trust a key distribution center with your key – Digital signatures: Verify msg comes intact from claimed sender (w/o prior establishment) Public invention due to Whitfield Diffie & Martin Hellman in 1976 – Known earlier in classified community 22

Public-Key Cryptography Public-key: Known by anybody, and can be used to encrypt messages and verify signatures Private-key: Known only to recipient, used to decrypt messages and sign (create) signatures Can encrypt messages or verify signatures w/o ability to decrypt messages or create signatures 23

Public-Key Cryptography 24

Security of Public Key Schemes Public-key encryption is a “trap-door” function: – Easy to compute c  F(m, k p ) – Hard to compute m  F -1 (c) without knowing k s – Easy to compute m  F -1 (c, k s ) by knowing k s Like private key schemes, brute force search possible – But keys used are too large (e.g., >= 2048 bits) – Hence is slow compared to private key schemes 25

(Simple) RSA Algorithm Security due to cost of factoring large numbers – Factorization takes O(e log n log log n ) operations (hard) – Exponentiation takes O((log n) 3 ) operations (easy) To encrypt a message M the sender: – Obtain public key {e,n}; compute C = M e mod n To decrypt the ciphertext C the owner: – Use private key {d,n}; computes M = C d mod n Note that msg M must be smaller than the modulus n – Otherwise, hybrid encryption: Generate random symmetric key r Use public key encryption to encrypt r Use symmetric key encryption under r to encrypt M 26

Symmetric vs. Asymmetric Symmetric Pros and Cons – Simple and really very fast (order of 1000 to faster than asymmetric mechanisms) – Must agree/distribute the key beforehand – AES/CBC (256-bit)  80 MB / s – (for 2048 bits, that’s.003 ms) Public Key Pros and Cons – Easier predistribution for public keys Public Key Infrastructure (in textbook) – Much slower – 2048-RSA  6.1ms Decrypt, 0.16ms Encrypt 27