Cryptography What is cryptography? The study of message secrecy The art of writing or solving codes Heavy mathematics Information Theory Statistics Number.

Slides:



Advertisements
Similar presentations
Cryptography Ch-1 prepared by: Diwan.
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Security Chapter The security environment 9.2 Basics of cryptography 9.3 User authentication 9.4 Attacks from inside the system 9.5 Attacks from.
Classical Cryptography
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.
A Cryptography Tutorial Jim Xu College of Computing Georgia Tech
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Chapter 8: Scrambling Through Cryptography Security+ Guide to Network Security Fundamentals Second Edition.
Information Systems Security
Cryptography, Authentication and Digital Signatures
Lec. 5 : History of Cryptologic Research II
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Midterm Review Cryptography & Network Security
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
1 Security and Cryptography: basic aspects Ortal Arazi College of Engineering Dept. of Electrical & Computer Engineering The University of Tennessee.
Lecture 2: Introduction to Cryptography
Overview of Cryptography & Its Applications
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Intro to Cryptography Lesson Introduction
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
1.1 Introduction to Cryptography. 1.2 Basic Cryptography Cryptography is a deep mathematical subject. Cryptographic protocols provide a cornerstone for.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography – Test Review
Cryptography.
IS3230 Access Security Unit 9 PKI and Encryption
Security through Encryption
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
Presentation transcript:

Cryptography What is cryptography? The study of message secrecy The art of writing or solving codes Heavy mathematics Information Theory Statistics Number Theory

Cryptographic Terms Cryptology Study of Cryptography and Cryptanalysis Cryptanalysis Code Breaking Encryption Converts ordinary information to unreadable Decryption Coverts cipher-text back into plain-text Cipher A pair of algorithms which are used to encrypt and decrypt

Cryptographic Terms Key A parameter that explains how to run the algorithm Blocks Input divided and each block is independent against the key Symmetric Single key for encryption and decryption Asymmetric A public key for encryption A private key for decryption Hash One-way transformation of data Two different messages should NEVER have the same hash

Cryptographic Terms Perfect Secrecy Occurs when knowledge of cipher gives no knowledge of the original message Steganography Hides the fact that there even is a message Picture example

When? Ancient Cryptography Julius Caesar (49-44 BC) Messages to Generals Used a shift cipher (shift 3 right) Vigenére (1553) Keyword explained the shift Modern Cryptography Since Computers

Example Letter to Number Message: A P P L E Key: S H A R E Cipher: S W P B I Each message letter is added to Each key letter

Components Confidentiality Storing message unreadable Integrity Preventing modifications Strength Proving it is secure Can only be done with years of testing Availability Preventing of a denial of access Incorrect Data Resource Exhaustion

Pre-Modern Crypto Purpose Message Confidentiality Ciphers Transposition Rearrangement of Letters Substitution Replacing a group of letters with other letters Stego Head Tattoo

Pre-Modern Devices Scytale (Skytale) A strip of leather or paper wound around a cylinder Transposition Cipher Spartans this for military communication Cipher Grille Message contained inside of a host

Pre-Modern Devices Enigma Used by Germans in WWII Electromagnetic Rotor Machine Each letter changed the rotors which modified the key

Modern Crypto Started with the birth of computers Computers are magnitudes faster than humans Mostly used by government until PCs Huge role since the Internet Authentication Digital Signatures E-Commerce Banking

Proprietary vs Public Algorithms Proprietary Algorithm is unknown and therefore doesn’t help in cryptanalysis DVDs Not widely tested Public Tested for 5-8 years before trusted Allows many to find mistakes or weaknesses Algorithm knowledge should not help cracking the code

Symmetric Key Cryptography Uses a shared key between all parties Key that encrypts also decrypts 4000 times faster than asymmetric Stronger than asymmetric Key needs to be shared in a secure way DES Data Encryption Standard Used by the government and banks since 1977 AES Advanced Encryption Standard First published in 1998 New Standard approved for use up to TOP SECRET

Modern Algorithms Linear Mixing Applying XOR operations on the plain-text with the key Non-linear functions (Substitution boxes) Adds confusion Bit-Shuffling (Permutations) Rearrangement of the bits Expansion Permutates and adds some duplicate bits Key Mixing Uses multiple sub keys

One Time Pad Possible to have perfect secrecy The key is the length of the document and has no pattern Key is bitwise XOR with the document Key can only be used once or else statistics can be gathered from the cipher-text Very easy to break when used more than once

Data Encryption Standard 64-bit key 56-bits used for algorithm 8-bits for parity checking Parity bits are the least significant bit of each byte 64-bit blocks Split into 32-bit chunks and crisscrossed through the algorithm Feistel Network 16 Rounds Weaknesses Small key Differential Cryptanalysis Linear Cryptanalysis

Public Key Encryption Relatively new Based on the unproven idea that large numbers composed of primes are hard to factor Is always breakable given enough time and resources It is always known whether the key tried was correct Based on math functions rather than bit scrambling Used in situations where a symmetric key cannot be passed between parties Used to keep the Internet secure

Diffie-Hellman Whitfield Diffie and Martin Hellman (1976) DH Key Exchange Used to pass a key for symmetric crypto between two parties who have no knowledge of each other Primarily used over insecure channels

Diffie-Hellman Algorithm Alice (A) wants to communicate securely to Bob (B) A and B agree on P (a prime) and G (a generator) For every number N between 1 and P-1, pick G that works for the following equation: N = G K mod P A and B independently choose their secret integer (a and b respectively) Alice’s public value U = G a mod p Bob’s public value V = G b mod p Alice computes K = V a mod p Bob Computes K = U b mod p Alice and bob have both computed K which happens to be the same number

Diffie-Hellman In Action A and B agree on P = 23 and G = 5 A chooses a = 6 and B chooses b = 15 (independently) A computes U = 5 6 mod 23 U = 8 B computes V = 5 15 mod 23 V = 19 Alice and Bob exchange their U and V Alice computes K 1 = 19 6 mod 23 K 1 = 2 Bob computes K 2 = 8 15 mod 23 K 2 = 2 Since K 1 = K 2, both Alice and Bob have the same key value

RSA Algorithm Compute two large prime numbers p,q n = p * q (n is public knowledge) r = (p-1)(q-1) Choose e>1 and relatively prime to r Find d such that d = 1 + (i * r) / e where i is an integer counting up from one until a solution is found Public Key (e, n) Private Key (d, n) or (d, n, p, q) Using p and q can speed up the algorithm Encryption c = m e mod n Decryption m = c d mod n d, p, and q should all be kept private

RSA Algorithm in Action Bob chooses p = 863 and q = 937 giving N = 863*937 = (p-1)(q-1) = Bob chooses e = 7, which satisfies gcd(806832, 7) = 1 Bob’s public key: [N, e] or [808631, 7] Bob finds d = where d = 1 + ( i * ) / e works for some integer i Bob’s private key: [p, q, d] or [863, 937, ] Say Alice wants to send bob a message M = Alice computes C = M e mod N C = mod = Alice transmits C in the public Bob computes M = C d mod N M = mod =

Cryptanalysis Study of breaking code Uses knowledge of letter frequency

English Letter Frequency E %H - 6.1%W - 2.3%K - 0.8% T - 9.1%R - 6.0%F - 2.2%J - 0.2% A - 8.2%D - 4.3%G - 2.0%X - 0.1% O - 7.5%L - 4.0Y - 2.0%Q - 0.1% I - 7.0%C - 2.8%P - 1.9%Z - 0.1% N - 6.7%U - 2.8%B - 1.5% S - 6.3%M - 2.4%V - 1.0%

Digrams and Trigrams th, he, in, en, nt, re, er, an, ti, es, on, at, se, nd, or, ar, al, te, co, de, to, ra, et, ed, it, sa, em, ro the, and, tha, ent, ing, ion, tio, for, nde, has, nce, edt, tis, oft, sth, men

Differential Cryptanalysis Studies the difference between each input and their corresponding outputs Looks for non-random behavior Discovered in the late 1980s DES was resilient to this because the of the NSA’s S-box contribution A secret method the US government used to attack ciphertext from other countries

PGP and GPG PGP - Pretty Good Privacy Proprietary GPG - Gnu Privacy Guard Open source using public cryptographic algorithms Essentially the same as PGP Used for encryption and digital signatures Public key and private generated locally Public key is often uploaded to a key server

Thawte Certificate Company owned by Verisign Provides free personal certificates Can sign and encrypt s Advantages over PGP/GPG Certificate is signed by a normally trusted CA Most clients automatically handle the signatures without extensions Can only be used for Usually doesn’t get verified by webmail clients

How a Digital Signature Works Public and private keys are created Public key is attached to a certificate Certificate contains identification information Certificates are signed by certificate authorities The document is hashed Hash is encrypted with private key Result is appended to the document Receiving Party does the following: Hashes the message Takes the signature and decrypts it with the public key The decrypted signature is compared to the message hash If equal, message has a valid signature

Encryption To send an encrypted , you must have the receiver’s public key Message can only be decrypted by the receiver’s private key

Steganography Concealing a message in a host Example, embedding a message in a bitmap file Changing least significant bits of the file File is different but undetectable by the human eye