May 2002Patroklos Argyroudis1 A crash course in cryptography and network security Patroklos Argyroudis CITY Liberal Studies.

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

Hash Functions A hash function takes data of arbitrary size and returns a value in a fixed range. If you compute the hash of the same data at different.
Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Digital Signatures and Hash Functions. Digital Signatures.
Netprog: Cryptgraphy1 Cryptography Reference: Network Security PRIVATE Communication in a PUBLIC World. by Kaufman, Perlman & Speciner.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Company Confidential The Internet offers no inherent security services to its users; the data transmitted.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Cryptography, Authentication and Digital Signatures
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
Network Security David Lazăr.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Public Key Encryption.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 2: Message integrity.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Digital Signatures, Message Digest and Authentication Week-9.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Overview of Cryptography & Its Applications
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
INCS 741: Cryptography Overview and Basic Concepts.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
Web Applications Security Cryptography 1
Cryptography Reference: Network Security
Cryptography Reference: Network Security
UNIT II E-Commerce Vs Internet.
Cryptography Reference: Network Security
UNIT II E-Commerce Vs Internet.
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

May 2002Patroklos Argyroudis1 A crash course in cryptography and network security Patroklos Argyroudis CITY Liberal Studies

May 2002Patroklos Argyroudis2 Presentation topics Introductions Objectives of cryptography Hash functions Symmetric encryption Asymmetric encryption Hybrid cryptosystems Digital signatures Digital certificates Network security Network layer security: IPsec Transport layer security: SSL/TLS Conclusion

May 2002Patroklos Argyroudis3 Introductions The scope of this presentation is to provide an overview of cryptography and its application in the field of network security This presentation does not provide enough details in order to implement any of the described algorithms or protocols The following people will assist me in presenting the topics: - Alice: One participant of the communication (initiator) - Bob: The other participant of the communication - Eve: The passive eavesdropper - Mallory: The malicious active attacker In all cases: - Alice tries to talk to Bob - Eve tries to intercept the transmitted information - Mallory tries to disrupt the entire communication

May 2002Patroklos Argyroudis4 Objectives of cryptography The objectives of cryptography include all or some of the following (depending on the situation): - Confidentiality: Ensures that only an authorised person can access the protected data of a message - Authentication: Ensures that a person is who he claims to be, also Mallory should not be able to masquerade as someone else - Integrity: Ensures that transmitted messages are not manipulated during transmission - Non-repudiation: Ensures that a person cannot falsely deny later that he send a message It is obvious that the objectives of cryptography are vital requirements not only for computer communication, but also for face-to-face real life interactions

May 2002Patroklos Argyroudis5 Hash functions A hash function typically takes a variable length message, and returns a fixed length string Example: M = “Hello I am Bob and my password is hello_world” H(M) = 5hjf6H7Uf7HEfR53H5fY Typically hash algorithms output 160 bits, and the probability of two messages to have the same hash is negligible Computing the hash given M is easy, but deducing M given its hash is nearly impossible Therefore it is almost impossible to find two messages that have the same hash

May 2002Patroklos Argyroudis6 Applications of hash functions Integrity: - Alice sends message M to Bob - Bob wants to verify that the message was not corrupted during transmission - Alice computes the message’s hash H1 = H(M) and sends both M and H1 to Bob - Bob computes a hash H2 of M, if H1 = H2 the message was not tampered A possible attack: Mallory intercepts M, modifies it to M2, generates H3 = H(M2), and sends M2 and H3 to Bob, forging it as coming from Alice Other applications: authentication (Unix passwd), compression

May 2002Patroklos Argyroudis7 Symmetric encryption Symmetric encryption is also referred to as secret-key encryption since there is one key for both encrypting and decrypting: Mathematically: E(M) = C and D(C) = M and D(E(M)) = C Security resides on how well the key is protected, and not in keeping the algorithm secret In fact the most secure algorithms are the public ones Security is usually a function of length of the key (in bits)

May 2002Patroklos Argyroudis8 More on symmetric encryption Symmetric encryption algorithms: Digital Encryption Standard (DES), Blowfish, Rijndael (winner of AES) Confidentiality and authentication: - Alice encrypts a message using her key and sends it to Bob - Bob uses Alice’s key to decrypt the message - Bob is assured that whomever send the message knew Alice’s key - But Alice can claim that she did not send the message since Bob shared it with others (repudiation) More problems of symmetric encryption: - Need of a different key for every private conversion - How can Alice transmit a key to Bob without Eve intercepting it?

May 2002Patroklos Argyroudis9 Asymmetric encryption Asymmetric encryption is also called public-key cryptography One has two keys: a private key and a public key One can encrypt messages with the public key, and decrypt them with the private key: Example of confidentiality using public-key cryptography: - Bob sends to Alice his public key - Alice encrypts a message with Bob’s public key and sends it to him - Bob decrypts the message using his private key

May 2002Patroklos Argyroudis10 More on asymmetric encryption Although asymmetric encryption allows secure communication between strangers, it suffers from man-in-the-middle attacks: - Bob sends to Alice his public key - Mallory intercepts this key and sends to Alice his own public key - When Alice sends a message to Bob, encrypted in “Bob’s” public key, Mallory intercepts it, and since it is really encrypted with his own public key, decrypts it with his private key and reads it Of course the above attack works in both sides of the communication of Alice and Bob This man-in-the-middle attack works because Alice and Bob have no way to verify that they are talking to each other In theory any protocol that does not involve some kind of a secret is vulnerable to man-in-the-middle attacks

May 2002Patroklos Argyroudis11 Hybrid cryptosystems Public-key encryption is slow, symmetric encryption is at least 1000 times faster than public-key encryption In the real world, public-key encryption is not a substitute for symmetric encryption Public-key encryption is not used to encrypt messages, is used to encrypt keys of symmetric encryption A hybrid cryptosystem: - Bob sends Alice his public key - Alice generates a session key, encrypts it using Bob’s public key, and sends it to Bob - Bob decrypts Alice’s message using his private key to get the session key - Both encrypt their messages using the same session key and symmetric encryption

May 2002Patroklos Argyroudis12 Digital signatures A digital signature is a way to prove that you are really the person that sent a message: - Alice signs a message with her private key and sends it to Bob - Bob checks the signature of Alice with her public key - Bob is sure that the sender had Alice’s private key Digital signatures offer: - Message integrity: Bob is sure that the message was not corrupted during transmission, otherwise the check of the signature would have failed - Sender authentication: Bob is sure that the sender owns the private key that corresponds to the public key he has (Alice’s)

May 2002Patroklos Argyroudis13 Digital certificates Nothing prevents Mallory from creating a key pair, send the public key to Bob, and masquerading as Alice When Bob receives future messages from Mallory (pretending to be Alice), Bob can verify that is Alice (when it is really Mallory) A digital certificate binds a public key to a person Purpose: to convince a person who does not know Alice that Alice owns a particular public key When Alice signs a message with her private key, this authenticates Alice to the receiver of the message Certification authority: generates, distributes, and manages digital certificates, essential component of secure e-commerce You must completely trust a certification authority to authenticate Alice when Alice applies for her certificate

May 2002Patroklos Argyroudis14 Network security Cryptography finds most of its application these days in the field of network security Data must be protected during transmission, network connections must be authenticated, man-in-the-middle attacks must be successfully resolved Of course, network security does not provide a solution if the rest of the system is not properly secured, therefore computer security is also very important Network security can be applied in different layers (or levels): - At the network layer (2 nd layer of the TCP/IP 4-layer suite) - At the transport layer (3 rd layer of the TCP/IP 4-layer suite)

May 2002Patroklos Argyroudis15 Network layer security: IPsec The goal of IPsec is to make networking operations secure in their core: the IP protocol IPsec encompasses many different security technologies: - Symmetric encryption for encrypting the actual transferred data - Hash functions for providing authentication for network packets - Public-key cryptography for key exchanging and identification of the communicating end points - Digital certificates for ensuring identification Advantages: - Application independency: no changes to existing or legacy applications are required - Flexibility: supports any network situation and topology

May 2002Patroklos Argyroudis16 Transport layer security: SSL/TLS The Secure Sockets Layer (SSL), and its newest specification Transport Layer Security (TLS), provides security to specific applications that utilise it SSL works on top of the Transmission Control Protocol (TCP): It is mainly used to secure WWW connections, also used in WAP (WTLS) Other transport layer protocols: SHTTP, DNSSEC, SSH

May 2002Patroklos Argyroudis17 Conclusion The security of an entire system is only as strong as its weakest link Everything must be secure: the cryptographic algorithms, the security protocols, the key management, all of the components If a system uses strong cryptographic algorithms, but has a weak key management scheme, then someone is going to attack the system through its key management Cryptography is only a small part of computer and network security, the implementation code must be robust, system configuration must be correct, patches must be frequently applied, etc.. Finally, it must be understood that security is an ongoing process and not goal For more information: - Contact me at: - Visit: