Encryption Coursepak little bit in chap 10 of reed.

Slides:



Advertisements
Similar presentations
Digital Signatures. Anononymity and the Internet.
Advertisements

Network Security Hwajung Lee. What is Computer Networks? A collection of autonomous computers interconnected by a single technology –Interconnected via:
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Cryptography and Network Security Chapter 9. Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively.
Public Key Cryptography and the RSA Algorithm
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 9 – Public Key Cryptography and RSA Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Rachana Y. Patil 1 1.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Prime Numbers Prime numbers only have divisors of 1 and self
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
RSA By: Abhishek Naik Viswanath Chennuru CPSC 624.
Public-Key Cryptography CS110 Fall Conventional Encryption.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Public-Key Encryption
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Encryption.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
1 Network Security Basics. 2 Network Security Foundations: r what is security? r cryptography r authentication r message integrity r key distribution.
Cryptography and Network Security Public Key Cryptography and RSA.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
James C. Bradas, Ph.D. Engineering & Analysis Operation 18 June 2009 Public Key Encryption.
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Encryption CS110: Computer Science and the Internet.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Public-key Cryptography
Public Key Encryption and the RSA Algorithm
Fluency with Information Technology Lawrence Snyder
Presentation transcript:

Encryption Coursepak little bit in chap 10 of reed

Encryption A message sent over a network can be read by any site between the source and the destination (e.g. each hop in ). Encryption is the process of encoding a message so that it is decipherable only by its intended recipient (anyone intercepting the message would be unable to interpret it)

Encryption Cryptography - study of methods to encrypt text. Cryptanalysis - study of how to decode an encypted text. Strong Encryption - infeasible to crack Weak Encryption - can be cracked

Example Substitution cipher - each letter of the alphabet is substituted with a different letter or symbol. Ceasar's method - replace every letter in the alphabet with the letter 3 places after it –A - > D –B - > E … –Y - > B –Z - > C

Encryption The sender encrypts the message The sender transmits the message to the receiver The receiver decodes the message How does the receiver decode the message? The sender needs to send the key to the receiver. BUT, now this can be intercepted.

Symmetric-Key Encryption Symmetric (Private, Single)-key encryption assumes that the sender and the recipient use a shared key. Same key is used for encryption and decryption. Introduces key security risk: –how communicate the key? Intercepted? –Imagine shopping from online catalog. Shared by too many

Symmetric-Key Encryption Problem is that the privacy of the message is only as good as the secrecy of the key. If a cracker learns the key by sniffing it in an internet transmission or being told by a traitor (e.g. an employee who was fired), the complexity of the algorithm won’t do any good.

Asymmetric (Public)-Key Encryption In 1976 Whitfield Diffie and Martin Hellman proposed public-key encryption –generate a pair of associated keys, one is public and the other is private –a message encoded with a public key requires the corresponding private key for decoding, and vice versa. Each undoes the other (in either order). –It should be computationally infeasible to derive the private key from the public key. –almost all secure communications on the Internet use asymmetric key encryption

Asymmetric (Public)-Key Encryption S’pose you want to send me a message. I have published my public key. –Website, PKI (Public Key Infrastructure) You use it to encrypt the message and send it to me. I use my private key to decrypt the message.

Digital Signature Authenticate identity of sender You create a digital signature using your private key and add it to the message. I use your public key to decrypt it. Signature is also a function of the text in the document. –Can’t be copied to another document –I can verify that document hasn’t been altered (integrity).

Asymmetric (Public)-Key Encryption allows for double encryption to encrypt text and verify the identity of the sender. sender can encode messages with his private key and the recipient’s public key, and the recipient decodes the message in reverse.

RSA Ron Rivest, Adi Shamir, and Len Adleman invented the most popular instantiation of public-key encryption, which has become known as RSA. Alice, the sender, wants to send Bob, the receiver a message that Eve, the eavesdropper, cannot decrypt. Bob has published a public key, KR, which Alice is to use to encrypt her message.

RSA Alice partitions her cleartext message T into 32- byte groups of ASCII letters, T0T1... Tn-1. For i = 0 to n-1, she sends Ci, the remainder of (Ti)3/KR. Bob's public key KR pq, where p and q are primes, each 2 greater than a multiple of 3. To decrypt the message Bob computes s = (1/3)(2(p-1)(q-1) + 1). He then decrypts each Ci by computing the remainder of (Ci)s)/KR, which we can show is Ti.

RSA Example –We can choose p = 5, q = 11, so KR = 55, s = 27. –Suppose Ti = 42 ( in binary). Then Ci is the remainder of 423/55, that is, 74088%55 = 3. To decrypt 3, Bob computes 327%55 = 7,625,597,484,987%55 = 42. –RSA is based on a theorem by Euler (1736): Suppose p and q are distinct primes, K = pq, 0 ≤ T 0. Then Tr(p-1)(q-1)) + 1%K = T. –In our example r = 2, because (T3)(1/3)(2(p-1)(q-1) + 1)) = T2(p-1)(q-1) + 1)

RSA M = the message C - the encrypted message e = the public exponent d = the private exponent n = a very large integer The message is encrypted by C = M^e mod n (mod means divide by n and keep the remainder) The message is decrypted by M = C^d mod n where n = p * q, p and q are prime numbers, d *e≡ 1 mod((p-1)*(q-1))

RSA Public key: n,e Private key: n,d

RSA If n is a large number (128 bits or 256 bits), it is computationally infeasible to find p and q. Why? –find all factors of n –determine which are prime –try all pairs of primes to find p and q

RSA These methods hinge on the fact that it is relatively easy (computationally) to multiply two large numbers, but it is quite difficult to factor a large number if the only factors are large prime numbers. Example: Try to factor See how long it takes.

RSA 53 and 61.

Attacking RSA Try to find primes p and q such that pq = KR. –In 1977, Rivest, Shamir and Adleman issued a challenge to the world: break a small cipher text encrypted with RSA129, a 129-digit key. –RSA129 was cracked with the largest computation of all time (about 1000 computers around the world working 8 months). The secret message was: THE MAGIC WORDS ARE SQUEAMISH OSSIFRAGE. –It is estimated that with 250 digit keys and current factoring algorithms, you'd need 1000 computers for about 800 million months (or 100 billion computers for 8 months). –Thus, RSA is still deemed to be strong encryption.

Asymmetric-Key Encryption Advantages One can send secure message to someone without having to share any secret keys. Only public key is distributed. The recipient can verify the identity of the sender.

Asymmetric-Key Encryption Disadvantage SLOW

PGP Pretty Good Privacy (Phil Zimmerman) Uses both Single key and Public-private- key pair. Nice compromise –Use slow public key to encrypt single key –Use quick single key to encrypt large file. –Send both

PGP (Sender) PGP compresses the message - saves transmission time and increases security We previously discussed compression of graphics files. (e.g. simple compression - replace multiple copies of a character with a single character and the number of repeats.) How would compression increase security?

PGP (Sender) PGP creates a session key that is used only once during this session. Created from randomly selected mouse movements and keystrokes. The session key used to encrypt the message.

PGP (Sender) The receiver's public key is used to encrypt the session key. The encrypted message and encrypted session key are sent to the receiver.

PGP (Receiver) The receiver uses private key to decrypt session key The session key is used to decode the message text. The text is decompressed. The session key is discarded. (diagram)

PGP Advantages: Only a very small content (the session key) is publicly encrypted The session key is used just once - hard to decode by repeated attacks Symmetric-key encryption is ~10,000 times faster than asymmetric-key encryption. (Fast session key is used on large file)