S. Muftic Computer Networks Security 1 Lecture 4: Message Confidentiality and Message Integrity Prof. Sead Muftic.

Slides:



Advertisements
Similar presentations
MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
Advertisements

“Advanced Encryption Standard” & “Modes of Operation”
Conventional Encryption: Algorithms
Encipherment Using Modern Symmetric-Key Ciphers. 8.2 Objectives ❏ To show how modern standard ciphers, such as DES or AES, can be used to encipher long.
Modern Symmetric-Key Ciphers
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
Information Security & Cryptographic Principles. Infosec and Cryptography Subjects / Topics : 1. Introduction to computer cryptography 1. Introduction.
Using Cryptography to Protect Data in Computer Networks: case study Vsevolod Ievgiienko National Taras Shevchenko University of Kiev Faculty of Cybernetics.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
Web Security for Network and System Administrators1 Chapter 4 Encryption.
Block Ciphers 1 Block Ciphers Block Ciphers 2 Block Ciphers  Modern version of a codebook cipher  In effect, a block cipher algorithm yields a huge.
Chapter 5 Cryptography Protecting principals communication in systems.
Modes of Operation CS 795. Electronic Code Book (ECB) Each block of the message is encrypted with the same secret key Problems: If two identical blocks.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Lecture 23 Symmetric Encryption
Feb 19, 2002Mårten Trolin1 Previous lecture Practical things about the course. Example of cryptosystem — substitution cipher. Symmetric vs. asymmetric.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Encryption Methods By: Michael A. Scott
CN8816: Network Security1 Confidentiality, Integrity & Authentication Confidentiality - Symmetric Key Encryption Data Integrity – MD-5, SHA and HMAC Public/Private.
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
Modes of Operation. Topics  Overview of Modes of Operation  EBC, CBC, CFB, OFB, CTR  Notes and Remarks on each modes.
1 Chapter 11: Message Authentication and Hash Functions Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
Crypto Bro Rigby. History
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
Chapter 20 Symmetric Encryption and Message Confidentiality.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
CSCE 715: Network Systems Security
Chapter 20 Symmetric Encryption and Message Confidentiality.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
Network Security David Lazăr.
More About DES Cryptography and Network Security Reference: Sec 3.1 of Stallings Text.
1.1 Chapter 8 Encipherment Using Modern Symmetric-Key Ciphers Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Class 3 Cryptography Refresher II CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Lecture 23 Symmetric Encryption
Exam 1 Review CS461/ECE422 Fall Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like.
Ln Lou Modern Cyphers. 0. Security System Key Plain Text Cipher Text Encryption (K × P → C) Decryption (K × C → P)
PKCS #5: Password-Based Cryptography Standard
Network Layer Security Network Systems Security Mort Anvari.
Part 1  Cryptography 1 Integrity Part 1  Cryptography 2 Data Integrity  Integrity  detect unauthorized writing (i.e., modification of data)  Example:
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
@Yuan Xue 285: Network Security CS 285 Network Security Message Authentication Code Data integrity + Source authentication.
Symmetric Cryptography
CSCE 715: Network Systems Security
Cryptography Basics and Symmetric Cryptography
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Block cipher and modes of encryptions
Security in Network Communications
Security Of Wireless Sensor Networks
Symmetric-Key Encryption
Security of Wireless Sensor Networks
Counter With Cipher Block Chaining-MAC
Counter Mode, Output Feedback Mode
Elect. Codebook, Cipher Block Chaining
Presentation transcript:

S. Muftic Computer Networks Security 1 Lecture 4: Message Confidentiality and Message Integrity Prof. Sead Muftic

S. Muftic Computer Networks Security 2 Lecture 4 : Message Confidentiality and Integrity Message Confidentiality and Integrity Subjects / Topics : 1. Basic principles of message protection 2. Message confidentiality 3. Message integrity

S. Muftic Computer Networks Security 3 Lecture 4 : Message Confidentiality and Integrity Message Confidentiality and Integrity Subjects / Topics : 1. Basic principles of message protection 2. Message confidentiality 3. Message integrity

S. Muftic Computer Networks Security 4 Some confidential text (message) in clear (readable) form Network Aspects : * selection of algorithms * format of messages * message filtering * format of messages * message filtering Message Confidentiality

S. Muftic Computer Networks Security 5 Someconfid entialtext essage) inclear Aspects : 1. Algorithms: 3DES, 3DES-CBC, IDEA, Mode, padding 3. Filtering of cryptograms 4. Integrity of cryptograms 5. Exchange of keys 5. Exchange of keys Significant Aspects

S. Muftic Computer Networks Security 6 Solutions (standards) : * algorithm: 3DES, AES * mode: CBC, padding: Fx, …, Fx * filtering of cryptograms: base64 * integrity of cryptograms: MD2 * exchange of keys: KE protocols * exchange of keys: KE protocols Algorithms – Defaults Someconfid entialtext essage) inclear

S. Muftic Computer Networks Security 7 A B Alg-2Alg-1 Negotiation protocol Algorithms – Negotiations

S. Muftic Computer Networks Security 8 Algorithms – OIDs RC2-CBC OBJECT IDENTIFIER ::= {iso(1) member-body(2) US(840) rsadsi(113549) encryptionAlgorithm(3) 2} RC2 – CBC :

S. Muftic Computer Networks Security 9 ENCRYPTED {ToBeEnciphered} ::= HASHED {ToBeHashed} ::= BIT STRING (CONSTRAINED BY { OCTET STRING (CONSTRAINED BY { -- must be the result of -- must be the result of -- applying an encipherment -- applying a hashing -- procedure to the BER-encoded -- procedure to the DER-encoded -- octects of the value of octetcs of the value -- ToBeEnciphered }) ToBeHashed }) SIGNATURE {OfSignature} ::= SEQUENCE { AlgorithmIdentifier, ENCRYPTED { HASHED {OfSignature}}} Algorithms – Coding

S. Muftic Computer Networks Security 10 Network Topology

S. Muftic Computer Networks Security 11 Lecture 4 : Message Confidentiality and Integrity Message Confidentiality and Integrity Subjects / Topics : 1. Basic principles of message protection 2. Message confidentiality 3. Message integrity

S. Muftic Computer Networks Security 12 Message Encrypted message DES 8888 KK KK8888IV Message Confidentiality – Encryption DESDES DES

S. Muftic Computer Networks Security 13 Message Confidentiality – Ciphers Symmetric: DES AES 3DES Blowfish / Twofish IDEA RC2 RC4 etc... Asymmetric: RSA Elliptic Curve ElGamal

S. Muftic Computer Networks Security 14 Input message Output message 8888KK KK 8885 IV Message Confidentiality – Padding DES DESDES DES

S. Muftic Computer Networks Security 15 Block Cipher Modes – Electronic Codebook (ECB) Message Encrypted message 8888 KK KK8888 DES DESDES DES

S. Muftic Computer Networks Security 16 Block Cipher Modes – Cipher Block Chaining (CBC) Message Encrypted message 8888 KK KK8888IV DES DES DES DES

S. Muftic Computer Networks Security 17 Block Cipher Modes – Cipher Feedback (CFB) Message Encrypted message IV DES K DES K DES K DES K

S. Muftic Computer Networks Security 18 Block Cipher Modes – Counter (CTR) Message Encrypted message 8888 DES K8888 K K K nonce + counter

S. Muftic Computer Networks Security 19 Message Confidentiality – Important Parameters Key Algorithm Padding Mode Cipher Mode IV Nonce + Counter Initial Value

S. Muftic Computer Networks Security 20 Lecture 4 : Message Confidentiality and Integrity Message Confidentiality and Integrity Subjects / Topics : 1. Basic principles of message protection 2. Message confidentiality 3. Message integrity

S. Muftic Computer Networks Security 21 Some confidential text (message) in clear (readable) form E n c r y p t i o n D e c r y p t i o n Destruction of Cryptograms Someconfi entialtex essage) inclear Someconfi entialtex essage) inclear

S. Muftic Computer Networks Security 22 Some confidential text (message) in clear (readable) form MAC General Data Integrity

S. Muftic Computer Networks Security MAC sdefghtmm aassddffh  essage)  inclear Integrity of Cryptograms

S. Muftic Computer Networks Security 24 Message MAC KK KK 8888 IV Hashing Algorithms DES DES DES DES

S. Muftic Computer Networks Security 25 AB MAC Verification Procedure Someconfi entialtex essage) inclear Someconfi entialtex essage) inclear

S. Muftic Computer Networks Security 26 Message Authentication based on MAC

S. Muftic Computer Networks Security 27 Some confidential text(message) in clear (readable) form MAC Modification of Message + Hash

S. Muftic Computer Networks Security 28 Some confidential text(message) in clear (readable) form MAC Prevention

S. Muftic Computer Networks Security 29 AB Some confidential text (message) in clear (readable) form MAC Some confidential text (message) in clear (readable) form MAC Encryption of MAC

S. Muftic Computer Networks Security 30 Encryption of MAC – using Shared Secret

S. Muftic Computer Networks Security 31 Encryption of MAC – using Secret Key

S. Muftic Computer Networks Security 32 Encryption of MAC – using Private Key

S. Muftic Computer Networks Security 33 Lecture 4 : Message Confidentiality and Integrity Message Confidentiality and Integrity Subjects / Topics : 1. Basic principles of message protection 2. Message confidentiality 3. Message integrity

S. Muftic Computer Networks Security 34 ? Questions