Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Attacks on Digital Signature Algorithm: RSA
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Chap 3: Key exchange protocols In most systems, we distinguish the short term keys from the long term ones: –A short term key (session key) is used to.
Overview of Cryptography Oct. 29, 2002 Su San Im CS Dept. EWU.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Computer Science Public Key Management Lecture 5.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Rachana Y. Patil 1 1.
Public Key Cryptography July Topics  Symmetric and Asymmetric Cryptography  Public Key Cryptography  Digital Signatures  Digital Certificates.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
May 2002Patroklos Argyroudis1 A crash course in cryptography and network security Patroklos Argyroudis CITY Liberal Studies.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Chapter 2: Protocol Building Blocks
Cryptography, Authentication and Digital Signatures
Public-Key Cryptography CS110 Fall Conventional Encryption.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Software Security Seminar - 1 Chapter 5. Advanced Protocols 조미성 Applied Cryptography.
1 Public-Key Cryptography and Message Authentication.
Encryption.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Digital Signatures, Message Digest and Authentication Week-9.
Protocols Chapter 2 Protocol: A series of steps, involving two or more parties, designed to accomplish a task. All parties involved must know the protocol.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
IT 221: Introduction to Information Security Principles Lecture 4: Public-Key Cryptography For Educational Purposes Only Revised: September 15, 2002.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Introduction to Cryptography Summarized from “ Applied Cryptography, Protocols, Algorithms, and Source Code in C ”, 2nd. Edition, Bruce Schneier, John.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
14-1 Last time Internet Application Security and Privacy Basics of cryptography Symmetric-key encryption.
Encryption CS110: Computer Science and the Internet.
Public Key Encryption, Secure WWW Transactions & Digital Signatures.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
Protocol Building Block. INTRODUCTION TO PROTOCOL Protocol? ● Def : Series of steps to accomplish a task with two or more parties Cryptographic protocol?
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Software Security Seminar - 1 Chapter 2. Protocol Building Blocks 발표자 : 최두호 Applied Cryptography.
Computer Communication & Networks
Presentation transcript:

Symmetric versus Asymmetric Cryptography

Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security  A review for those who have taken the course Computer Security (and Integrity)  A need for those who have not

Two kinds of Cryptography Symmetric 1)Alice and Bob agree on a cryptosystem 2)Alice and Bob agree on a key 3)Alice takes her plaintext message and encrypts it using the encryption algorithm and the key. This creates a ciphertext message 4)Alice sends the ciphertext message to Bob 5)Bob decrypts the ciphertext message with the same algorithm and key and reads it Asymmetric 1)Alice and Bob agree on a public-key cryptosystem 2)Bob sends Alice his public key 3)Alice encrypts her message using Bob’s public key and sends it to Bob 4)Bob decrypts Alice’s message using his private key

Problems Symmetric Keys must be distributed in secret If a key is compromised, Eve (eavesdropper) can  decrypt any message  pretend to be one of the parties A network requires a great number of keys Asymmetric slow (~1000 times slower than the symmetric) vulnerable to chosen- plaintext attacks

Public-key algorithms are not a substitute for symmetric algorithms are not used to encrypt messages, they are used to encrypt keys (session keys used with symmetric algorithms to secure message traffic)

Hybrid Cryptosystems 1)Bob sends Alice his public key. 2)Alice generates a random session key, K, encrypts it using Bob’s public key, and sends it to Bob. E B (K) 3)Bob decrypts Alice’s message using his private key to recover the session key. D B (E B (K)) = K 4)Both of them encrypt their communications using the same session key.

Signing Documents Symmetric 1)Alice encrypts her message to Bob with K A and sends it to Trent 2)Trent decrypts the message with K A 3)Trent takes the decrypted message and a statement that he has received this message from Alice, and encrypts the whole bundle with K B 4)Trent sends the encrypted bundle to Bob 5)Bob decrypts the bundle with K B. He can now read both the message and Trent’s certification that Alice sent it Asymmetric 1)Alice encrypts the document with her private key, thereby signing the document 2)Alice sends the signed document to Bob 3)Bob decrypts the document with Alice’s public key, thereby verifying the signature

Digital Signatures with Encryption 1)Alice signs the message with her private key S A (M) 2)Alice encrypts the signed message with Bob’s public key and sends it to Bob E B (S A (M)) 3)Bob decrypts the message with his private key D B (E B (S A (M))) = S A (M) 4)Bob verifies with Alice’s public key and recovers the message V A (S A (M)) = M

Problem with resending the message as a Receipt Bob signs the message with his private key, encrypts it with Alice’s public key, and sends it back to Alice E A (S B (M)) If Mallory captures the message that Alice sent to Bob and claims that it came from him V M (S A (M)) = ? Bob still sends Mallory a receipt: E M (S B (V M (S A (M)))) =E M (D B (E M (D A (M))))  Mallory can read the message M by using his private key and public keys of Alice and Bob.

Attacks against Public-key Cryptography How Alice gets Bob’s public key?  from secure database How to protect the public key?  database is read-only to everyone, only writable to Trent  Trent can sign each public key by his own private key (Key Certification Authority or Key Distribution Center)

Conclusion No perfect method  each has its own weaknesses  be aware of being attacked Good to combine different methods

Reference [1] Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. Introduction to Algorithms. MIT Press and McGraw-Hill, ISBN Section 31.7: The RSA public-key cryptosystem, pp.881–887 [2] Bruce Schneier. Applied Cryptography. John Wiley & Sons, Inc (ISBN: )