COEN 351 E-Commerce Security Essentials of Cryptography.

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Digital Signatures and Hash Functions. Digital Signatures.
Cryptographic Security CS5204 – Operating Systems1.
Public Key Algorithms …….. RAIT M. Chatterjee.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Diffie-Hellman Key Exchange
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Public Key Model 8. Cryptography part 2.
Rachana Y. Patil 1 1.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
I-4 security.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
Cryptography, Authentication and Digital Signatures
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Chapter 21 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Encryption.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Digital Signatures, Message Digest and Authentication Week-9.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
COEN 351 E-Commerce Security
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
Private key
Key Management Network Systems Security Mort Anvari.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Secure Key Exchange: Diffie-Hellman Exchange Dr. Rocky K. C. Chang 19 February, 2002.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Basics of Cryptography
Key Management Network Systems Security
Asymmetric Cryptographic Algorithms
Presentation transcript:

COEN 351 E-Commerce Security Essentials of Cryptography

Cryptography Scrambles a plain-text into crypto-text. Enables to descramble plain text.

Symmetric Cryptography Uses the same key for encryption, decryption

Asymmetric Cryptography Uses different key for encryption, decryption

Message Authentication Codes Condenses message into a short hash SHA1, … MD5, … are appropriate cryptographically secure hash functions For example, encrypt only the MAC with a key known to sender and receiver.

Message Authentication Code Alternatively, use a secret key. This also provides authentication.

Use of Asymmetric Cryptography Generic idea:Make one key public. How? Website Website can be spoofed. On your business card Works for individuals, requires recipient to type in several lines of gibberish correctly. From a trusted source Going back and back: Where does the trust stem from?

Use of Asymmetric Cryptography Notations: E – public key, D – secret key E C (M) – encryption of M using key C. D C (M) – decryption of M using key C. Asymmetric cryptography key identities D E E D (M) = M D D E E (M) = M

Use of Asymmetric Cryptography Secret Transmission of messages Alice uses public key of Bob to encrypt her messages to him: E E(Bob) (M). Bob uses his private key to decrypt the message: D D(Bob) E E(Bob) (M).

Use of Asymmetric Cryptography Signing a message I: Alice encrypts the message with her private key: E D(Alice) (M). Bob decrypts with her public key and obtains M = D E(Alice) E D(Alice) (M). If M makes sense, Bob knows that someone with Alice secret key send the message.

Use of Asymmetric Cryptography Signing a message II This method avoids encryption of the whole message. Asymmetric cryptography is very compute intensive. Alice uses a MAC of her message: MAC(M). She sends Bob M and E D(Alice) (MAC(M)). Bob calculates MAC(M) = D E(Alice) (E D(Alice) (MAC(M))). Bob verifies that this is the correct MAC. Bob concludes that the message was sent by someone knowing Alice’s private key.

Key Management Generic Rules: Use symmetric cryptography as much as possible for performance. Never use keys more than once. Key Management becomes an issue.

Key Management Keys have limited lifetimes: Cryptanalysis is easier with more material. Breaking WEP involves harvesting a large number of packets. Once found, a compromised key continues to do damage.

Key Management Key Management Life Cycles: Key establishment Key generation Key distribution Key backup / recovery, key escrow Key replacement / update (rekeying) Key revocation Key expiration / Key termination / Key destruction

Key Management Key generation Uses random number generation Pseudo-random generation derived from a seed WEP: seed based on user key word. Not as random as appeared. Hardware random number generation Combined methods

Key Management Key distribution Has issues of authentication and confidentiality. Diffie-Hellman protocol solves confidentiality: Allows two parties to agree on a common secret. Subject to the man-in-the-middle attack Alice thinks that she shares a secret with Bob. In reality, she communicates with M, and shares the secret with him. M shares another secret with Bob.

Key Management Key backup / recovery Accidental loss of key hardware failure, forgotten password … Control of encrypted information Employer cannot entrust enterprise-critical data to complete control of a single / group of employees. Key escrow To preserve possibility of access by law enforcement agencies. In the UK, it is a crime to withhold a key to encrypted data under subpoena. In the US, such a law is seen to contradict 5 th amendment protection.

Key Management Key destruction Secure key destruction is far easier than secure file erasure. Key destruction destroys accessibility to encrypted data. Key archiving Necessary for validation of old signatures, of integrity of old messages, …

Key Management Symmetric key transport: Send symmetric key along, protected by public key of recipient. Saves on processing time

Diffie-Hellman Uses calculation modulo p, p a large prime. Chooses generator g. Ideally, g x, x = 0, …, p -2 runs through all numbers 1, … p -1. Uses the fact that calculating powers g x is computationally feasible. But discrete logarithm (given g x find x) is not.

Diffie Hellman Alice generates random number a mod p. Bob generates random number b mod p. Alice sends Bob g a mod p. Bob sends Alice g b mod p. Alice calculates (g b ) a mod p. Bob calculates (g a ) b mod p. These numbers are identical and the shared key.

Diffie Hellman Secure against eavesdroppers. Can be secured against man-in-the- middle by using authenticated g b mod p or by using a published value g b mod p.