CS 4/585: Cryptography Tom Shrimpton FAB 120-04 725-5392.

Slides:



Advertisements
Similar presentations
Course summary COS 433: Crptography -Spring 2010 Boaz Barak.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Cryptography and Security: The Narrow Road from Theory to Practice Burt Kaliski, RSA Security ISPEC 2006, Hangzhou, China April 13, 2006.
CIS 5371 Cryptography 3b. Pseudorandomness.
Cryptography & Security Presented April 16, 2010 By Dave Stycos, Zocalo Data Systems.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Web Security for Network and System Administrators1 Chapter 4 Encryption.
Foundations of Network and Computer Security J J ohn Black Lecture #5 Aug 31 st 2009 CSCI 6268/TLEN 5550, Fall 2009.
CMSC 456 Introduction to Cryptography
Chapter 5 Cryptography Protecting principals communication in systems.
Foundations of Network and Computer Security J J ohn Black Lecture #10 Sep 19 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #9 Sep 16 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #8 Sep 15 th 2005 CSCI 6268/TLEN 5831, Fall 2005.
Foundations of Network and Computer Security J J ohn Black Lecture #5 Sep 7 th 2004 CSCI 6268/TLEN 5831, Fall 2004.
Foundations of Network and Computer Security J J ohn Black Lecture #7 Sep 11 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
1 The Future of Cryptography Salil Vadhan Harvard University.
Foundations of Network and Computer Security J J ohn Black Lecture #5 Sep 6 th 2005 CSCI 6268/TLEN 5831, Fall 2005.
Foundations of Network and Computer Security J J ohn Black Lecture #8 Sep 14 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Foundations of Network and Computer Security J J ohn Black Lecture #11 Sep 21 st 2007 CSCI 6268/TLEN 5831, Fall 2007.
CS470, A.SelcukHash Functions1 Cryptographic Hash Functions CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Feb 19, 2002Mårten Trolin1 Previous lecture Practical things about the course. Example of cryptosystem — substitution cipher. Symmetric vs. asymmetric.
Foundations of Network and Computer Security J J ohn Black Lecture #9 Sep 17 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
A Cryptography Tutorial Jim Xu College of Computing Georgia Tech
Foundations of Cryptography Rahul Jain CS6209, Jan – April 2011
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Cryptography Lecture 1: Introduction Piotr Faliszewski.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Crypto Bro Rigby. History
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Cryptographic Hash Functions Message Authentication Digital Signatures.
Lecture 4.1: Hash Functions, and Message Authentication Codes CS 436/636/736 Spring 2015 Nitesh Saxena.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Class 5 Channels and Preview CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
1 Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 3 Read sections first (skipping 3.2.2)
Dan Boneh Public key encryption from Diffie-Hellman The ElGamal Public-key System Online Cryptography Course Dan Boneh.
Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Class 2 Cryptography Refresher CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Class 4 Asymmetric Cryptography and Trusting Internal Components CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
1 Message authentication codes, modes of operation, and indifferentiability Kan Yasuda (NTT, Japan) ASK 2011 Aug. 31, Singapore.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Class 3 Cryptography Refresher II CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Exam 1 Review CS461/ECE422 Fall Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like.
Ln Lou Modern Cyphers. 0. Security System Key Plain Text Cipher Text Encryption (K × P → C) Decryption (K × C → P)
14-1 Last time Internet Application Security and Privacy Basics of cryptography Symmetric-key encryption.
Class 3 Cryptography Refresher II CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
Lecture 5.1: Message Authentication Codes, and Key Distribution
PKCS #5: Password-Based Cryptography Standard
1 Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 2 Chapter 3 (sections ) You may skip proofs, but are.
Lecture 4.1: Hash Functions, and Message Authentication Codes CS 436/636/736 Spring 2014 Nitesh Saxena.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
Cryptography Lecture 13.
Cryptography and Security Fall 2009 Steve Lai
Foundations of Network and Computer Security
CSE 484 Midterm Review “1st half of the quarter in 5 slides”
Symmetric-Key Encryption
Foundations of Network and Computer Security
Cryptography Lecture 14.
Cryptography Lecture 13.
Presentation transcript:

CS 4/585: Cryptography Tom Shrimpton FAB

What is cryptography? History History Modern cryptography Modern cryptography The “Provable Security” paradigm The “Provable Security” paradigm Cryptographic goals and models Cryptographic goals and models Sample cryptographic problems Sample cryptographic problems

Blockciphers Warm up: shift and substitution ciphers Warm up: shift and substitution ciphers Syntax and the Ideal Cipher model Syntax and the Ideal Cipher model Pseudorandom Permutations and Pseudorandom Functions Pseudorandom Permutations and Pseudorandom Functions The PRP/PRF switching lemma The PRP/PRF switching lemma Feistel ciphers, DES, linear cryptanalysis Feistel ciphers, DES, linear cryptanalysis AES AES

Symmetric Encryption Enciphering vs. encryption: syntax, notation Enciphering vs. encryption: syntax, notation Modes of operation: CBC, CTR, ECB, … Modes of operation: CBC, CTR, ECB, … Security goals: semantic security and equivalent notions Security goals: semantic security and equivalent notions Adversarial attack models Adversarial attack models Broken schemes Broken schemes Proofs of security: CTRC, CBC random IV Proofs of security: CTRC, CBC random IV

Symmetric Message Authentication What is a MAC, and why isn’t encryption enough? What is a MAC, and why isn’t encryption enough? Constructions: CBC-MAC, universal hash MACS, HMAC Constructions: CBC-MAC, universal hash MACS, HMAC Security goals: existential unforgeability Security goals: existential unforgeability Broken Schemes (that look right!) Broken Schemes (that look right!) Proofs of security: CBC-MAC, UH-MACS Proofs of security: CBC-MAC, UH-MACS

Authenticated Encryption The “lead pipe” or “opaque envelope” The “lead pipe” or “opaque envelope” Security goals: privacy + authenticity Security goals: privacy + authenticity Constructions: generic composition, one- pass schemes Constructions: generic composition, one- pass schemes How to break them if implemented poorly How to break them if implemented poorly

Cryptographic Hash Functions What are they and why do we need them? What are they and why do we need them? Security goals (crypto with no keys?!) Security goals (crypto with no keys?!) Merkle-Damgard constructions Merkle-Damgard constructions MD5, SHA1 MD5, SHA1 Blockcipher-based constructions Blockcipher-based constructions

Math for Asymmetric Encryption Number theory basics Number theory basics Group theory basics Group theory basics “Hard” problems (eg, discrete log) “Hard” problems (eg, discrete log) Examples: RSA, ElGamal, Diffie-Hellman Examples: RSA, ElGamal, Diffie-Hellman

Asymmetric Encryption Review of the public-key model Review of the public-key model Syntax of Public-Key Encryption Syntax of Public-Key Encryption How to use RSA properly How to use RSA properly Security goals: Semantic Security and equivalent notions Security goals: Semantic Security and equivalent notions Hybrid Encryption Hybrid Encryption OAEP, the PKCS v1 break… OAEP, the PKCS v1 break…

Asymmetric Message Authentication Syntax of Digital Signatures Syntax of Digital Signatures Security goals Security goals RSA-based schemes RSA-based schemes Hash-and-Sign paradigm Hash-and-Sign paradigm Full-domain hash (FDH) signatures Full-domain hash (FDH) signatures ElGamal-based schemes: Schnorr signatures ElGamal-based schemes: Schnorr signatures

Stream Ciphers Pseudorandom number generators Pseudorandom number generators What kind of object is a stream cipher? What kind of object is a stream cipher? Constructions: RC4 Constructions: RC4 The infamous WEP (802.11) attack The infamous WEP (802.11) attack

Other stuff… Computational issues Computational issues Key-exchange Key-exchange Signcryption Signcryption One-way functions One-way functions Mutual authentication Mutual authentication Zero-knowledge proofs Zero-knowledge proofs Identity-based encryption Identity-based encryption

Symmetric Encryption MACS Asymmetric Encryption Blockciphers Number Theory, etc. Auth. Encryption Digital Signatures Hash Functions Stream Ciphers A rough idea of how the “units” fit together…

The Big (Partial) Picture Primitives Block Ciphers Hash Functions Hard Problems Stream Ciphers First-Level Protocols Symmetric Encryption Digital Signatures MAC Schemes Asymmetric Encryption Second-Level Protocols SSH, SSL/TLS, IPSec Electronic Cash, Electronic Voting (Can do proofs) (No one knows how to prove security; make assumptions)