James Higdon, Sameer Sherwani

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptographic Security Presented by: Josh Baker October 9 th, CS5204 – Operating Systems.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
1 Chapter 13 – Digital Signatures & Authentication Protocols Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
RIKE Using Revocable Identities to Support Key Escrow in PKIs Nan Zhang, Jingqiang Lin, Jiwu Jing, Neng Gao State Key Laboratory of Information Security,
An Introduction to Identity-based Cryptography
Pretty Good Privacy (PGP). How PGP works PGP uses both public-key cryptography and symmetric key cryptography, and includes a system which binds the public.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Cryptography Basic (cont)
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Encryption Methods By: Michael A. Scott
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
ASYMMETRIC CIPHERS.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Chapter 5 Digital Signatures MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Bob can sign a message using a digital signature generation algorithm
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
An Efficient Identity-based Cryptosystem for
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography, Authentication and Digital Signatures
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Chapter 21 Public-Key Cryptography and Message Authentication.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 Public-Key Cryptography and Message Authentication.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Pairing Based Cryptography Standards Terence Spies VP Engineering Voltage Security
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Cryptography Gerard Klonarides. What is cryptography? Symmetric Encryption Symmetric Encryption Asymmetric Encryption Asymmetric Encryption Other cryptography.
Private key
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical.
Lecture 14 Public Key Cryptography and RSA. Summary principles of public-key cryptography principles of public-key cryptography RSA algorithm, implementation,
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Symmetric and Asymmetric Encryption
IS3230 Access Security Unit 9 PKI and Encryption
Install AD Certificate Services
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

James Higdon, Sameer Sherwani Identity Based  Cryptography James Higdon, Sameer Sherwani CpSc 624/424

Overview Type of encryption mechanisms Types of encryptions Basic Identity based encryption Advantages Disadvantages Applications -need for encryption   -communication      -emails   -sensitive information -types of encryption   -symmetric, non, public, private      -types of public key         -RSA         -IBE is a public key encryption

   Encryption  - process of transforming information(plaintext) using a cipher (algorithm) to ciphertext. 

Types of cryptographic mechanisms  Key Authentication  One way hash functions: MD5, SHA Digital signatures: Verify user: DSA    Key exchange  key distribution: Diffi-Hellman   Key generation  Block Ciphers: DES/AES; ATM, passwords

Types of keys(ciphers) Symmetric keys Traditional asymmetric keys  Identity-based asymmetric keys  Common public-key Algorithms  ( RSA, Elliptic curve, Discrete logarithm based)   Explain difference between traditional and Identity based asymmetric keys

Symmetric Encryption

Asymmetric Encryption (Public Key Infrastructure - PKI)

ID-based Encryption

Identity based Encryption(IBE)   "identity-based"...  mainly about keys  The major differences between an identity-based  system and a traditional system are  How to authenticate the key  How to distribute the key  How to use the key 

Identity based Encryption(IBE) A public-key encryption system in which an arbitrary string can be used as the public key. Any personal information: An e-mail address, a photo, and a postal address, etc Any terms and conditions, such as a time etc Developed by Adi Shamir in 1984 However, the encryption schemes were not fully used or created until 2001.

How it works Private Keys are generated by a third party Private Key Generator (PKG) PKG publishes a public master key and retains the private master key With the correct ID, users can contact the PKG to obtain the private key This way, messages may be encrypted without a prior distribution of keys between individuals 

Advantages Reduces the complexity of the encryption process No certificates needed. A recipient's public key is derived from his identity. No pre-enrollment required. Keys expire, so they don't need to be revoked. In a traditional public-key system, keys must be revoked if compromised. Less vulnerable to spam. Enables postdating of messages for future decryption. Enables automatic expiration, rendering messages unreadable after a certain date.

Disadvantages Requires a centralized server. IBE's centralized approach implies that some keys must be created and held in escrow -- and are therefore at greater risk of disclosure. Requires a secure channel between a sender or recipient and the IBE server for transmitting the private key.

Real-World Application Voltage Security provide Identity-Based Encryption for emails IBE Toolkit available to those who would like to use the encryption services