Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Chapter 14 – Authentication Applications
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Public Key Infrastructure (X509 PKI)
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Chapter 11: Active Directory Certificate Services
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Techniques Instructor: Jerry Gao Ph.D. San Jose State University URL: May,
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Security+ Guide to Network Security Fundamentals, Fourth Edition
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Key Management in Cryptography
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
General Key Management Guidance. Key Management Policy  Governs the lifecycle for the keying material  Hope to minimize additional required documentation.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography, Authentication and Digital Signatures
Configuring Directory Certificate Services Lesson 13.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
TAG Presentation 18th May 2004 Paul Butler
Key management issues in PGP
Basics of Cryptography
TAG Presentation 18th May 2004 Paul Butler
IS3230 Access Security Unit 9 PKI and Encryption
CompTIA Security+ Study Guide (SY0-501)
Security in ebXML Messaging
Lecture 4 - Cryptography
PKI (Public Key Infrastructure)
Presentation transcript:

Cryptography Chapter 14

Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences between asymmetric and symmetric algorithms Have a basic understanding of the concepts of cryptography and how they relate to network security continued…

Learning Objectives Discuss characteristics of PKI certificates and the policies and procedures surrounding them Understand the implications of key management and a certificate’s lifecycle

Cryptography Study of complex mathematical formulas and algorithms used for encryption and decryption Allows users to transmit sensitive information over unsecured networks Can be either strong or weak

Cryptography Terminology Plaintext  Data that can be read without any manipulation Encryption  Method of disguising plaintext to hide its substance Ciphertext  Plaintext that has been encrypted and is an unreadable series of symbols and numbers

How Encryption and Decryption Work

Algorithms Mathematical functions that work in tandem with a key Same plaintext data encrypts into different ciphertext with different keys Security of data relies on:  Strength of the algorithm  Secrecy of the key

Hashing Method used for verifying data integrity Uses variable-length input that is converted to a fixed-length output string (hash value)

Symmetric versus Asymmetric Algorithms Type of Algorithm AdvantagesDisadvantages SymmetricSingle keyRequires sender and receiver to agree on a key before transmission of data Security lies only with the key High cost AsymmetricEncryption and decryption keys are different Decryption key cannot be calculated from encryption key Security of keys can be compromised when malicious users post phony keys

Symmetric Algorithms Usually use same key for encryption and decryption Encryption key can be calculated from decryption key and vice versa Require sender and receiver to agree on a key before they communicate securely Security lies with the key Also called secret key algorithms, single-key algorithms, or one-key algorithms

Encryption Using a Symmetric Algorithm

Categories of Algorithms Stream algorithms  Operate on the plaintext one bit at a time Block algorithms  Encrypt and decrypt data in groups of bits, typically 64 bits in size

Asymmetric Algorithms Use different keys for encryption and decryption Decryption key cannot be calculated from the encryption key Anyone can use the key to encrypt data and send it to the host; only the host can decrypt the data Also known as public key algorithms

Common Encryption Algorithms Lucifer (1974) Diffie-Hellman (1976) RSA (1977) DES (1977) Triple DES (1998) IDEA (1992) Blowfish (1993) RC5 (1995)

Primary Functions of Cryptography Confidentiality Authentication Integrity Nonrepudiation

Digital Signatures Based on asymmetric algorithms, allow the recipient to verify whether a public key belongs to its owner

Certificates Credentials that allow a recipient to verify whether a public key belongs to its owner  Verify senders’ information with identity information that is bound to the public key Components  Public key  One or more digital signatures  Certificate information (eg, user’s name, ID)

Public Key Infrastructure (PKI) Certificates Certificate storage facility that provides certification management functionality (eg, ability to issue, revoke, store, retrieve, and trust certificates) Certification authority (CA)  Primary feature of PKI  Trusted person or group responsible for issuing certificates to authorized users on a system  Creates certificates and digitally signs them using a private key

PKI Policies and Practices Validity establishes that a public key certificate belongs to its owner CA issues certificates to users by binding a public key to identification information of the requester User can manually check certificate’s fingerprint

PKI Revocation Certificates have a restricted lifetime; a validity period is created for all certificates Certificate revocation list (CRL)  Communicates which certificates within a PKI have been revoked

Trust Models Techniques that establish how users validate certificates  Direct trust  Hierarchical trust  Web of trust

Direct Trust Model User trusts a key because the user knows where it came from

Hierarchical Trust Model Based on a number of root certificates

Web of Trust Combines concepts of direct trust and hierarchical trust Adds the idea that trust is relative to each requester Central theme: the more information available, the better the decision

Key and Certificate Life Cycle Management Setup or initialization Administration of issued keys and certificates Certificate cancellation and key history

Setup and Initialization Registration Key pair generation Certificate creation Certificate distribution Certificate dissemination Key backup

Registration User requests certificate from CA CA verifies identity and credentials of user Certificate practice statement  Published document that explains CA structure to users Certificate policy establishes:  Who may serve as CA  What types of certificates may be issued  How they should be issued and managed

Key Pair Generation Involves creation of one or more key pairs using different algorithms Dual or multiple keys are often utilized to perform different roles to support distinct services Key pair can be restricted by policy to certain roles based on usage factors Multiple key pairs usually require multiple certificates

Certificates Distinguished name (DN)  Unique identifier that is bound to a certificate by a CA  Uses a sequence of character(s) that is unique to each user Appropriate certificate policies govern creation and issuance of certificates

Certificate Dissemination Techniques Securely make certificate information available to requester without too much difficulty  Out-of-band distribution  In-band distribution  Publication  Centralized repositories with controlled access

Key Backup Addresses lost keys Helps recover encrypted data Essential element of business continuity and disaster recovery planning

Key Escrow Key administration process that utilizes a third party Initialization phase involves:  Certificate retrieval and validation  Key recovery and key update

Cancellation Procedures Certificate expiration Certificate revocation Key history Key archive

Certificate Expiration Occurs when validity period of a certificate expires Options upon expiration  Certificate renewal  Certificate update

Certificate Revocation Implies cancellation of a certificate prior to its natural expiration Revocation delay  Delay associated with the revocation requirement and subsequent notification

Certificate Revocation How notification is accomplished  Certificate revocation lists (CRLs)  CRL distribution points  Certificate revocation trees (CRTs)  Redirect/Referral CRLs Notification is unnecessary for:  Short certificate lifetimes  Single-entity approvals

Key History Deals with secure and reliable storage of expired keys for later retrieval to recover encrypted data Applies more to encryption keys than signing keys

Key Archive Service undertaken by a CA or third party to store keys and verification certificates Meets audit requirements and handles resolution of disputes when used with other services (eg, time stamping and notarization)

Setting up an Enterprise PKI Extremely complex task with enormous demands on financial, human, hardware, and software resources Areas to explore  Basic support  Training  Documentation issues

Areas to Explore in Detail When Setting up an Enterprise PKI Support for standards, protocols, and third- party applications Issues related to cross-certification, interoperability, and trust models Multiple key pairs and key pair uses How to PKI-enable applications and client- side software availability continued…

Areas to Explore in Detail When Setting up an Enterprise PKI Impact on end user for key backup, key or certificate update, and nonrepudiation services Performance, scalability, and flexibility issues regarding distribution, retrieval, and revocation systems Physical access control to facilities

Chapter Summary Ways that algorithms and certificate mechanisms are used to encrypt data flows Concepts of cryptography Key and certificate life cycle management