Security: An Overview of Cryptographic Techniques 15-640/440 With slides from: Debabrata Dash, Nick Feamster, Gregory Kesden, Vyas Sekar and others.

Slides:



Advertisements
Similar presentations
MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Digital Signatures and Hash Functions. Digital Signatures.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
L-13 Security 1. Schedule up to Midterm 2/26 No class (work on project 1, hw3) Review 3/2 Monday 4:30 pm NSH 3002 HW 3 due Midterm 3/3 Tuesday in class.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Lecture 24 Cryptography CPE 401 / 601 Computer Network Systems slides are modified from Jim Kurose and Keith Ross and Dave Hollinger.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Secure Communication with an Insecure Internet Infrastructure.
Secure Communication with an Insecure Internet Infrastructure Lecture Nov. 21 st 2006 Dan Wendlandt.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
L-24 Security 1. Today's Lecture Internet security weaknesses Establishing secure channels (Crypto 101) Key distribution 2.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Cryptography, Authentication and Digital Signatures
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
IS 302: Information Security and Trust Week 5: Integrity 2012.
EE515/IS523 Think Like an Adversary Lecture 4 Crypto in a Nutshell Yongdae Kim.
Message Authentication Code July Message Authentication Problem  Message Authentication is concerned with:  protecting the integrity of a message.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
CSCI 172/283 Fall 2010 Hash Functions, HMACs, and Digital Signatures.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Lecture 2: Introduction to Cryptography
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture 5.1: Message Authentication Codes, and Key Distribution
L-24 Security 1. Today's Lecture Internet security weaknesses Establishing secure channels (Crypto 101) Key distribution 2.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Distributed Systems Fall 2016
Distributed Systems Fall 2016
Basics of Cryptography
Public Key Encryption and Digital Signatures
Secure Communication with an Insecure Internet Infrastructure
Security through Encryption
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
Introduction to Symmetric-key and Public-key Cryptography
Chapter 29 Cryptography and Network Security
Presentation transcript:

Security: An Overview of Cryptographic Techniques /440 With slides from: Debabrata Dash, Nick Feamster, Gregory Kesden, Vyas Sekar and others

2 Cryptography, Cryptographic Protocols and Key Distribution Authentication Mutual Authentication Private/Symmetric Keys Public Keys Key Distribution

3 What do we need for a secure communication channel? Authentication (Who am I talking to?) Confidentiality (Is my data hidden?) Integrity (Has my data been modified?) Availability (Can I reach the destination?)

4 What is cryptography? "cryptography is about communication in the presence of adversaries." - Ron Rivest “cryptography is using math and other crazy tricks to approximate magic” - Unknown TA

5 What is cryptography? Tools to help us build secure communication channels that provide: 1) Authentication 2) Integrity 3) Confidentiality

6 Cryptography As a Tool Using cryptography securely is not simple Designing cryptographic schemes correctly is near impossible. Today we want to give you an idea of what can be done with cryptography. Take a security course if you think you may use it in the future

7 The Great Divide Symmetric Crypto (Private key) (E.g., AES) Asymmetric Crypto (Public key) (E.g., RSA) Shared secret between parties? Yes Speed of crypto operations Slow No Fast

8 Symmetric Key: Confidentiality Motivating Example: You and a friend share a key K of L random bits, and want to secretly share message M also L bits long. Scheme: You send her the xor(M,K) and then she “decrypts” using xor(M,K) again. 1)Do you get the right message to your friend? 2)Can an adversary recover the message M? 3)Can adversary recover the key K?

9 Symmetric Key: Confidentiality One-time Pad (OTP) is secure but usually impactical  Key is as long at the message  Keys cannot be reused (why?) Stream Ciphers: Ex: RC4, A5 Block Ciphers: Ex: DES, AES, Blowfish In practice, two types of ciphers are used that require constant length keys:

10 Symmetric Key: Confidentiality Stream Ciphers (ex: RC4) PRNG Pseudo-Random stream of L bits Message of Length L bits XOR = Encrypted Ciphertext K A-B Bob uses K A-B as PRNG seed, and XORs encrypted text to get the message back (just like OTP). Alic e:

11 Symmetric Key: Confidentiality Block 4Block 3Block 2Block 1 Round #1Round #2Round #n Block 1 Block Ciphers (ex: AES) K A-B Alice: Bob breaks the ciphertext into blocks, feeds it through decryption engine using K A-B to recover the message. Block 2Block 3Block 4 (fixed block size, e.g. 128 bits)

12 Cryptographic Hash Functions Consistent hash(X) always yields same result One-way given Y, can’t find X s.t. hash(X) = Y Collision resistant given hash(W) = Z, can’t find X such that hash(X) = Z Hash Fn Message of arbitrary length Fixed Size Hash

13 Symmetric Key: Integrity Hash Message Authentication Code (HMAC) Hash Fn Message MACMessage Alice Transmits Message & MAC Why is this secure? How do properties of a hash function help us? MAC Step #1: Alice creates MAC Step #2Step #3 Bob computes MAC with message and K A-B to verify. K A-B

14 Symmetric Key: Authentication You already know how to do this! (hint: think about how we showed integrity) Hash Fn I am Bob A43FF234 Alice receives the hash, computes a hash with K A-B, and she knows the sender is Bob whoops! K A-B

15 Symmetric Key: Authentication What if Mallory overhears the hash sent by Bob, and then “replays” it later? ISP A ISP D ISP C ISP B Hello, I’m Bob. Here’s the hash to “prove” it A43FF234

16 Symmetric Key: Authentication A “Nonce”  A random bitstring used only once. Alice sends nonce to Bob as a “challenge”. Bob Replies with “fresh” MAC result. Hash Nonce B4FE64 Bob K A-B Nonce B4FE64 Alice Performs same hash with K A-B and compares results

17 Symmetric Key: Authentication A “Nonce”  A random bitstring used only once. Alice sends nonce to Bob as a “challenge”. Bob Replies with “fresh” MAC result. Nonce Alice ?!?! If Alice sends Mallory a nonce, she cannot compute the corresponding MAC without K A-B Mallory

18 Symmetric Key Crypto Review Confidentiality: Stream & Block Ciphers Integrity: HMAC Authentication: HMAC and Nonce Questions?? Are we done? Not Really: 1)Number of keys scales as O(n 2 ) 2)How to securely share keys in the first place?

19 Asymmetric Key Crypto: Instead of shared keys, each person has a “key pair” Bob’s public key Bob’s private key KBKB K B -1 The keys are inverses, so: K B -1 ( K B (m) ) = m

20 Asymmetric Key Crypto: It is believed to be computationally unfeasible to derive K B -1 from K B or to find any way to get M from K B (M) other than using K B -1. => K B can safely be made public. Note: We will not explain the computation that K B (m) entails, but rather treat these functions as black boxes with the desired properties.

21 Asymmetric Key: Confidentiality ciphertext encryption algorithm decryption algorithm Bob’s public key plaintext message K B (m) Bob’s private key m = K B -1 ( K B (m) ) KBKB K B -1

22 Asymmetric Key: Sign & Verify The message must be from Bob, because it must be the case that S = K B -1 (M), and only Bob has K B -1 ! If we are given a message M, and a value S such that K B (S) = M, what can we conclude? This gives us two primitives: Sign (M) = K B -1 (M) = Signature S Verify (S, M) = test( K B (S) == M )

23 Asymmetric Key Review: Confidentiality: Encrypt with Public Key of Receiver Integrity: Sign message with private key of the sender Authentication: Entity being authenticated signs a nonce with private key, signature is then verified with the public key But, these operations are computationally expensive*

24 Biometrics Nice in some respects No need to distribute Reducible to digital form Unique in practice Hard to duplicate? Used via binary representation Warm gelatin fingers or slip-on finger-pads molded to prints? Artificial eyeballs made to match scans? Pictures? Videos w/blinking? Change over time? Injury? Aging? Not replaceable or revocable What happens when “stolen?” Are you “Deleted”?!?!? (Well, you do have 10 fingers, two retinas, one nose, etc)

25 Multi-Factor, Human Factors Best systems use more than one factor Something you know Something piece of you Biometrics + Password/Q&A Challenge, Etc More natural factors better than fewer unnatural challenges More weak factors may be stronger than fewer stronger factors Human factors are critical Too many password restrictions? Too many passwords? Write them down on Post-Its Notes!

26 Summary – Part II Symmetric (pre-shared key, fast) and asymmetric (key pairs, slow) primitives provide:  Confidentiality  Integrity  Authentication “Hybrid Encryption” leverages strengths of both. Great complexity exists in securely acquiring keys. Crypto is hard to get right, so use tools from others, don’t design your own (e.g. TLS).