EE515/IS523 Think Like an Adversary Lecture 3 Crypto Yongdae Kim 한국과학기술원.

Slides:



Advertisements
Similar presentations
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Digital Signatures and Hash Functions. Digital Signatures.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Information Security Principles & Applications Topic 4: Message Authentication 虞慧群
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
SMUCSE 5349/73491 Authentication Protocols. SMUCSE 5349/73492 The Premise How do we use perfect cryptographic mechanisms (signatures, public-key and symmetric.
G Robert Grimm New York University Using Encryption for Authentication in Computer Networks.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
CS526Topic 5: Hash Functions and Message Authentication 1 Computer Security CS 526 Topic 5 Cryptography: Cryptographic Hash Functions And Message Authentication.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
Cryptography, Authentication and Digital Signatures
EE515/IS523 Think Like an Adversary Lecture 4 Crypto in a Nutshell Yongdae Kim.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
IS511 Introduction to Information Security Lecture 4 Cryptography 2
1 Overview of Cryptography. Contents Introduction Symmetric-key cryptography Block ciphers Symmetric-key algorithms Cipher block modes Stream cipher Public-key.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
EE515/IS523 Think Like an Adversary Lecture 4 Crypto in a Nutshell Yongdae Kim.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
EE515/IS523 Think Like an Adversary Lecture 5 Access Control in a Nutshell Yongdae Kim.
Network Security David Lazăr.
IS511 Introduction to Information Security Lecture 3 Cryptography 1 Yongdae Kim.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 2: Message integrity.
Digital Signatures, Message Digest and Authentication Week-9.
Protocols Chapter 2 Protocol: A series of steps, involving two or more parties, designed to accomplish a task. All parties involved must know the protocol.
Cryptographic Hash Functions and Protocol Analysis
Cryptography: Digital Signatures Message Digests Authentication
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Computer and Network Security - Message Digests, Kerberos, PKI –
Hash Functions Ramki Thurimella. 2 What is a hash function? Also known as message digest or fingerprint Compression: A function that maps arbitrarily.
EE515/IS523 Think Like an Adversary Lecture 4 Cryptography/Access Control in a Nutshell Yongdae Kim.
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
1 Authentication Protocols Rocky K. C. Chang 9 March 2007.
Lecture 22 Network Security (cont) CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger slides are modified from Jim Kurose,
Chapter 3 Basic Protocols. 3.1 Key Exchange n Session Key - Why? n Key Exchange with Symmetric Cryp. KDC request E KA (K AB ), E KB (K AB ) E KB (K AB.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Data Integrity / Data Authentication. Definition Authentication (Signature) algorithm - A Verification algorithm - V Authentication key – k Verification.
CS555Spring 2012/Topic 141 Cryptography CS 555 Topic 14: CBC-MAC & Hash Functions.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
IS511 Introduction to Information Security Lecture 3 Public Key Cryptography and Key Management Yongdae Kim.
Computer Communication & Networks
Information Security message M one-way hash fingerprint f = H(M)
Basic Network Encryption
Information Security message M one-way hash fingerprint f = H(M)
Digital Signatures Last Updated: Oct 14, 2017.
EE515/IS523 Think Like an Adversary Lecture 5 Access Control in a Nutshell Yongdae Kim.
Introduction to Symmetric-key and Public-key Cryptography
Information Security message M one-way hash fingerprint f = H(M)
Basic Network Encryption
Security: Integrity, Authentication, Non-repudiation
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

EE515/IS523 Think Like an Adversary Lecture 3 Crypto Yongdae Kim 한국과학기술원

Admin  Homepage ▹  Survey ▹ student information survey ▹ paper presentation and news posting preference  Find your group members and discuss about projects

Encryption  Why do we use key? ▹ Or why not use just a shared encryption function? 2 Plaintext source Encryption E e (m) = c destination Decryption D d (c) = m c insecure channel AliceBob Adversary m m

SKE with Secure channel 3 Plaintext source Encryption E e (m) = c destination Decryption D d (c) = m c Insecure channel AliceBob Adversary Key source e mm d Secure channel

PKE with Insecure Channel 4 Plaintext source Encryption E e (m) = c destination Decryption D d (c) = m c Insecure channel AliceBob Passive Adversary Key source d mm e Insecure channel

Public Key should be authentic! 5 e e E e (m) e’e’e’e’ E e’ (m) E e (m)

Hash Function  A hash function is a function h satisfying ▹ h:{0, 1} *  {0, 1} k (Compression)  A cryptographic hash function is a hash function satisfying ▹ It is easy to compute y=h(x) (ease of computation) ▹ For a given y, it is hard to find x’ such that h(x’)=y. (onewayness) ▹ It is hard to find x and x’ such that h(x)=h(x’) (collision resistance)  Examples: SHA-1, MD-5 6

How Random is the Hash function?

Applications of Hash Function  File integrity  Digital signature Sign = S SK (h(m))  Password verification stored hash = h(password)  File identifier  Hash table  Generating random numbers

Hash function and MAC  A hash function is a function h ▹ compression ▹ ease of computation ▹ Properties »one-way: for a given y, find x’ such that h(x’) = y »collision resistance: find x and x’ such that h(x) = h(x’) ▹ Examples: SHA-1, MD-5  MAC (message authentication codes) ▹ both authentication and integrity ▹ MAC is a family of functions h k »ease of computation (if k is known !!) »compression, x is of arbitrary length, h k (x) has fixed length »computation resistance ▹ Example: HMAC

MAC construction from Hash  Prefix ▹ M=h(k||x) ▹ appending y and deducing h(k||x||y) form h(k||x) without knowing k  Suffix ▹ M=h(x||k) ▹ possible a birthday attack, an adversary that can choose x can construct x’ for which h(x)=h(x’) in O(2 n/2 )  STATE OF THE ART: HMAC (RFC 2104) ▹ HMAC(x)=h(k||p 1 ||h(k|| p 2 ||x)), p1 and p2 are padding ▹ The outer hash operates on an input of two blocks ▹ Provably secure

How to use MAC?  A & B share a secret key k  A sends the message x and the MAC M←H k (x)  B receives x and M from A  B computes H k (x) with received M  B checks if M=H k (x)

PKE with Insecure Channel 12 Plaintext source Encryption E e (m) = c destination Decryption D d (c) = m c Insecure channel AliceBob Passive Adversary Key source d mm e Insecure channel

Digital Signature  Integrity  Authentication  Non-repudiation I did not have intimate relations with that woman,…, Ms. Lewinsky

Digital Signature with Appendix M m mhmh MhMh h s* S S A,k M h x S {True, False} VAVA s* = S A,k (m h ) u = V A (m h, s*)

Authentication  How to prove your identity? ▹ Prove that you know a secret information  When key K is shared between A and Server ▹ A  S: HMAC K (M) where M can provide freshness ▹ Why freshness?  Digital signature? ▹ A  S: Sig SK (M) where M can provide freshness  Comparison?

Encryption and Authentication  E K (M)  Redundancy-then-Encrypt: E K (M, R(M))  Hash-then-Encrypt: E K (M, h(M))  Hash and Encrypt: E K (M), h(M)  MAC and Encrypt: E h1(K) (M), HMAC h2(K) (M)  MAC-then-Encrypt: E h1(K) (M, HMAC h2(K) (M))

Challenge-response authentication  Alice is identified by a secret she possesses ▹ Bob needs to know that Alice does indeed possess this secret ▹ Alice provides response to a time-variant challenge ▹ Response depends on both secret and challenge  Using ▹ Symmetric encryption ▹ One way functions

Challenge Response using SKE  Alice and Bob share a key K  Taxonomy ▹ Unidirectional authentication using timestamps ▹ Unidirectional authentication using random numbers ▹ Mutual authentication using random numbers  Unilateral authentication using timestamps ▹ Alice  Bob: E K (t A, B) ▹ Bob decrypts and verified that timestamp is OK ▹ Parameter B prevents replay of same message in B  A direction

Challenge Response using SKE  Unilateral authentication using random numbers ▹ Bob  Alice: r b ▹ Alice  Bob: E K (r b, B) ▹ Bob checks to see if r b is the one it sent out »Also checks “B” - prevents reflection attack ▹ r b must be non-repeating  Mutual authentication using random numbers ▹ Bob  Alice: r b ▹ Alice  Bob: E K (r a, r b, B) ▹ Bob  Alice: E K (r a, r b ) ▹ Alice checks that r a, r b are the ones used earlier

Challenge-response using OWF  Instead of encryption, used keyed MAC h K  Check: compute MAC from known quantities, and check with message  SKID3 ▹ Bob  Alice: r b ▹ Alice  Bob: r a, h K (r a, r b, B) ▹ Bob  Alice: h K (r a, r b, A)

Key Establishment, Management  Key establishment ▹ Process to whereby a shared secret key becomes available to two or more parties ▹ Subdivided into key agreement and key transport.  Key management ▹ The set of processes and mechanisms which support key establishment ▹ The maintenance of ongoing keying relationships between parties

Kerberos vs. PKI vs. IBE  Still debating  Let’s see one by one!

Kerberos (cnt.) T A B A, B, N A E KBT (k, A, L), E KAT (k, N A, L, B) E KBT (k, A, L), E k (A, T A, A subkey ) E k (T A, B subkey ) E KBT (k, A, L): Token for BE KBT (k, A, L): Token for B E KAT (k, N A, L, B): Token for AE KAT (k, N A, L, B): Token for A L: Life-timeL: Life-time N A ?N A ? E k (A, T A, A subkey ): To prove B that A knows kE k (A, T A, A subkey ): To prove B that A knows k T A : Time-stampT A : Time-stamp E k (B, T A, B subkey ): To prove A that B knows kE k (B, T A, B subkey ): To prove A that B knows k

Kerberos (Scalable) T (AS) A B A, G, N A E KGT (k AG, A, L), E KAT (k AG, N A, L, G) E KGB (k AB, A, L, N A ’), E kAB (A, T A ’, A subkey ) E k (T A ’, B subkey ) G (TGS) E KGT (k AG, A, L), E kAG (A, T A ), B, N A ’ E KAG (k AB, N A ’, L, B), E kGB (k AB, A, L, N A ’), B, NA’

Public Key Certificate  Public-key certificates are a vehicle ▹ public keys may be stored, distributed or forwarded over unsecured media  The objective ▹ make one entity’s public key available to others such that its authenticity and validity are verifiable.  A public-key certificate is a data structure ▹ data part »cleartext data including a public key and a string identifying the party (subject entity) to be associated therewith. ▹ signature part »digital signature of a certification authority over the data part »binding the subject entity’s identity to the specified public key.

CA  a trusted third party whose signature on the certificate vouches for the authenticity of the public key bound to the subject entity ▹ The significance of this binding must be provided by additional means, such as an attribute certificate or policy statement.  the subject entity must be a unique name within the system (distinguished name)  The CA requires its own signature key pair, the authentic public key.  Can be off-line!

ID-based Cryptography  No public key  Public key = ID ( , name, etc.)  PKG ▹ Private key generation center ▹ SK ID = PKG S (ID) ▹ PKG’s public key is public. ▹ distributes private key associated with the ID  Encryption: C= E ID (M)  Decryption: D SK (C) = M

Discussion (PKI vs. Kerberos vs. IBE)  On-line vs. off-line TTP ▹ Implication?  Non-reputation?  Revocation?  Scalability?  Trust issue?

Questions?  Yongdae Kim ▹ ▹ Home: ▹ Facebook: ▹ Twitter: ▹ Google “Yongdae Kim” 29