COMP3123 Internet Security Richard Henson University of Worcester October 2011.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
03 December 2003 Public Key Infrastructure and Authentication Mark Norman DCOCE Oxford University Computing Services.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Computer Science Public Key Management Lecture 5.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Digital Certificates. What is a Digital Certificate? A digital certificate is the equivalent of your business card in the e-commerce world. It says who.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
COMP3123 Internet Security Richard Henson University of Worcester October 2010.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
Linux Networking and Security Chapter 8 Making Data Secure.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Not only business information, but a large amount of personal information too is now digitized and stored in computer connected to the internet. System.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
COMP2113 E-business Richard Henson University of Worcester April 2008.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
COMP3371 Cyber Security Richard Henson University of Worcester October 2015.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
COMP3371 Cyber Security Richard Henson University of Worcester October 2015.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Digital Signatures and Digital Certificates Monil Adhikari.
Private key
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Fall 2006CS 395: Computer Security1 Key Management.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
1 Internet data security (HTTPS and SSL) Ruiwu Chen.
Richard Henson University of Worcester October 2016
Pooja programmer,cse department
Richard Henson University of Worcester October 2016
Fluency with Information Technology Lawrence Snyder
Presentation transcript:

COMP3123 Internet Security Richard Henson University of Worcester October 2011

Week 2: Cryptography n Objectives:  Describe a simple mathematical operation that could encrypt a text message  Explain the differences between symmetric and asymmetric encryption  Apply public-private key encryption to the sending of Internet  Explain why digital signatures are necessary in the real world, and how they can be implemented

Cryptography: an Answer to the problem of Data Breaches n Objective: make it impossible for the information to be read by “outsiders”… n Nothing new!  been happening for millennia…  many clever techniques devised n Technique of changing digital data in a mathematical reversible way known as ENCRYPTION  studies involving encryption - cryptography

What is Cryptography? n Cryptography is the science concerned with the protocols, practices, procedures to build components that make up a cryptosystem n The practical (intended) result… safely securing, storing, transmitting sensitive information  to conceal it from unauthorised persons  also applies to personal and financial data… n Associated concepts:  authenticity (proof of ownership)  integrity (ensuring that data is not tampered with)

OSI layers and the cryptosystem n All layers, and communications between them, are potential weaknesses n Hacking could occur:  at layer 1 »e.g. electronically, in communications equipment  or at layer 7… »Screen display n In both cases, encryption will be a good defence

How to focus security resources? n Depends on:  Circumstances – how much data has to be stored/processed in a given time  Risk – what is the likelihood of being hacked, losing business, and being fined…  Value of information – financial data obviously valuable, but so are e.g. commercial secrets

Message Authentication n Objective: ensuring that the message arrives:  intact & unmodified (integrity)  original authorship established (authenticity) n Authentication scheme:  inputs: secret key, message  output: message & authentication code

Encryption and Data Protection n Principle 7 of the 1984 (updated 1998) UK Data Protection Act:  “Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.” n No better technical measure to take than encrypting that data

Key Escrow and Key Recovery n Escrow: a system of checks and balances to ensure that privacy rights are not infringed where agencies need to get hold of encrypted information  separate agencies keep complementary components of the key system so no entity possesses a usable key  law enforcement agencies can only intervene to get all components: »under a court order in pursuit of criminal evidence or activity

What about HTML “Forms” type data n Anything from Facebook messages to personal details to get car insurance n As discussed last week…  Internet was designed to be an “open” system  IDs of devices based on IP address  Screen data converted via TCP/IP to signals and sent in packets - easily be intercepted by: »someone with a good knowledge of TCP/IP »any IT literate person with the appropriate software  this someone could be anywhere in the world!

What about data? n As with HTML forms… n That data at rest or moving round the Internet started on someone's computer (application layer)  once it has become TCP/IP packets on the Internet it is fair game for “man in the middle” attacks  at each end of the communication it is also vulnerable to copying

How does Encryption work? n Unencrypted data (or PLAIN text) sent over the Internet usually a sequence of ASCII codes  ASCII code generated at keyboard by converting a selected keyboard character into a particular binary number n This puts further coding onto each ASCII character in some reversible way before it is sent (as CIPHER text)

An Encryption system n Requirements…  a coding method (often a mathematical operation)  a numerical value used with the coding method n The ASCII codes can always be recovered by someone who knows the encryption method

Simple Encryption Example n Coding Method (or Algorithm) based on a mathematical operation  e.g. ADD n Key based on a numerical digit  e.g 5 n Data represented by an ASCII code…  not secure… very widely known n ASCII code -> via algorithm + key -> encrypted data

Example encryption in practice on ASCII codes… n Method of encryption – add 5 to each ASCII code (this would be the key)  e.g. plain text = HELLO (ASCII codes B 4B 4F)  e.g. cipher text = MJQQT (ASCII codes 4D 4A ) n Getting the original data back would mean subtracting 5 from each ASCII character – very easy to anyone with access to the key

Managing a single Encryption Key n The coding method and the key used to produce cipher text must be known in order to get back the plain text n However, these must be kept secret – anyone with access to the key and the algorithm can readily decrypt the encrypted data for themselves

Diagram – single key encryption User sends message via server server key Data is transmitted to another server key Message is coded Message is decoded Message is received

Effectiveness of Encryption n Only effective if:  either the key remains secret  or the algorithm remains secret n During WWII, the Germans thought they had an encryption method that was impossible to decipher n With the efforts of the Mathematicians at Bletchley Park, the key and algorithm were both deciphered

Encryption Techniques n Many techniques have been developed to enable digital data to be efficiently encrypted and decrypted n Examples:  DES (Data Encryption Standard)  IDEA (ID Encryption Algorithm)  RSA (Rivest, Shamir, Adleman)  Diffie-Hellmann n These can be classified into two types:  Symmetric Key  Asymmetric Key

Symmetric Encryption n The single, common key used by both sender and receiver is known as a symmetric key  encrypts and decrypts the message n Advantages: simple and fast n Disadvantages:  the two parties must need to exchange the key in a secure way  the sender cannot easily be authenticated

Asymmetric? n Asymmetric Key (two keys…)  Encryption: shared public key  Decryption: unshared private key  One way function

DES – an example of symmetric encryption n IBM/US gov, ; still popular  56-bit encryption working on 64-bit blocks of data n However, in view of recent research, clearly inadequate for really secure encryption   “Using P2P architecture and over 100,000 participants (using only idle CPU time), distributed.net was able to test 245 billion keys per second to break the 56 bit DES encryption algorithm in less than 24 hours (22 hours and 15 minutes).”

What levels of single key encryption are available? n The more complex the key, the more difficult the encryption method is to decipher  a single 40-digit key can be mathematically deduced very quickly using a computer »known as WEAK encryption  an equivalent 128-digit key would take much longer to “crack” »known as STRONG encryption n It makes sense to use 128-digit key encryption if at all possible….

Making Encryption as Effective as Possible n Commercial products may offer trade offs… n Strong encryption may cost a little more  Is the extra expense going to be justified?  e.g. Verisign 40-bit SSL »actually 128-bit within US »40-bit for any communications that go outside US borders…  e.g. Verisign Global Server SSL »“the world’s strongest encryption” »standard for large-scale online merchants, banks, brokerages, health care organisations and insurance companies worldwide  Verisign product will run on servers from: »any non-U.S. software vendor »a U.S. software vendor properly classified by the U.S. Department of Commerce

Breaking an Encryption Technique n Usually achieved with the aid of very powerful computers n The more powerful the computer, the more likely that the key can be mathematically deduced n Until fairly recently, a 128-bit encryption key would have been considered to be secure n However, a research team have now succeeded in breaking 128 bit encryption in seconds, using a supercomputer…

Secure Keys for Today and Tomorrow… n 256-bit encryption is probably now a minimum for single key encryption  but only a matter of time… n 512-bit encryption is currently used by financial institutions to transfer funds electronically via the Internet  again, only a matter of time before even this can be cracked…  Solution bit keys?

Authentication – encryption alone may not be enough, or even helpful n When data is on the move to a computer or device OUTSIDE a particular domain, there must be a technique for verifying that the user really who he or she claims to be n In paper correspondence, authentication is provided by a signature n A number of digital methods of signature are now available n Windows 2000 provides SIGVER (file signing)  a method of checking incoming files to ensure that they are from a Microsoft approved source

Asymmetric (two key) encryption n Announced in 1976 by Diffie and Hellman (US), but British scientists were secretly working on it much earlier and Ellis, at GCHQ made the first breakthrough in 1970 n Uses two keys:  public key - known to everyone  private or secret key - known only to the recipient of the message n Example: John wants to send a secure message to Jane…  He uses Jane's public key to encrypt the message  Jane then uses her private key to decrypt it n Original method did not support either encryption or digital signatures, and therefore was vulnerable to third party in the middle eavesdroppers

Public Key Encryption (PKE) Unencrypted data Decrypted data Encrypted data can work in two ways: private key encryption, public key decryption public key encryption, private key decryption Private key on sender’s computer Data sent through the Internet Received by recipient’s computer Public key on recipient computer

n The public and private keys must be related in such a way that  only the public key can be used to encrypt messages  only the corresponding private key can be used to decrypt them. n In theory it is virtually impossible to deduce the private key if you know the public key n PKE is also called asymmetric encryption because it uses two keys instead of one Public Key Encryption (PKE)

n Authentication of sender is ALSO needed for securely transmitting information via the Internet n A variety of techniques have been developed to achieve this:  Pretty Good Privacy (PGP)  Digital Certificates & Public Key Infrastructure (PKI) Practical Public Key Encryption

PGP (Pretty Good Privacy) n Developed by Philip Zimmerman  official repository held at the Massachusetts Institute of Technology n One of the most common ways to protect messages on the Internet:  Effective  easy to use  free n based on the public-key method  with authentication using a “web of trust” n To encrypt a message using PGP, the receiver needs the PGP encryption package  made available for free download from a number of Internet sources

PGP n Such an effective encryption tool that the U.S. government actually brought a lawsuit against Zimmerman n Case:  he made PGP public  hence made it available to enemies of the U.S. n After a public outcry, U.S. lawsuit was dropped n still illegal to use PGP in many other countries

Digital Signatures/Digital-IDs A unique 'security code' appended to an electronic document A unique 'security code' appended to an electronic document  the digital equivalent of a signature on a paper document »authenticates the sender »permits the authenticity of the document to be proven  also used the ensure the integrity of the message sent n Digital Signatures are supplied packaged within a digital certificate

Digital Certificate n A randomly generated number:  used to create the public-private key pair  Creates the attachment to an electronic message known as a digital signature n An individual wishing to send an encrypted message applies for a digital certificate from a Certificate Authority (CA)

Certificate Authorities n Example: verisign  n Trusted third-party organizations that issues the digital certificates used to create public- private key pairs n The role of the CA is to guarantee that the individual granted the unique certificate is, in fact, who he or she claims to be.

n Usually, this means that the CA has an arrangement with a financial institution, such as a credit card company n The finance company provides it with information to confirm an individual's claimed identity n CAs are a critical component in data security and e-commerce because they guarantee that the two parties exchanging information really are who they claim to be Certificate Authorities

n On request, a CA can produce an encrypted digital certificate for any applicant n Digital certificates contain:  the applicant's private key  a digital signature n The CA makes its own public key readily available on the Internet n The recipient of the encrypted message can use the CA's public key to decode the digital certificate attached to the message Supplying Digital Certificates

n The recipient:  verifies the digital signature as issued by the CA  obtains the sender's public key and digital signature held within the certificate n With this information, the recipient can send an encrypted reply n This procedure relies on the integrity of the CA, and the user must be able to trust them Digital Certificate (continued)

Digital Signatures: an increasing role in society… n Digital signatures allow online delivery of traditionally paper based correspondence  Contracts  Government forms such as tax returns  anything else that would require a hand-written signature for authentication… n The flip side of this is that information submitted WITHOUT a digital signature has NOT been authenticated, and a further means of proof of identity of sender should be sought

Authentication, Identity, and Identity Theft n Authentication alone is not enough  username/password may be stolen (or even borrowed with permission!) n Need proof:  something only that person would know…  something unique to that person Biometric data) n More on this later…