Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Digital Signatures and Hash Functions. Digital Signatures.
Information Security 1 Information Security: Lecture no 7 Jeffy Mwakalinga.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Review For Exam 3 (April 15, 2010) © Abdou Illia – Spring 2010.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Encryption Methods By: Michael A. Scott
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Chapter 3.  Chapter 1 introduced the threat environment  Chapter 2 introduced the plan-protect- respond cycle and covered the planning phase  Chapters.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
The Elements of Cryptography (April 1, 2015) © Abdou Illia – Spring 2015.
MT311 Java Application Development and Programming Languages Li Tak Sing ( 李德成 )
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Cryptography, Authentication and Digital Signatures
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Confidentiality Confidentiality is maintained so long as private keys are secure. Authenticity is possible via public-key encryption by encrypting messages.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Digital Signatures, Message Digest and Authentication Week-9.
1 The Elements of Cryptography Chapter 7 Copyright 2003 Prentice-Hall.
Lecture 2: Introduction to Cryptography
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Security Celia Li Computer Science and Engineering York University.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
Encryption Encryption: Transforms Message so that Interceptor Cannot Read it –Plaintext (original message) Not necessarily text; Can be graphics, etc.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Unit 3 Section 6.4: Internet Security
Computer Communication & Networks
NET 311 Information Security
Security through Encryption
The Elements of Cryptography
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Operating Systems Concepts
Presentation transcript:

Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of Impostors –Uses encryption –So encryption is not only for privacy and confidentiality!

Authentication Authentication methods: Passwords –Most users pick short passwords that are easy to guess with exhaustive search –Users often pick passwords that are common words or repetitive letter combinations; Even easier to guess –Automated password cracking is very effective

Authentication Authentication methods: Passwords –Often, weak passwords protect more important systems –Users must be forced to pick long passwords containing case changes and numerals, such as Tri6Vial

Authentication Authentication methods –Biometrics Fingerprint analysis, iris analysis, etc. New and not standardized –Authentication Card Push into slot of a machine Also must give password usually –Public Key Authentication Prove that sender holds their private key, which only they should know

Authentication Verifier is the party who wishes the other party to authenticate themselves Applicant is the other party, which wishes to prove its identity Applicant Verifier Prove Your Identity

Challenge-Response Authentication Verifier sends the applicant a challenge message –This challenge message is a string of bits Applicant Verifier Challenge Message

Challenge-Response Authentication Applicant sends back a response message –This is the challenge message encrypted with the applicant’s private key Applicant Verifier Response Message

Challenge-Response Authentication Verifier decrypts the response message with the true party’s public key –If matches the challenge message, was encrypted with the true party’s private key, which only the true party should know –Applicant is authenticated Applicant Verifier Response Message Challenge Message

Frequency of Authentication Challenge-Response Authentication –Only done initially –Or done at most a few times during a session Digital Signature Authentication (next) –Provides authentication for every message –Called message-by-message authentication –Also provides message integrity—proof that the message has not been changed en route

Public Key Authentication Ultimate goal is to send an original plaintext message from the applicant to the verifier –If security was not an issue, the applicant simply would send it Applicant Verifier Original Plaintext

Public Key Authentication Ultimate goal is to send an original plaintext message from the applicant to the verifier –If only confidentiality was an issue, would merely encrypt the original plaintext with a symmetric session key Applicant Verifier Ciphertext Using Symmetric Key

Public Key Authentication For authentication, also send a digital signature with each packet First create a message digest (MD) –A small binary string calculated on the basis of all of the bits in the message Message Digest Calculation

Public Key Authentication First create a message digest (MD) –Normally, use a process called hashing –For a message of arbitrary size, hashing produces a small number of predictable size –MD5: 128 bits –SHA-1: 160 bits Message Digest Hash

Public Key Authentication First create a message digest (MD) –Hashing is not reversible –Cannot get back original message if you know its hash –Just done to produce something small enough (message digest) to encrypt with public key encryption Message Digest Hash

Public Key Authentication Next create a digital signature –Encrypt the message digest with sender’s private key, which only the sender should be able to do –Also called signing the message digest with the sender’s private key Digital Signature Encrypt with Sender’s Private Key Message Digest

Public Key Authentication Next create a digital signature –Encrypt message digest with sender’s private key, which only the sender should be able to do; creates the digital signature –Message digest is short, so public key encryption is not too burdensome Digital Signature Encrypt with Sender’s Private Key Message Digest

Public Key Authentication Note –Message digest is a hash of the original message –MD is not encrypted –Digital signature is what you get when you encrypt the MD with public key encryption –Do not confuse the two Digital Signature Encrypt with Sender’s Private Key Message Digest

Public Key Authentication Encrypt combined message and digital signature with the symmetric session key and send to the receiver –This gives confidentiality (privacy) during transmission –Easy to forget the encryption with the symmetric session key Digital Signature Message Encrypt with symmetric session key

Public Key Authentication –Receiver decrypts ciphertext with symmetric session key –Then decrypts digital signature with sender’s public key to get the original message digest –This is the transmitted message digest Digital Signature Decrypt with Sender’s Public Key Transmitted Message Digest

Public Key Authentication –Receiver then hashes the original plaintext, just as the sender did –This is the computed message digest Original Plaintext Computed Message Digest Hashed

Public Key Authentication –If the transmitted and computed message digests match, the sender is authenticated as being the true party Because the digital signature was signed with the true party’ private key, as shown by decryption with the true party’s public key Message Digest from Digital Signature Message Digest Computed from Original Plaintext

Public Key Authentication Digital Signature also Provides Message Integrity –Proof that the message has not been altered en route –If message has been changed by error or by an attacker, message digests will not match Message Digest from Digital Signature Message Digest Computed from Original Plaintext