Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.

Slides:



Advertisements
Similar presentations
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Advertisements

First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Chapter 5 Cryptography Protecting principals communication in systems.
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Public Key Algorithms 4/17/2017 M. Chatterjee.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Chapter 20: Network Security Business Data Communications, 4e.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
Encryption Methods By: Michael A. Scott
Network Security Sorina Persa Group 3250 Group 3250.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 12 Cryptography (slides edited by Erin Chambers)
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Linux Networking and Security Chapter 8 Making Data Secure.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 2 “Cryptographic Tools”.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Lecture 2: Introduction to Cryptography
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Public Key Encryption, Secure WWW Transactions & Digital Signatures.
Cryptography and Its Algorithms Scott Chappell. What is Cryptography?  Definition: the art of writing or solving codes.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security Celia Li Computer Science and Engineering York University.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Encryption Encryption: Transforms Message so that Interceptor Cannot Read it –Plaintext (original message) Not necessarily text; Can be graphics, etc.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Public-key Cryptography
Security through Encryption
PART VII Security.
Public-Key, Digital Signatures, Management, Security
Fluency with Information Technology Lawrence Snyder
Presentation transcript:

Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University Based on Chapter 18 of William Stallings, Data and Computer Communication, 6 th Ed.

Encryption No. 2  Seattle Pacific University Living in a Glass House Public networks are public... Chances for eavesdropping or worse LANs – may broadcast all packets to all stations within your collision domain WANs - shared public resources Service providers Hackers at every point... Network model is inherently insecure Passing data to an unreliable third party many times over

Encryption No. 3  Seattle Pacific University The Need for Encryption Transmission of sensitive data Classical use of encryption Sender encodes data in such a way that only the intended recipient(s) can decipher it Identity verification Sender provides a digital signature that cannot be easily produced by any other entity Receiver can easily verify signature Data encoding and Digital Signatures can be provided using encryption

Encryption No. 4  Seattle Pacific University Goals for an Encryption Scheme Difficult to break Probability of breaking the code within any reasonable amount of time should be very small Fast encoding and decoding If encoding/decoding is too complex or too slow, users will bypass it Easy distribution of keys Secret key distribution can be an issue Frequent key changes needed for security

Encryption No. 5  Seattle Pacific University Code Breaking Assume that the attacker has: Samples of matched plaintext and ciphertext Lots of computing power Knowledge of the plaintext language Cryptanalysis Gather information that you can Size of documents, plaintext/ciphertext pairs, frequency of documents, language Think really hard Brute force Randomly try keys until something works Bits in keyTime to crack (10 6 encryptions/s) min years x years x years

Encryption No. 6  Seattle Pacific University Symmetric Encryption Sender and all recipients use the same key Sender encrypts plaintext using the common secret key Encrypted ciphertext is sent over a public channel Receiver decrypts ciphertext back into plaintext using the common secret key PlaintextCiphertextPlaintextCiphertext Public Network Symmetric Encryption requires that sender and receiver both know the same secret key

Encryption No. 7  Seattle Pacific University DES - Data Encryption Standard DES – US government standard from Symmetric encryption 56-bit key Basic idea: Repeatedly XOR and shift XORing - Great for encryption plaintext xor key ciphertext xor key plaintext A special DES-cracking machine built by the Electronic Frontier Foundation in 1999 can crack DES in under three days. --> DES is dead

Encryption No. 8  Seattle Pacific University Replacing DES Triple DES (TDEA) Run DES three times, yielding a key length of 168 bits Short-term replacement for DES Advanced Encryption Standard (AES) / Rijndael US Approved in 2002 Block algorithm, 128, 192, or 256-bit key 128-bit approved through US “Secret” 192+ bits approved for US “Top Secret”

Encryption No. 9  Seattle Pacific University Key Distribution With symmetric codes, both sender and receiver need to have the secret key How does the sender safely send the key? 1. Send it manually via secure courier Expensive, time-consuming 2. Send a new key using the previous key Fine, but what if the old key was compromised? 3. Use a key distribution center Sender requests that a session key be sent to both the sender and receiver Key is used for this session only

Encryption No. 10  Seattle Pacific University Public-Key Encryption Receiver has two matched keys - Public and Private Public key can only encode – private key needed to decode Sender encrypts plaintext using the Public Key Encrypted ciphertext is sent over a public channel Receiver decrypts ciphertext back into plaintext using the Receiver’s Private Key Receiver sends Receiver’s Public Key to the Sender Public Network Pub Priv Pub Priv Sender Receiver PlaintextCiphertextPlaintextCiphertext Pub

Encryption No. 11  Seattle Pacific University RSA Public Key Encryption Rivest, Shamir, Adleman (1977) Involves the use of the product of two (large) prime numbers Public and Private Keys include the above product and some mathematical functions of the prime factors Cracking the code Factoring the product will crack the code... RSA authors (in 1977) predicted a 428-bit code would take 40,000,000,000,000 years to crack Internet consortium cracked it in bit or more keys are used today...

Encryption No. 12  Seattle Pacific University Public Key Issues Man-in-the-Middle Imposters An imposter might send you an encrypted message Requires sender authentication RSA is slow Complicated math, 1024-bit (or more) keys Symmetric codes are faster Use a combined public key/symmetric method Establish a session using public key methods Send the receiver a session key for a symmetric method Use the symmetric key for the rest of the session

Encryption No. 13  Seattle Pacific University Sender Authentication PlaintextCiphertext of Hash PlaintextCiphertext of Hash Public Network Pub Priv Pub Priv Sender Receiver Pub Sender “encrypts” document using sender’s private key This document is sent to the receiver Receiver decrypts signature using sender’s public key If document is readable, it must have been encrypted using the sender’s private key, which only the sender has access to

Encryption No. 14  Seattle Pacific University Public-Key Encryption + Authentication Sender sends document using public key encryption Digital Signature Ciphertext of DS Digital Signature Ciphertext of DS Public Network Pub Priv Pub Priv Sender Receiver Plaintext CiphertextPlaintextCiphertext Pub Sender computes a digital signature of the document using a one-way hash function Sender sends digital signature of document using authentication methods =? Receiver authenticates encrypted message message by confirming that digital signature matches received plaintext