Section 3: Public Key, Digital Signature

Slides:



Advertisements
Similar presentations
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Advertisements

Digital Signatures and Hash Functions. Digital Signatures.
Public Key Encryption Algorithm
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Security Chapter The security environment 9.2 Basics of cryptography 9.3 User authentication 9.4 Attacks from inside the system 9.5 Attacks from.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
EEC-484/584 Computer Networks Lecture 16 Wenbing Zhao
Public Key Cryptography
EEC-484/584 Computer Networks Lecture 16 Wenbing Zhao
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
EEC-484/584 Computer Networks Lecture 18 Wenbing Zhao (Part of the slides are based on materials supplied by Prentice-Hall)
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Chapter 3 Encryption Algorithms & Systems (Part C)
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
Network Security Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Rachana Y. Patil 1 1.
Lecture 15 Lecture’s outline Public algorithms (usually) that are each other’s inverse.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Midterm Review Cryptography & Network Security
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Chapter 21 Public-Key Cryptography and Message Authentication.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Theory of Computation II Topic presented by: Alberto Aguilar Gonzalez.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
CSCE 815 Network Security Lecture 8 SHA Operation and Kerberos.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
Prepared by Dr. Lamiaa Elshenawy
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
Network Security. Three tools Hash Function Block Cipher Public Key / Private Key.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Cryptography and Network Security Chapter 13
Chapter 3 - Public-Key Cryptography & Authentication
Presentation transcript:

Section 3: Public Key, Digital Signature Network Security Section 3: Public Key, Digital Signature

New Algorithm Requirements Definitions: E = Encryption Key D = Decryption Key New Requirements: D(E(P)) = P E #> D E not crack-able by “known texts” attack.

Example ABCDEFGHI P Eb Eb(P) ****************** Send to Bob Alice Ea, Da Ea Bob reads P D(Eb(P)) ABCDEFGHI ****************** Eb(P) Bob Eb,Db

RSA Adelman Shmir Rivest

RSA One of the public key algorithms RSA Algorithm: Chose two number p & q (1024bit) n=p×q and z=(p-1)×(q-1) Choose a number d that is relatively prime to z e: e×d mod z = 1 Divde P to blocks, 0 <= block length < n C = Pe mod n Exit. OK. Where is the security location?

RSA Example p = 3, q = 11 n = 33, z = 20, d = 7, e = 3 HOOORAY! OK! Lets finish cryptography algorithms HOOORAY! p = 3, q = 11 n = 33, z = 20, d = 7, e = 3 No more cryptography algorithms PLEASE!

Authorization and Validity Digital Signatures Why do we use signatures? Authorization and Validity What is the problem of signature in digital world? Authorize sender Message must be undeniable from sender’s prospective. Receiver can not produce fake messages.

Symmetric-Key Signatures Store signature on valid institute (BB: Big Brother). What is the problem of this method? Do you trust Big Brother?

Public-Key Signatures E(D(P)) = P D(E(P)) = P Public-Key Signatures Yes! How? Be lost Da!! Changing Da!! Can Alice evade message P? No! Why?

Message Digests Digital Signature do both authorization and confidentiality of message Message Digests only authorize messages. MD features: Easy Calculation of MD(P) MD(P) #> P MD(P) # MD(Q) MD(P) # MD(P+1)

MD5 MD5: 5th Message Digest. 128bit buffer md5(apple) = 1f3870be274f6c49b3e31a0c6728957f

SHA-1 Secure Hash Algorithm Developed by NSA 160bit buffer

The Birthday attack Problem: If it is easy to find two random messages that map to the same signature then a birthday attack is easy Example: the probability of 2 people having the same birthday in a group of 23 people is more than 0.5