Cryptography: Digital Signatures Message Digests Authentication

Slides:



Advertisements
Similar presentations
Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
Advertisements

CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Netprog: Cryptgraphy1 Cryptography Reference: Network Security PRIVATE Communication in a PUBLIC World. by Kaufman, Perlman & Speciner.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
 Public key (asymmetric) cryptography o Modular exponentiation for encryption/decryption  Efficient algorithms for this o Attacker needs to factor large.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 30 Message Security, User Authentication, and Key Management.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Network Security Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Chapter 13 Digital Signature
Chapter 31 Network Security
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
EEC 688/788 Secure and Dependable Computing
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
IT 221: Introduction to Information Security Principles Lecture 6:Digital Signatures and Authentication Protocols For Educational Purposes Only Revised:
Cryptography, Authentication and Digital Signatures
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
EE515/IS523 Think Like an Adversary Lecture 4 Crypto in a Nutshell Yongdae Kim.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 2: Message integrity.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Digital Signatures, Message Digest and Authentication Week-9.
Lecture 2: Introduction to Cryptography
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Ch 13 Trustworthiness Myungchul Kim
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
DIGITAL SIGNATURE(DS) IN VIDEO. Contents  What is Digital Signature(DS)?  General Signature Vs. Digital Signatures  How DS is Different from Encryption?
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
Computer Communication & Networks
Basic Network Encryption
NET 311 Information Security
Cryptography Reference: Network Security
Basic Network Encryption
Presentation transcript:

Cryptography: Digital Signatures Message Digests Authentication Security in Computing Cryptography: Digital Signatures Message Digests Authentication

Digital Signatures Non-repudiation (non-denial) How do you legally prove who actually send you the message? Receiver can verify the claimed identity of sender Sender cannot later repudiate contents of the message Receiver cannot possibly have concocted message by himself/herself

Digital Signatures Purpose Authenticity of legal / financial documents is determined by authorised handwritten signatures Photocopies may be forged and don’t count! Growing need for computing systems to replace physical transport of paper documents The problem is devising a method of “digital signatures” to be used as legal signatures

Digital Signatures Symmetric Scheme A, KA (B, RA, t, M) Trusted Central Authority (CA) is needed CA shares secret key K with sender (Alice) and receiver (Bob): KA and Kb Alice (A)sends message (M)encrypted with her key (KA) to her banker Bob (B) via CA A, KA (B, RA, t, M) A = Alice’s identity; B = Bob’s identity; RA = Random number chosen by Alice; t = timestamp to ensure freshness KA(...) means the message is encrypted using the secret key Alice shares with CA

Digital Signatures CA sees message is from Alice and decrypts it using Alice’s secret key, KA CA then uses Bob’s secret, KB, to encrypt an extended message containing: Alice’s original plaintext message to Bob the “signed message” encrypted with CA’s secret key, KCA(A, t, M) Extended message is then sent to Bob KB (A, RA, t, M, KCA(A, t, M)) KA(...) means the message is encrypted using the secret key Alice shares with CA

Digital Signatures Verification: A case in Court Alice later denies sending message to Bob Bob tells judge that CA will only accept message form Alice if encrypted with her key, KA Bob produces Exhibit 1: KCA(A, t, M)) Judge asks trustworthy CA to decrypt Exhibit I who also testifies that Bob is telling the truth Judge rules in favour of Bob, case dismissed!

Digital Signatures Problems Digital Signature Public key Scheme? Replay attacks: Timestamp; random number Digital Signature Public key Scheme? Using timestamps throughout minimises the problem Based on timestamps old messages are rejected To guard against instant replay attacks Bob checks RA of every incoming message RA((Random number in Alice’s message) is checked to see if any other incoming message contains the same RA. If not then the assumption is that this is new message / request.

Message Digests Integrity One –way Hash function Digital signatures couple together two distinct functions (criticism): “authentication” (i.e. verification) & secrecy “Authentication” is often needed but secrecy is not Message digests provide a more efficient approach to digital signatures

Message Digests Comparing Digital Signature and Message Digests Digital Signature: A, KA(B, RA, t, M) (from Alice to Bob via CA) KB (A, RA, t, P, KCA(A, t, P)) (from CA to BOB) Extended message to Bob

Message Digests Message Digest Public Key Scheme? Message Digest: Instead, consider CA computing a message digest MD(P) by applying MD to P KB ( A, RA, t, P KCA( A, t, MD (P) ) ) Thus, message digest MD(P) is signed and NOT P (computationally faster to do so) Message Digest Public Key Scheme?

Message Digests Applications Message Digest 5 (MD5) / & MD6 are prominent by Ronald Rivest Secure Hash Algorithm (SHA-1) + newer versions of SHA-1 Others (Investigate)

Authentication Authentication Vs Digital Signatures Digital Signatures guarantee non-repudiation at some point in the future Authentication – verifying someone’s identity during communication Authentication – how do you know it’s Alice and not Trudy (imposter) you are ‘talking’ to?

Authentication Authentication Vs Authorisation Authorisation – what a process is permitted to do Server: Is Bob’s process allowed to delete a file ? Authentication – are you actually communicating with the process you think you are? Server: Needs to determine if this is Bob’s process

Authentication Based on shared secret key (symmetric) Commonly known as challenge-response protocols Alice and Bob share secret key, KAB Alice or Bob sends a random number to the other Alice or Bob transforms it in some way and returns the result back to the other

Two way Authentication: challenge –response Alice Bob A RB KAB (RB) RA This protocol contains five messages. Can it be shortened? Alice sends her identity to Bob Bob chooses a challenge to be sure this came from Alice and not Trudy The challenge Bob sends is a large random number RB as plaintext to Alice Alice encrypts message using shared secret key and sends ciphertext KAB(RB) to Bob Bob decrypts ciphertext and checks RB Bob is now sure he is talking to Alice and not Trudy (Trudy does not know KAB) *But Alice does not know she is talking to Bob (Trudy could have sent plaintext RB to Alice!) Therefore, Alice sends Bob her own RA and when Bob returns KAB(RA), Alice knows it’s from him To establish a session key (optional), Alice picks a session kye KS and sends Bob KAB (KS) *As far as Alice is concerned Trudy could have intercepted the first message (see diagram) and sent the random number to her. So Alice does same as what Bob did. KAB (RA) Source: A S Tanenbaum