Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.

Slides:



Advertisements
Similar presentations
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Advertisements

Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Intro 1 Introduction Intro 2 Good Guys and Bad Guys  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”
Public Key Cryptography & Message Authentication By Tahaei Fall 2012.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Computer Science 654 Lecture 1 : Hash Functions Professor Wayne Patterson Howard University Spring 2010 (Stamp Chapter 5)
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Block Ciphers 1 Block Ciphers Block Ciphers 2 Block Ciphers  Modern version of a codebook cipher  In effect, a block cipher algorithm yields a huge.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Csci5233 Computer Security & Integrity 1 Cryptography: Basics (2)
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Topic 5 Essential Public Key Crypto Methods.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Public Key Algorithms 4/17/2017 M. Chatterjee.
Hash Functions 1 Hash Functions Hash Functions 2 Cryptographic Hash Function  Crypto hash function h(x) must provide o Compression  output length is.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Lecture 24 Cryptography CPE 401 / 601 Computer Network Systems slides are modified from Jim Kurose and Keith Ross and Dave Hollinger.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Public Key Model 8. Cryptography part 2.
Chapter 31 Network Security
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Lecture 15 Lecture’s outline Public algorithms (usually) that are each other’s inverse.
Behzad Akbari Spring In the Name of the Most High.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY COMP 425: Information Security CHAPTER 8 Public Key Crypto (Chapter 4 in the textbook) INFORMATION SECURITY.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
I-4 security.
Chapter 4: Public Key Cryptography
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
EE515/IS523 Think Like an Adversary Lecture 4 Crypto in a Nutshell Yongdae Kim.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Network Security David Lazăr.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.
Lecture 2: Introduction to Cryptography
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Chapter 4: Public Key Cryptography
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Chapter 5 Hash Functions
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Part 1  Cryptography 1 Integrity Part 1  Cryptography 2 Data Integrity  Integrity  detect unauthorized writing (i.e., modification of data)  Example:
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CPIS 312 Chapter Four: PUBLIC KEY CRYPTO. Index 2 A.Introduction A.1 Asymmetric Key Cryptography- Introduction A.2 General ideas about the Public Key.
CIT 380: Securing Computer Systems
Computer Communication & Networks
Basic Network Encryption
ICS 454 Principles of Cryptography
Security through Encryption
Introduction to Symmetric-key and Public-key Cryptography
ICS 454 Principles of Cryptography
Chapter 3 - Public-Key Cryptography & Authentication
Basic Network Encryption
Presentation transcript:

Cryptography 1 Crypto

Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret codes”  Cryptanalysis  breaking “secret codes”  Crypto  all of the above (and more)

Cryptography 3 How to Speak Crypto  A cipher or cryptosystem is used to encrypt the plaintext  The result of encryption is ciphertext  We decrypt ciphertext to recover plaintext  A key is used to configure a cryptosystem  A symmetric key cryptosystem uses the same key to encrypt as to decrypt  A public key cryptosystem uses a public key to encrypt and a private key to decrypt (sign)

Cryptography 4 Crypto  Basis assumption o The system is completely known to Trudy o Only the key is secret  Also known as Kerckhoffs Principle o Crypto algorithms are not secret  Why do we make this assumption? o Experience has shown that secret algorithms are weak when exposed o Secret algorithms never remain secret o Better to find weaknesses before using

Cryptography 5 Symmetric Key Notation  Encrypt plaintext P with symmetric key K C = E(P,K)  Decrypt ciphertext C with symmetric key K P = D(C,K)  Encrypt and decrypt are inverses D(E(P,K),K) = E(D(P,K),K) = P  Note that same key K is used to encrypt and to decrypt

Cryptography 6 Symmetric Key Encryption  Must agree on key K in advance  How to do this securely?  This is a big problem! AliceBob E(Bob’s data, K) E(Alice’s data, K)

Cryptography 7 Symmetric Ciphers  Popular symmetric key ciphers include o DES o 3DES (aka triple DES) o AES o Blowfish o RC6 o TEA

Cryptography 8 Uses for Symmetric Crypto  Confidentiality o Transmitting data over insecure channel o Secure storage on insecure media  Integrity ( MAC )  Authentication protocols (later…)  Anything you can do with a hash function (upcoming chapter…)

Cryptography 9 Public Key Cryptography  There are 2 keys o Public key used to encrypt o Private key used to decrypt  Also have digital signatures o Private key to sign o Public key to verify signature

Cryptography 10 Public Key Notation  Encrypt message M with Alice’s public key C = {M} Alice  Decrypt ciphertext with Alice’s private key M = [C] Alice  Private key and public key are inverses {[M] Alice } Alice = [{M} Alice ] Alice = M

Cryptography 11 Digital Signature  Encrypt message M with Alice’s public key C = {M} Alice  To decrypt the ciphertext use private key M = [C] Alice  Sign message M with Alice’s private key S = [M] Alice  To verify the signature use public key o To verify, show that M = {S} Alice

Cryptography 12 Public Key Encryption  Bob’s public key is public  Alice’s public key is public  So no need to agree on key in advance  A huge advantage over symmetric key AliceBob {M} Alice {M} Bob

Cryptography 13 Digital Signature  Bob verifies signature using Alice’s public key (which is public) AliceBob M, [M] Alice

Cryptography 14 Public Key Cryptosystems  The most popular is RSA o Named after Rivest, Shamir and Adleman  RSA can do encryption and signatures  A few other public key systems are used o But not many!  There are a lots of symmetric ciphers  Why so few public key systems?

Cryptography 15 Diffie-Hellman  A “key exchange” algorithm  Only used to establish a shared symmetric key  Not for encryption or signing  Considered a public key system o Some public info is used to agree on key

Cryptography 16 Diffie-Hellman  Alice computes (g b ) a = g ab mod p  Bob computes (g a ) b = g ab mod p  The shared key is g ab mod p Alice secret a Bob secret b g b mod p g a mod p

Cryptography 17 Diffie-Hellman  Trudy can see g a mod p and g b mod p  Trudy wants g ab mod p  She can compute o (g a )(g b ) = g a+b  g ab mod p  If Trudy can find a or b, she wins  But finding a from g a mod p is hard o The “discrete log” problem

Cryptography 18 Diffie-Hellman  Subject to man-in-the-middle (MiM) attack Alice, a Bob, b g a mod p g b mod p Trudy, t g t mod p  Trudy shares secret g at mod p with Alice  Trudy shares secret g bt mod p with Bob  Alice and Bob don’t know Trudy exists!

Cryptography 19 Uses for Public Key Crypto  Confidentiality o Transmitting data over insecure channel o Secure storage on insecure media  Authentication (later)  Digital signature provides integrity and non-repudiation o No non-repudiation with symmetric keys

Cryptography 20 Symmetric vs Public Key  Advantages of symmetric key o Efficiency o No public key infrastructure (PKI)  Advantages of public key o No key distribution problem o Digital signatures

Cryptography 21 Real World Confidentiality  Hybrid cryptosystem: best of both worlds o Public key crypto to establish a key o Symmetric key crypto to encrypt data AliceBob {K} Bob E(Bob’s data, K) E(Alice’s data, K)  Can Bob be sure he’s talking to Alice?

Cryptography 22 Crypto Hash Function  Crypto hash function h(x) provides o Compression  output length is small o Efficiency  h(x) easy to computer for any x o One-way  given a value y it is infeasible to find an x such that h(x) = y o Collision resistance  can’t find any x and y, with x  y such that h(x) = h(y) o Collisions must exist, but hard to find one

Cryptography 23 Popular Crypto Hashes  MD5  invented by Rivest o 128 bit output (collision recently found)  SHA-1  A US government standard (similar to MD5) o 180 bit output  Tiger  192 bit output  Many others hashes, but MD5 and SHA-1 most widely used  Hashes work by hashing message in blocks

Cryptography 24 Hash Uses  Authentication ( HMAC )  Message integrity ( HMAC )  Message fingerprint  Data corruption detection  Digital signature efficiency  Anything you can do with symmetric crypto

Cryptography 25 Online Auction  Suppose Alice, Bob and Charlie are bidders  Alice plans to bid A, Bob B and Charlie C  They don’t trust that bids will stay secret  Solution? o Alice, Bob, Charlie submit hashes h(A), h(B), h(C) o All hashes received and posted online o Then bids A, B and C revealed  Hashes don’t reveal bids (one way)  Can’t change bid after hash sent (collision)

Cryptography 26 Signing and Hashing  Suppose Alice signs M o Alice sends M and S = [M] Alice to Bob o Bob verifies that M = {S} Alice  If M is big, [M] Alice is costly to compute o Sending M and S also wastes bandwidth  Instead, Alice signs h(M) o Alice sends M and S = [h(M)] Alice to Bob o Bob verifies that h(M) = {S} Alice

Cryptography 27 Digital Signature  Bob verifies signature using Alice’s public key (which is public) AliceBob M, [h(M)] Alice