IT 221: Introduction to Information Security Principles Lecture 4: Public-Key Cryptography For Educational Purposes Only Revised: September 15, 2002.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Public Key Cryptography & Message Authentication By Tahaei Fall 2012.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Cryptography and Network Security Chapter 9. Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively.
Public Key Cryptography and the RSA Algorithm
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
Chapter3 Public-Key Cryptography and Message Authentication.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Rachana Y. Patil 1 1.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Behzad Akbari Spring In the Name of the Most High.
Problems with symmetric (private-key) encryption 1) secure distribution of keys 2) large number of keys Solution to both problems: Public-key (asymmetric)
IT 221: Introduction to Information Security Principles Lecture 6:Digital Signatures and Authentication Protocols For Educational Purposes Only Revised:
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Network Security Lecture 17 Presented by: Dr. Munam Ali Shah.
Public-Key Cryptography CS110 Fall Conventional Encryption.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Midterm Review Cryptography & Network Security
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both sender and receiver  if this key is disclosed.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
Network Security Lecture 18 Presented by: Dr. Munam Ali Shah.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Lecture 14 Public Key Cryptography and RSA. Summary principles of public-key cryptography principles of public-key cryptography RSA algorithm, implementation,
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
NET 311 Information Security
Chapter 3 - Public-Key Cryptography & Authentication
Introduction to Cryptography
Presentation transcript:

IT 221: Introduction to Information Security Principles Lecture 4: Public-Key Cryptography For Educational Purposes Only Revised: September 15, 2002

1 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Context and Questions Context: “Tokyo at Rush hour, circa 2012: your automated car whisks you off to Narita airport, steering itself through bustling traffic. You’re free to work. Push a button on your watch, and an image of your firm’s mining operation in Indonesia springs to life in 3-D. You ask the digital assistant in your watch how current fluctuations might affect the mining investment, and a female voice reads the results out load.…As you arrive Narita, your car announces that the flight is delayed. Care to rebook?” [3] Questions: What some of the security and privacy implications with the potential ubiquity of (and access to) personalized data?

2 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Chapter 6: Context and Overview History Misconceptions High-Level Principles Categories of Public-keys Encryption with Public-keys Authentication with Public-keys Ensuring Both Encryption and Authentication RSA History RSA Key Generation Algorithm RSA Key Generation Example RSA versus DES Diffie-Hellman History Diffie-Hellman Key Exchange Key Management Resources Chapter 6 Outline

3 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Context and Overview Context: The cryptographic systems and algorithms covered in Chapters 1-5 are fundamentally based on substitution and permutation. [2] Inherent key distribution problem with Secret Key systems: -Necessary to share the secret key between Sender and Receiver -Comm. with n different parties requires n different keys Public-key Cryptography Overview: Public-key cryptography represents a radical departure from substitution and permutation based methods. [2] Given a reliable transmission channel, Public-key systems solve the key distribution problem of using secret-key.

4 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only History History [4]: Concept conceived by Diffie and Hellman in 1976 Rivest, Shamir and Adleman (RSA) were first to describe a Public-key cryptosystem in Merkle and Hellman published an alternative solution in Serious contenders today available in the public domain: -RSA -El Gamal

5 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Misconceptions Misconceptions [2]: More secure from cryptanalysis than is conventional encryption. General purpose technique that has made conventional encryption obsolete. Key distribution is trivial compared to ‘handshaking’ involved with the Key Distribution of conventional encryption methods.

6 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only High-Level Principles High-Level Principles: Based on the infeasibility to determine the decryption key (i.e. the Receiver’s Private Key), given knowledge of the following: [2] -Receiver’s Public Key -Chosen Plaintext -Possibly chosen ciphertext Some algorithms, such as RSA, exhibit the following attribute: [2] - Either of the two related keys can be used for encryption, with the other used for decryption.

7 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Categories of Public-keys Three Categories: Encryption/Decryption: Sender encrypts a message with the recipient’s public key. Digital Signature: Sender ”signs” a message with its private key. Key Exchange: Two sides cooperate two exhange a session key.

8 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Encryption with Public-keys Encryption Process [2]: (1) Each end system in a network generates a pair of keys to be used for encryption and decryption of messages that it will receive. (2) Each system publishes its encryption key by placing it in a public register or file. This is the Public-key. The companion key is kept private. (3) If Bob wishes to send Alice, he encrypts the message using Alice’s Public-key. (4) When Alice receives the message, she decrypts it using her Private-key. No other receiver can decrypt the message.

9 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Authentication with Public-keys Authentication Process [2]: (1) Bob prepares a message to Alice and encrypts the message using his private key. (2) Alice decrypts Bob’s message by using his Public-key. (3) Since the message was encrypted using the sender’s private key, only the sender could have sent this message.

10 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Question: Given the two preceding processes, how are you able to ensure for both Encryption and Authentication? Solution: Encrypt first, followed by the signature. Signature first has the advantage that the signature can be verified by parties other than the Recipient. Ensuring Both Encryption and Authentication

11 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only RSA History RSA History [2]: Scheme developed by Rivest, Shamir, and Adleman Block cipher in which the Plaintext and Ciphertext are integers between 0 and n –1 for some n. Plaintext is encrypted in blocks, with each block having a binary value less than some number n, i.e. The block size must be less than or equal to log2(n).

12 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only RSA Key Generation Algorithm RSA Algorithm [2/4]: Chose 2 large prime numbers p,q Compute n = p x q Select integer e relatively prime to (p –1) * (q –1) Calculate d such that e*d = 1mod(p-1)*(q-1) Publish Public Key {e,n} Keep Private Key {d,n}

13 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only RSA Key Generation Example RSA Algorithm [4]: Chose 2 large prime numbers p,q p = 47, q = 71 Compute n = p x q n = p*q = 3337 Select integer e relatively prime to (p –1) * (q –1) (47-1) * (71-1) = 46*70 = 3220 Calculate d such that e*d = 1mod(p-1)*(q-1) 79^-1mod3220 = 1019 Publish Public Key {e,n} (3337, 79) Keep Private Key {d,n} (3337, 1019)

14 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only RSA versus DES RSA versus DES [4]: Speed of Implementation: - RSA: Encypts in kilobits/second -DES: Encypts in megabits/second Key Size: - RSA: Selected by user - DES: 64 bits (56 bits plus 8 parity bits) Often proposed that RSA be used for secure exchange of DES keys.

15 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Diffie-Hellman History RSA History [4]: Proposed in 1976, and is the first public key algorithm (predates RSA) Purpose of the algorithm is to enable two users to exchange a key securely over a potentially insecure channel. Limited to the exchange of keys, I.e. can not be used for en-/de-cryption.

16 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Diffie-Hellman Key Exchange Diffie-Hellman [4]: Alice and Bob want to agree upon a key They agree on 2 large integers n and g such that 1 < g < n Alice chooses random x, computes X = g^xmod n and sends it to Bob. Bob chooses random y, computes Y = g^y mod n, and sends it to Alice. Alice computes k = Y^x mod n Bob computes k’ = X^y mod n If someone is eavesdropping, the intrudder knows n, g, X and Y but not x and y.

17 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only Key Management Several Schemes for Distributing Keys [2]: Public Announcement of Public Keys Publicly Available Directory Public-Key Authority Public-Key Certificates

18 August 28, 2002 IT 221: Introduction to Information Security Priciples For Educational Purposes Only [1] Pfleeger, Charles. Security In Computing, Prentice Hall, Chapter 4. [2] Stallings, William. Cryptography and Network Security, Prentice Hall, Chapter 4-5 [3] Foroohar, Rana. “A New Way to Compute”. Time Magazine, September 16, Pp 34J-O. [4] Jajodia, Dr. Sushil. “Cryptography and Its Applications”. Lecture, Resources