Chapter 1 – Introduction Part 4 1. Message Authentication Codes Allows for Alice and Bob to have data integrity, if they share a secret key. Given a message.

Slides:



Advertisements
Similar presentations
Hash Functions A hash function takes data of arbitrary size and returns a value in a fixed range. If you compute the hash of the same data at different.
Advertisements

Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Digital Signatures and Hash Functions. Digital Signatures.
Cryptology Passwords and Authentication Prof. David Singer Dept. of Mathematics Case Western Reserve University.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Computer Security Key Management
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Csci5233 Computer Security1 GS: Chapter 6 Using Java Cryptography for Authentication.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
Introduction to IS Security 1. Defining Security The security of a system, application, or protocol is always relative to – Identification of vulnerabilities.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
Authentication and Authorization Authentication is the process of verifying a principal’s identity (but how to define “identity”?) –Who the person is –Or,
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Chapter 1 - Threats 1. Threats and Attacks Eavesdropping: the interception of information intended for someone else during its transmission over a communication.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Network Security David Lazăr.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 2: Message integrity.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
Lecture 2: Introduction to Cryptography
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Encryption CS110: Computer Science and the Internet.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Digital Signatures and Digital Certificates Monil Adhikari.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
Software Security Seminar - 1 Chapter 2. Protocol Building Blocks 발표자 : 최두호 Applied Cryptography.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Computer Communication & Networks
Secure Sockets Layer (SSL)
Cryptographic Hash Function
Introduction 9/20/2018 Defining Security The “security” of a system, application, or protocol is always a relative feature that is defined by A set of.
Chapter 1 - Introduction
Security.
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Chapter 3 - Public-Key Cryptography & Authentication
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

Chapter 1 – Introduction Part 4 1

Message Authentication Codes Allows for Alice and Bob to have data integrity, if they share a secret key. Given a message M, Alice computes H(K||M) and sends M and this hash to Bob. 2 (attack detected) =? MAC h h shared secret key Communication channel SenderRecipient Attacker (modifying) MAC 6B C66809 message M’ h h shared secret key 87F9024 received MAC computed MAC message M

Public Key Problem Alice wants to send Bob a secret key K so they can communicate securely. Alice sends X = E PB (K) to Bob. Bob decrypts K = D SB (X) How does Alice know that PB is Bob’s public key and not evil Eve’s?

Digital Certificates certificate authority (CA) digitally signs a binding between an identity and the public key for that identity. 4

Firefox CA Options | Advanced | Encryption | View Certificates

Passwords A short sequence of characters used as a means to authenticate someone via a secret that they know. Userid: _________________ Password: ______________ 6

How a password is stored? Password file User Butch:ASDSA 21QW3R50E ERWWER323 … hash function Dog124

8 Strong Passwords What is a strong password – UPPER/lower case characters – Special characters – Numbers When is a password strong? – Seattle1 – M1ke03 – – TD2k5secV

Password Complexity A fixed 6 symbols password: – Numbers 10 6 = 1,000,000 – UPPER or lower case characters 26 6 = 308,915,776 – UPPER and lower case characters 52 6 = 19,770,609,664 – 32 special characters (&, %, $, £, “, |, ^, §, etc.) 32 6 = 1,073,741, practical symbols available – 94 6 = 689,869,781,056 ASCII standard 7 bit 2 7 =128 symbols – = 4,398,046,511,104 9

10 Password Length 26 UPPER/lower case characters = 52 characters 10 numbers 32 special characters => 94 characters available 5 characters: 94 5 = 7,339,040,224 6 characters: 94 6 = 689,869,781,056 7 characters: 94 7 = 64,847,759,419,264 8 characters: 94 8 = 6,095,689,385,410,816 9 characters: 94 9 = 572,994,802,228,616,704

11 Password Validity: Brute Force Test Password does not change for 60 days how many passwords should I try for each second? – 5 characters: 1,415 PW /sec – 6 characters: 133,076 PW /sec – 7 characters: 12,509,214 PW /sec – 8 characters: 1,175,866,008 PW /sec – 9 characters: 110,531,404,750 PW /sec

Secure Passwords A strong password includes characters from at least three of the following groups: Use pass phrases eg. "I want to buy 11 Dogs!" 12

Password Generators generator.en generator.en

Social Engineering Pretexting: creating a story that convinces an administrator or operator into revealing secret information. Baiting: offering a kind of “gift” to get a user or agent to perform an insecure action. Quid pro quo: offering an action or service and then expecting something in return. 14