Secure Transmission of Instant Messages CS522 Final Project Presented by Akbar Khan Kaushal.S.Chandrashekar.

Slides:



Advertisements
Similar presentations
Module XXI Cryptography
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Electronic Transaction Security (E-Commerce)
Nym: An anonymous, secure, peer-to-peer instant messenger By Seth Cooper, Adam Hoel, Elliott Hoel, Jeff Holschuh, and Hilde Schmitt.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Cryptography Basic (cont)
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Key Distribution CS 470 Introduction to Applied Cryptography
Lecture 12 Security. Summary  PEM  secure  PGP  S/MIME.
J.W. Ryder Basic Internet Security Concepts J.W. Ryder
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
How HTTPS Works J. David Giese. Hyper Text Transfer Protocol BrowserHTTP Server GET / HTTP/1.1 HOST: edge-effect.github.io HEADERS BODY HTTP/ OK.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Computer and Internet Security. Introduction Both individuals and companies are vulnerable to data theft and hacker attacks that can compromise data,
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Chapter 21 Public-Key Cryptography and Message Authentication.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Public Key Encryption.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Security School of Business Eastern Illinois University © Abdou Illia, Fall 2002 (Week 12, Wednesday 11/13/2002)
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
CS 6401 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security Celia Li Computer Science and Engineering York University.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
KERBEROS SYSTEM Kumar Madugula.
Lecture 14 Public Key Cryptography and RSA. Summary principles of public-key cryptography principles of public-key cryptography RSA algorithm, implementation,
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
What is network security?
Introduction to Cryptography
Presentation transcript:

Secure Transmission of Instant Messages CS522 Final Project Presented by Akbar Khan Kaushal.S.Chandrashekar

Secure Transmission of Instant Messages  An application that enables real time communication on-line  Real-time conversations with other logged-on IM users  Users see the availability of others  Users set their own status.  Interface for direct and private conversation.

Secure Transmission of Instant Messages Advantages  Less intrusive than a telephone  Quicker & more personal than  Free Disadvantages  Weak security.

Secure Transmission of Instant Messages IM Clients  Often use both P2P and Client Server Architecture  AOL Instant Messenger (AIM)  Mirabilis ICQ  Yahoo Instant Messenger  Jabber

Secure Transmission of Instant Messages Security Issues  Symmetric key Encryption (Fast way)  Encryption at one end and Decryption on other end.  Need for secure key transport  Allow both secure and non-secure communication simultaneously

Secure Transmission of Instant Messages DES (Data Encryption Standard)  Actual message Encryption  Symmetric key Encryption method  Uses 64-bit input block and 56-bit key  Output is 64-bit  Was the National Bureau of Standards approved Encryption method for non-military use

Secure Transmission of Instant Messages Public key Cryptography  Each participant in the transaction gets a pair of keys (Public, Private)  The Public key is published and Private key is kept secret  Need for sender and receiver to share the secret information is eliminated  Data Encrypted using a participants Public key can only be decrypted using the corresponding Private key and vice versa.  No private key is ever transmitted or shared

Secure Transmission of Instant Messages RSA (Rivest, Shamir, Adleman)  Used for key transport  Public key Encryption method  we have used 512-bit Public and Private keys

Secure Transmission of Instant Messages Initial Design Client – A PU A, PR A, PU B Client – B PU B, PR B, PU A Key = RandomKey() EKey = E(PU B, Key) Msg = SD(Key, EMsg) Key = D(PR B, EKey) EMsg = SE(Key, Msg)

Initial Design Fault Client – A PU A, PR A, PU B Client – B PU B, PR B, PU A Key = RandomKey() EKey = E(PU B, Key) Msg = SD(Key, EMsg) Key2 = D(PR B, EKey) EMsg = SE(Key2, Msg) Attacker PU X, PR X, PU B Key2 = RandomKey() EKey2 = E(PU B, Key2) Msg = SD(Key2, EMsg) Packet Intercepted

Revised Design Client – A PU A, PR A, PU B Client – B PU B, PR B, PU A Key = RandomKey() EKey = E(PU B, Key) H = hash (EKey) Sig = E(PR A, H) Msg = SD(Key, EMsg) H2 = hash (EKey) H = D (PU A, Sig) IF H2 = H THEN Verfied ELSE Reject Key = D(PR B, EKey) EMsg = SE(Key, Msg) Sig + EKey Provides security and authentication

Secure Transmission of Instant Messages Libraries used  Libyahoo2-Opensource yahoo messaging library  OpenSSL Crypto Library

Secure Transmission of Instant Messages Future Improvements  Use of trusted third party for authenticated distribution of public keys  Porting to GUI-based messenger from current command line version

Secure Transmission of Instant Messages References Cryptography and Network Security by William Stallings   