1 Serbia 2003 INTRODUCTION to CRYPTOGRAPHY Fred Piper Codes & Ciphers Ltd 12 Duncan Road, Richmond Surrey, TW9 2JD ENGLAND Royal Holloway, University of.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Chapter 11: Cryptography
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
DIGITAL SIGNATURES Fred Piper Codes & Ciphers Ltd 12 Duncan Road
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
DIGITAL SIGNATURES Fred Piper & Mert Özarar Codes & Ciphers Ltd 12 Duncan Road Richmond Surrey TW9 2JD Information Security Group Royal Holloway, University.
Chapter 5 Cryptography Protecting principals communication in systems.
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Fred Piper Information Security Group. Cyberworld Security: What Price Must We Pay? Fred Piper Codes & Ciphers Ltd 12 Duncan Road, Richmond Surrey, TW9.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Lecture 23 Symmetric Encryption
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Introduction to Public Key Cryptography
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Chapter 20 Symmetric Encryption and Message Confidentiality.
Cryptography, Authentication and Digital Signatures
Chapter 20 Symmetric Encryption and Message Confidentiality.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Lecture 2: Introduction to Cryptography
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
Overview of Cryptography & Its Applications
Codes & Ciphers Ltd 12 Duncan Road Richmond, Surrey TW9 2JD Information Security Group Royal Holloway, University of London Egham, Surrey TW20 0EX Impersonation.
Lecture 23 Symmetric Encryption
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
INCS 741: Cryptography Overview and Basic Concepts.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Fundamentals of Network Security Ravi Mukkamala SCI 101 October 6, 2003.
CS/ECE 578 Cyber-Security Dr. Attila Altay Yavuz
Basics of Cryptography
Security through Encryption
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
Presentation transcript:

1 Serbia 2003 INTRODUCTION to CRYPTOGRAPHY Fred Piper Codes & Ciphers Ltd 12 Duncan Road, Richmond Surrey, TW9 2JD ENGLAND Royal Holloway, University of London Egham Hill, Egham Surrey TW20 0EX ENGLAND

2 Serbia 2003 Sender lAm I happy that the whole world sees this ? lWhat am I prepared to do to stop them ? lWhat am I allowed to do to stop them ? Recipient lDo I have confidence in : uthe originator uthe message contents and message stream uno future repudiation. Network Manager lDo I allow this user on to the network ? lHow do I control their privileges ? Some Security Issues

3 Serbia 2003 Cipher System cryptogram c Enciphering Algorithm Deciphering Algorithm Key k(E)Key k(D) message m message m Interceptor

4 Serbia 2003 The Attacker’s Perspective Deciphering Algorithm Unknown Key k(D) Known c Wants m Note: k(E) is not needed unless it helps determine k(D)

5 Serbia 2003 Two Types of Cipher System Conventional or Symmetric k(D) easily obtained from k(E) Public or Asymmetric Computationally infeasible to determine k(D) from k(E)

6 Serbia 2003 Mortice Lock. If you can lock it, then you can unlock it. Bevelled Sprung Lock. Anyone can lock it, only keyholder can unlock it.

7 Serbia 2003 Types of Attack Ciphertext only Known plaintext Chosen ciphertext

8 Serbia 2003 Assumptions About Attacker (1) Military/Government: Try to keep details of system (including algorithm) secret Worst Case Conditions: Commercial: Assume he knows: lSystem (including algorithm) lAll ciphertext lSome corresponding plaintext/ ciphertext

9 Serbia 2003 Warning THE FACT THAT AN ALGORITHM HAS BEEN PUBLISHED SAYS NOTHING ABOUT ITS STRENGTH.

10 Serbia 2003 Breaking Algorithm Finding a method of determining message from cryptogram without being given deciphering key.

11 Serbia 2003 Exhaustive Key Search Attacks The security depends on the secrecy of the deciphering key. One potential attack, if the algorithm is known, is to try all possible deciphering keys and to eliminate all incorrect ones. To withstand this type of attack a large key space is required.

12 Serbia 2003 Exhaustive Key Searches Estimating time required for key search requires assumptions about the attacker’ resources

13 Serbia 2003 Saints or Sinners ? Receiver Interceptor Sender Who are the ‘good’ guys ?

14 Serbia 2003 If Someone Wants Your Plaintext Give it to them Give them the decryption key They may break algorithm They may ‘find’ plaintext in system They may ‘find’ key in system

15 Serbia 2003 Practical Considerations when Implementing Encryption Key management is the difficult part Keys need to be generated, distributed, stored, changed securely History shows that most cryptanalytic attacks exploit poor implementation and/or key management  Example: Enigma in World War 2

16 Serbia 2003 Cryptography is used to provide: 1. Confidentiality 2. Data Integrity 3. Entity/Origin Verification 4. Non-Repudiation 5. Access Control

17 Serbia 2003 Choosing an Algorithm The choice of algorithm depends upon the application. Applications of encryption include : Data confidentiality Data integrity Digital Signatures.

18 Serbia 2003 Misuse of Encryption Grade Good studentxxxxx Bad studentxxxxx Grades can be changed

19 Serbia 2003 Classification of Techniques Bit / Block operation Positional dependence/independence Message dependence/independence

20 Serbia 2003 Vernam Cipher Random sequence k 1,k 2,…,k n Message m 1,m 2,…,m n + Ciphertext k 1  m 1,k 2  m 2,…,k n  m n The message and key are bit strings

21 Serbia 2003 Stream Cipher Plaintext data Keystream sequence Ciphertext Key Sequence Generator XOR

22 Serbia 2003 Stream Cipher Enciphers bit by bit Positional dependence Security depends on properties of the keystream

23 Serbia 2003 Stream Ciphers Applications Widely used for military and paramilitary applications for both data and digitised speech The main reason for their wide use is that military communications are often over poor channels and error propagation is unacceptable

24 Serbia 2003 Symmetric Block Cipher System Key dependent permutation on s-bit blocks s-bit plaintext block s-bit ciphertext block Key

25 Serbia 2003 Block Ciphers : Key Sizes Depends on security requirement Key searches on size 2 90 are currently considered infeasible

26 Serbia 2003 DES: Key Search on Internet (1997)  DES has 2 56 keys  DES key found  Search took 140 days  Search used over 10,000 computers  Peak rate: keys/sec  ‘Might’ have taken 32 days

27 Serbia 2003 DES Breaker (1998) Electronic Frontier Foundation Design cost $ 80,000 Manufacturing cost$130,000 Test key found in 56 hours Complete search in 220 hours 90 Billion keys per second Design details published

28 Serbia 2003 DES : Double Length Key l k = (k1,k2) l k1,k2 DES keys l E k (m) = E k1 (D k2 (E k1 (m))) l key is 112 bits l key search with trials is infeasible.

29 Serbia 2003 Advanced Encryption Standard (AES) Block ciphers Block size 128 bits Key lengths 128, 192, 256 bits Must be faster than triple DES

30 Serbia 2003 AES (Continued) June 1998:15 candidates August 1998:11 April 1999:5 Decision October 2000 Rijndael

31 Serbia 2003 The following slides will not be discussed but are included for completeness

32 Serbia 2003 Applications Access Control Authentication

33 Serbia 2003 The Challenge / Response Principle Key Random number ChallengePIN-Controlled A A Response A - Encipher or OWF Y/N= ?

34 Serbia 2003 Digital Signatures According to ISO, the term Digital Signature is used: ‘to indicate a particular authentication technique used to establish the origin of a message in order to settle disputes of what message (if any) was sent’.

35 Serbia 2003 Digital Signatures A signature on a message is some data that validates a message and verifies its origin a receiver can keep as evidence a third party can use to resolve disputes. It depends on the message a secret parameter only available to the sender It should be easy to compute (by one person only) easy to verify difficult to forge

36 Serbia 2003 Principle of Digital Signatures There is a (secret) number which: Only one person can use Is used to identify that person ‘Anyone’ can verify that it has been used NB:Anyone who knows the value of a number can use that number.

37 Serbia 2003 Certification Authority Aim : To guarantee the authenticity of public keys. Method : The Certification Authority guarantees the authenticity by signing a certificate containing user’s identity and public key with its secret key. Requirement : All users must have an authentic copy of the Certification Authority’s public key.

38 Serbia 2003 Certification Process Verifies credentials Creates Certificate Receives (and checks) Certificate Presents Public Key and credentials Generates Key Set Distribution Centre Owner

39 Serbia 2003 How Does it Work? The Certificate can accompany all Fred’s messages The recipient must directly or indirectly: Trust the CA Validate the certificate The CA certifies that Fred Piper’s public key is……….. Electronically signed by the CA

40 Serbia 2003 Fundamental Requirement Internal infrastructure to support secure technological implementation