Lecture 2 Page 1 CS 236, Spring 2008 More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.

Slides:



Advertisements
Similar presentations
Sri Lanka Institute of Information Technology
Advertisements

Making “Good” Encryption Algorithms
Cryptography and Network Security Chapter 3
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
CSE331: Introduction to Networks and Security Lecture 18 Fall 2002.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Chapter 2 Basic Encryption and Decryption (part B)
Lecture 23 Symmetric Encryption
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
Cryptography Week-6.
Lecture 2 Overview.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Introduction to Cryptography Techniques How secure is that banking network traffic?
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Lecture 4 Page 1 CS 136, Fall 2014 More on Cryptography CS 136 Computer Security Peter Reiher October 14, 2014.
Lecture 4 Page 1 CS 136, Fall 2012 More on Cryptography CS 136 Computer Security Peter Reiher October 9, 2012.
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
Cryptography Lynn Ackler Southern Oregon University.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Lecture 4 Page 1 CS 236 Stream and Block Ciphers Stream ciphers convert one symbol of plaintext immediately into one symbol of ciphertext Block ciphers.
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Lecture 2: Introduction to Cryptography
Chapter 3 Encryption Algorithms & Systems (Part D)
Lecture 23 Symmetric Encryption
Cracking the DES Encryption
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Lecture 5 Page 1 CS 236 Online Public Key Encryption Systems The encrypter and decrypter have different keys C = E(K E,P) P = D(K D,C) Often, works the.
Lecture 4 Page 1 CS 236 Stream and Block Ciphers Stream ciphers convert one symbol of plaintext immediately into one symbol of ciphertext Block ciphers.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Outline Desirable characteristics of ciphers Stream and block ciphers
Outline Desirable characteristics of ciphers Stream and block ciphers
Cryptography Much of computer security is about keeping secrets
Outline Desirable characteristics of ciphers Uses of cryptography
Outline Desirable characteristics of ciphers Stream and block ciphers
Outline Desirable characteristics of ciphers Uses of cryptography
Lecture 3: Symmetric Key Encryption
Outline Desirable characteristics of ciphers Stream and block ciphers
Outline Desirable characteristics of ciphers Stream and block ciphers
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Cryptography II Jagdish S. Gangolly School of Business
Security through Encryption
Outline Desirable characteristics of ciphers Stream and block ciphers
csci5233 computer security & integrity (Chap. 4)
Outline Using cryptography in networks IPSec SSL and TLS.
Outline Desirable characteristics of ciphers Stream and block ciphers
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

Lecture 2 Page 1 CS 236, Spring 2008 More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008

Lecture 2 Page 2 CS 236, Spring 2008 Outline Stream and block ciphers Desirable characteristics of ciphers Uses of cryptography Symmetric and asymmetric cryptography Digital signatures Secure hashes

Lecture 2 Page 3 CS 236, Spring 2008 Stream and Block Ciphers Stream ciphers convert one symbol of plaintext immediately into one symbol of ciphertext Block ciphers work on a given sized chunk of data at a time

Lecture 2 Page 4 CS 236, Spring 2008 Stream Ciphers PlaintextCiphertext Key Encryption fsnarT fsnar T SS fsna r q qS fsn a zzqS fs n m mzqS f s rrmzqS f e ermzqS

Lecture 2 Page 5 CS 236, Spring 2008 Advantages of Stream Ciphers +Speed of encryption and decryption Each symbol encrypted as soon as it’s available +Low error propagation Errors affect only the symbol where the error occurred

Lecture 2 Page 6 CS 236, Spring 2008 Disadvantages of Stream Ciphers –Low diffusion Each symbol separately encrypted Each ciphertext symbol only contains information about one plaintext symbol –Susceptible to insertions and modifications –Not good match for many common uses of cryptography

Lecture 2 Page 7 CS 236, Spring 2008 Block Ciphers PlaintextCiphertext Key Encryption T r a n s f e r $ 1 0 T s r f $ a e 1 n r 0 T r a n s f e r $ 1 0 T s r f $ a e 1 n r 0

Lecture 2 Page 8 CS 236, Spring 2008 Advantages of Block Ciphers +Diffusion Easier to make a set of encrypted characters depend on each other +Immunity to insertions Encrypted text arrives in known lengths Most common Internet crypto done with block cyphers

Lecture 2 Page 9 CS 236, Spring 2008 Disadvantages of Block Ciphers –Slower Need to wait for block of data before encryption/decryption starts –Worse error propagation Errors affect entire blocks

Lecture 2 Page 10 CS 236, Spring 2008 Desirable Characteristics of Ciphers Well matched to requirements of application –Amount of secrecy required should match labor to achieve it Freedom from complexity –The more complex algorithms or key choices are, the worse

Lecture 2 Page 11 CS 236, Spring 2008 More Characteristics Simplicity of implementation –Seemingly more important for hand ciphering –But relates to probability of errors in computer implementations Errors should not propagate

Lecture 2 Page 12 CS 236, Spring 2008 Yet More Characteristics Ciphertext size should be same as plaintext size Encryption should maximize confusion –Relation between plaintext and ciphertext should be complex Encryption should maximize diffusion –Plaintext information should be distributed throughout ciphertext

Lecture 2 Page 13 CS 236, Spring 2008 Uses of Cryptography What can we use cryptography for? Lots of things –Secrecy –Authentication –Prevention of alteration

Lecture 2 Page 14 CS 236, Spring 2008 Cryptography and Secrecy Pretty obvious Only those knowing the proper keys can decrypt the message –Thus preserving secrecy Used cleverly, it can provide other forms of secrecy

Lecture 2 Page 15 CS 236, Spring 2008 Cryptography and Authentication How can I prove to you that I created a piece of data? What if I give you the data in encrypted form? –Using a key only you and I know Then only you or I could have created it –Unless one of us told someone else the key...

Lecture 2 Page 16 CS 236, Spring 2008 Some Limitations on Cryptography and Authentication If both parties cooperative, cryptography can authenticate –Problems with non-repudiation, though What if three parties want to share a key? –No longer certain who created anything –Public key cryptography can solve this problem What if I want to prove authenticity without secrecy?

Lecture 2 Page 17 CS 236, Spring 2008 Cryptography and Non- Alterability Changing one bit of an encrypted message completely garbles it –For many forms of cryptography If a checksum is part of encrypted data, that’s detectable If you don’t need secrecy, can get the same effect –By encrypting only the checksum

Lecture 2 Page 18 CS 236, Spring 2008 Cryptography and Zero- Knowledge Proofs With really clever use, cryptography can be used to prove I know a secret –Without telling you the secret Seems like magic, but it can work Basically, using multiple iterations of cryptography in very clever ways

Lecture 2 Page 19 CS 236, Spring 2008 Symmetric and Asymmetric Cryptosystems Symmetric - the encrypter and decrypter share a secret key –Used for both encrypting and decrypting Asymmetric – encrypter has different key than decrypter

Lecture 2 Page 20 CS 236, Spring 2008 Description of Symmetric Systems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations

Lecture 2 Page 21 CS 236, Spring 2008 Advantages of Symmetric Key Systems +Encryption and authentication performed in a single operation +Well-known (and trusted) ones perform faster than asymmetric key systems +Doesn’t require any centralized authority Though key servers help a lot

Lecture 2 Page 22 CS 236, Spring 2008 Disadvantage of Symmetric Key Systems –Encryption and authentication performed in a single operation Makes signature more difficult –Non-repudiation hard without servers –Key distribution can be a problem –Scaling

Lecture 2 Page 23 CS 236, Spring 2008 Scaling Problems of Symmetric Cryptography K1K1 K1K1 K2K2 K2K2 K3K3 K3K3 K4K4 K4K4 K5K5 K5K5 K6K6 K6K6 How many keys am I going to need to handle the entire Internet????

Lecture 2 Page 24 CS 236, Spring 2008 Sample Symmetric Key Ciphers The Data Encryption Standard The Advanced Encryption Standard There are many others

Lecture 2 Page 25 CS 236, Spring 2008 The Data Encryption Standard Probably the best known symmetric key cryptosystem Developed in 1977 Still much used –Which implies breaking it isn’t trivial But showing its age

Lecture 2 Page 26 CS 236, Spring 2008 History of DES Created in response to National Bureau of Standards studies Developed by IBM Analyzed, altered, and approved by the National Security Agency Adopted as a federal standard One of the most widely used encryption algorithms

Lecture 2 Page 27 CS 236, Spring 2008 Overview of DES Algorithm A block encryption algorithm –64 bit blocks Uses substitution and permutation –Repeated applications 16 cycles worth 64 bit key –Only 56 bits really used, though

Lecture 2 Page 28 CS 236, Spring 2008 More On DES Algorithm Uses substitutions to provide confusion –To hide the set of characters sent Uses transpositions to provide diffusion –To spread the effects of one plaintext bit into other bits Uses only standard arithmetic and logic functions and table lookup Performs 16 rounds of substitutions and permutations –Involving the key in each round

Lecture 2 Page 29 CS 236, Spring 2008 Decrypting DES For DES, D() is the same as E() You decrypt with exactly the same algorithm If you feed ciphertext and the same key into DES, the original plaintext pops out

Lecture 2 Page 30 CS 236, Spring 2008 Is DES Secure? Apparently, reasonably NSA alterations believed to have increased security against differential cryptanalysis Some keys are known to be weak with DES –So good implementations reject them To date, only brute force attacks have publicly cracked DES

Lecture 2 Page 31 CS 236, Spring 2008 Key Length and DES Easiest brute force attack is to try all keys –Looking for a meaningful output Cost of attack proportional to number of possible keys Is 2 56 enough keys? Not if you seriously care –Cracked via brute force in 1998 –Took lots of computers and time –But computers keep getting faster...

Lecture 2 Page 32 CS 236, Spring 2008 Does This Mean DES is Unsafe? Depends on what you use it for Takes lots of compute power to crack On the other hand, computers will continue to get faster And motivated opponents can harness vast resources Increasingly being replaced by AES

Lecture 2 Page 33 CS 236, Spring 2008 The Advanced Encryption Standard A relatively new cryptographic algorithm Intended to be the replacement for DES Chosen by NIST –Through an open competition Chosen cipher was originally called Rijndael –Developed by Dutch researchers –Uses combination of permutation and substitution

Lecture 2 Page 34 CS 236, Spring 2008 Increased Popularity of AES Gradually replacing DES –As was intended Various RFCs describe using AES in IPSEC FreeS/WAN IPSEC (for Linux) includes AES Some commercial VPNs use AES Various Windows AES products available –Used for at least some purposes in Vista