ISA 400 Management of Information Security Philip Robbins – March 14, 2015 Cryptography Information Security & Assurance Program University of Hawai'i.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Making “Good” Encryption Algorithms
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Digital Signatures and Hash Functions. Digital Signatures.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Encryption Methods By: Michael A. Scott
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
Cryptography Week-6.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Cryptography, Authentication and Digital Signatures
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Bit Cipher 1. Example of bit Cipher 2 Practical Stream Cipher 3.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Cryptography Lynn Ackler Southern Oregon University.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Chapter 11 Message Authentication and Hash Functions.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Intro to Cryptography Lesson Introduction
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Network Security Celia Li Computer Science and Engineering York University.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
INCS 741: Cryptography Overview and Basic Concepts.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Basics of Cryptography
ISA 400 Management of Information Security
ISA 330 Introduction to Proactive System Security
Cryptography.
Security through Encryption
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
Presentation transcript:

ISA 400 Management of Information Security Philip Robbins – March 14, 2015 Cryptography Information Security & Assurance Program University of Hawai'i West Oahu Week #4 1

2 Cryptography Agenda Domain #4: Cryptography Quiz #3 Assignment #3

3 Cryptography Cryptology comes from “Crypto” - Meaning: To Hide Definition: The science of hiding communications. Why? - Protect , PII, transactions & data. Cryptographic systems use - Codes: “secret keys” - Ciphers: hiding the true meaning of a message

4 Cryptography & Encryption Confidentiality - The process of protecting plaintext messages from monitoring or eavesdropping. - Cryptography vs.. Encryption?? ENCRYPTIONDECRYPTION N1 N2 DATA / PLAINTEXT CLEARTEXT - Algorithm - Key LAN CIPHERTEXT - Algorithm - Key DATA / PLAINTEXT CLEARTEXT

5 Cryptography 3 Basic Elements of Cryptography - Algorithm - Key - Data

6 Cryptography Basic Elements: Algorithm - Describes the process (instruction set) involved in producing a desired output. - In the case of Cryptography what is our desired output? Encryption / cipher text / Confidentiality Does more Complexity = (mean) more Security?

7 Cryptography Non-reputation - Sender can’t deny sending a message. Authentication - Associated with validating a user’s identity - Also associated with the integrity of the message

8 Cryptography Authentication Digital Signatures - Uses Hash Function & Encryption together Digital Certificates - Ensure identity of remote computer - Trust; who are you sending your information to?

9 Cryptography Substitution Algorithm - Caesar’s Cipher - Rotate (shift) alphabet - Easy to decipher (frequency of common words, i.e. “the”) Key? Key Length?

10 Cryptography Transposition Algorithm - Encryption by changing position of plaintext. - Rail Fence Cipher DATA: 'WE ARE DISCOVERED. FLEE AT ONCE‘ KEY: 3 ‘Rails’ (rows) CIPHERTEXT:

11 Cryptography Steganography (not stenography) - Security through obscurity – concealing content. - Not recommended as encryption substitute. Concealment Cipher - Not actually encrypted – just hidden. - A message (hidden) within a message. - Example: Message = Newspaper Page #, Word #, … Running Key Cipher - Text is used for a very long key stream. - Clever use of components in the world. - Example: Key = Every 3 rd word from a book.

12 Cryptography Vernam Cipher - Gilbert Vernam Uses a basic Boolean XOR Function!! XOR Truth Table XOR Logic Gate Symbols

13 Cryptography Stream Cipher: Dividing the message into bits for processing (Encrypting data one bit at a time).

14 Cryptography Stream vs.. Block Cipher

15 Cryptography Block Cipher: Dividing the message into blocks for processing 1 Block

16 Cryptography Key & Algorithm Relationship - Algorithm’s are static mathematic functions. - Algorithm does not change; the key does. - The purpose of a key is to add randomization. - The key is a group of instructions for the algorithms. - Larger key space means better security: 128 bit strength = 2^128 = 3.4 x 10^38 possible keys (key space) - Processing power can brute force keys < 128 bit

17 Cryptography Key & Algorithm Relationship

18 Cryptography Symmetric (Private) Key Algorithm - The same key is used to encipher plaintext to produce cipher text Plaintext ⊕ Key = Ciphertext *and to* - decipher cipher text to yield the original plaintext Ciphertext ⊕ Key = Plaintext

19 Cryptography Symmetric (Private) Key Algorithm - How is confidentiality maintained?

20 Cryptography Symmetric Key Algorithm - Advantages Fast Hard to break if large key is used. - Disadvantages Only provides for confidentiality Key Management Distribution

21 Cryptography Symmetric Key Algorithm - Disadvantages Key Management Assume 10 people want to communicate with each other while ensuring confidentiality. How many keys would you need? = n(n-1)/2 # of communication channels

22 Cryptography Symmetric Key Algorithm - Disadvantages (Most serious deficiency) Distribution How would we transfer symmetric keys securely? What if someone is monitoring our comms? If sent in clear text someone can intercept.

23 Cryptography Asymmetric (Public Key) Encryption - One key is required to encrypt. Plaintext ⊕ Public Key = Ciphertext *and* - another key is required to decrypt. Ciphertext ⊕ Private Key = Plaintext Key Pair {Public Key, Private Key}

24 Cryptography Asymmetric (Public Key) Encryption Key Pair {Public Key, Private Key}

25 Cryptography Asymmetric Encryption given to anyone kept secret

26 Cryptography Asymmetric Encryption - SENDER Messages are encrypted with either the public or private key. The public key can be given to anyone. - RECIEVER Only the matching key pair will decrypt it. The private key is kept secret.

27 Cryptography Asymmetric Encryption - Mathematically, It should not be possible to get a key pair’s private key from the public key. - Anyone with a private key can generate its public pair. - This is done using one-way (hash) functions.

28 Cryptography Asymmetric Encryption - Advantages Key Management Distribution Confidentiality, Integrity, and Non-repudiation - Disadvantages Can’t encrypt large amounts of data.

29 Cryptography Asymmetric Encryption - Advantages Solves Key Management Problem!! Assume you wanted to communicate with 10 other people while ensuring confidentiality. How many keys would you need now?

30

31 Cryptography Hashing - Taking variable amounts of data and compressing it into a fixed length value, producing unique outputs. - A different MD5 hash would indicate the file has been altered or corrupted. - Message digest helps to verify integrity. - Integrity and/or nonrepudiation

32 Cryptography Digital Signatures -Message goes through a Hashing algorithm. -The message and the message digest is encrypted with the sender’s private key. -The receiver validates the digital signature by decrypting it with the sender’s public key. -Provides integrity, authenticity, and non-repudiation. If I use my private key to encrypt something then it proves it came from me.

33 Cryptography Understanding Digital Signatures

34 Cryptography Understanding Digital Signatures How is integrity and non-repudiation maintained?

35 Cryptography Cryptographic Algorithms

36 Cryptography Cryptographic Algorithms Symmetric Key Cryptography: Encryption Standards

37 Cryptography Characteristics of Strong Algorithms: - Confusion Changing a char in plaintext doesn’t create predictable cipher text. Reverse Engineering process is difficult. Contains Complexity. - Diffusion Changes in plaintext creates large change in cipher text; avoiding discovery of key.

38 Cryptography Characteristics of Strong Algorithms: - Complexity A flat cipher is created by distributing the frequency of characters evenly.

39 Cryptography Kerckoff’s Principal: “…the security of a cipher system should depend on the key and not the algorithm…” Why would it be advantageous to release the cipher algorithm to the public? Why wouldn’t it be…?

40

41 How did they do that??? They sell you the private key.

42 Cryptography Attacks Birthday Attack - Used to find the same hash value for two different inputs Reveals any mathematical weaknesses in the hashing algorithm. Total Hashes Input attempts required for 50% chance of output collision

43 Cryptography Attacks Brute-Force Attack - Tries all possible keys in a key space.

44 Cryptography Attacks Mathematical Attacks Properties of the algorithm are attacked. MAIN CATAGORIES Chosen-plaintext attack: access to PT and CT to determine key. Known plaintext attack: access to “known” PT and CT forms. Chosen-ciphertext attack: access to the CT ready to be decrypted. Ciphertext-only attack: access to CT but not the PT. Side-channel attack: misc info, EM emissions, noise, vibrations,...

45 Review Questions Question #1 What is Cryptography?

46 Review Questions Question #1 What is Cryptography? The science of hiding communications.

47 Review Questions Question #2 What is encryption?

48 Review Questions Question #2 What is encryption? Transforming data into an unreadable format.

49 Review Questions Question #3 What is an algorithm?

50 Review Questions Question #3 What is an algorithm? Describes the process (instruction set) involved in producing a desired output.

51 Review Questions Question #4 What is a Cryptographic Key?

52 Review Questions Question #4 What is a Cryptographic Key? Piece of information that controls how the cryptographic algorithm functions (works).

53 Review Questions Question #5 What is Cryptanalysis?

54 Review Questions Question #5 What is Cryptanalysis? Breaking cryptography; act of obtaining plain text from cipher text.

55 Review Questions Question #6 Which of the following is a disadvantage of symmetric key encryption? A.Key Size B.Speed C.Key Management D.Key Strength

56 Review Questions Question #6 Which of the following is a disadvantage of symmetric key encryption? A.Key Size B.Speed C.Key Management D.Key Strength

57 Review Questions Question #7 Which of the following attacks requires an attacker to obtain several encrypted messages that have been encrypted using the same encryption algorithm? A.Know plain text attack B.Cipher text attack C.Clear text attack D.Replay attack

58 Review Questions Question #7 Which of the following attacks requires an attacker to obtain several encrypted messages that have been encrypted using the same encryption algorithm? A.Know plain text attack B.Cipher text attack C.Clear text attack D.Replay attack

59 Review Questions Question #8 Why does a digital signature contain a message digest? A.To detect any alteration of the message B.To indicate the encryption algorithm C.To confirm the identity of the sender D.To enable transmission in a digital format

60 Review Questions Question #8 Why does a digital signature contain a message digest? A.To detect any alteration of the message B.To indicate the encryption algorithm C.To confirm the identity of the sender D.To enable transmission in a digital format

61 Review Questions Question #9 Which is NOT a property of a one-way hash function? A.It converts a message of a fixed length into a message digest of arbitrary length B.It is computationally infeasible to construct two messages with the same digest C.It converts a message of arbitrary length into a message of a fixed length D.Given a digest value, it is computationally infeasible to find the corresponding message

62 Review Questions Question #9 Which is NOT a property of a one-way hash function? A.It converts a message of a fixed length into a message digest of arbitrary length B.It is computationally infeasible to construct two messages with the same digest C.It converts a message of arbitrary length into a message of a fixed length D.Given a digest value, it is computationally infeasible to find the corresponding message

63 Review Questions Question #10 What are the three most important functions that digital signatures perform? A.Integrity, Confidentiality, and Authorization B.Integrity, Authentication, and Nonrepudiation C.Authorization, Authentication, and Nonrepudiation D.Authorization, Detection, and Accountability

64 Review Questions Question #10 What are the three most important functions that digital signatures perform? A.Integrity, Confidentiality, and Authorization B.Integrity, Authentication, and Nonrepudiation C.Authorization, Authentication, and Nonrepudiation D.Authorization, Detection, and Accountability

65 Review Questions Question #11 What is the result of a hash algorithm being applied to a message? A.A digital signature B.A cipher text C.A message digest D.A plaintext

66 Review Questions Question #11 What is the result of a hash algorithm being applied to a message? A.A digital signature B.A cipher text C.A message digest D.A plaintext

67 Review Questions Question #12 A hash value is a fixed-length string used to verify message integrity? A.TRUE B.FALSE

68 Review Questions Question #12 A hash value is a fixed-length string used to verify message integrity? A.TRUE B.FALSE

69 Review Questions Question #13 Why did the NSA decide to drop support for DES? A.The cost was too high. B.The encryption algorithm was too slow. C.The processing power of computers had increased. D.It was too difficult for government agencies to use.

70 Review Questions Question #13 Why did the NSA decide to drop support for DES? A.The cost was too high. B.The encryption algorithm was too slow. C.The processing power of computers had increased. D.It was too difficult for government agencies to use.

71 Review Questions Question #14 Two different messages producing the same hash value results in which of the following? A.Duplicate key B.Corrupt key C.Collision D.Message digest

72 Review Questions Question #14 Two different messages producing the same hash value results in which of the following? A.Duplicate key B.Corrupt key C.Collision D.Message digest

73 Review Questions Question #15 Which of the following is an asymmetric algorithm? A.DES B.AES C.RSA D.Blowfish

74 Review Questions Question #15 Which of the following is an asymmetric algorithm? A.DES B.AES C.RSA D.Blowfish

75 Review Questions Question #16 (last one) What type of cryptographic algorithm is being used?

76 Review Questions Question #16 (last one) What type of cryptographic algorithm is being used? Caesar Cipher / Substitution Algorithm / ROT

77 Quiz #3 Short answer, closed book, closed notes.

78 Questions? www2.hawaii.edu/~probbins