Peer-to-Peer Networks 14 Security Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Cryptographic Security Presented by: Josh Baker October 9 th, CS5204 – Operating Systems.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Lecture 23 Symmetric Encryption
Public Key Algorithms 4/17/2017 M. Chatterjee.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Electronic Mail Security
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Chapter 20 Symmetric Encryption and Message Confidentiality.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Public Key Encryption.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Lecture 23 Symmetric Encryption
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Peer-to-Peer Networks 14 Security Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Peer-to-Peer Networks 14 Security Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Presentation transcript:

Peer-to-Peer Networks 14 Security Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Cryptography in a Nutshelf  Symmetric Cryptography -AES -Affine Cryptosystems  Public-Key Cryptography -RSA -ElGamal  Digital Signatures  Public-Key-Exchange -Diffie-Hellman  Interactive Proof Systems Zero-Knowledge-Proofs Secret Sharing Secure Multi-Party Computation 2

Blakley‘s Secret Sharing  George Blakley, 1979  Task -n persons have to share a secret -only when k of n persons are present the secret is allowed to be revealed  Blakley‘s scheme -in a k-dimensional space the intersection of k non-parallel k- 1-dimensional spaces define a point -this point is the information -with k-1 sub-spaces one gets only a line  Construction -A third (trusted) instance generate for a point n in R k k non- parallel k-1-dimensional hyper-spaces 3

 Adi Shamir, 1979  Task -n persons have to share a secret s -only k out of n persons should be able to reveal this secret  Construction of a trusted third party -chooses random numbers a 1,...,a k-1 -defines -chooses random x 1, x 2,..., x n -sends (x i,f(x i )) to player i Shamir‘s Secret Sharing Systems 4

 If k persons meet -then they can compute the function f by the fundamental theorem of algebra a polynomial of degree d is determined by d+1 values -for this they exchange their values and compute by interpolation (e.g. using Lagrange polynoms)  If k-1 persons meet -they cannot compute the secret at all -every value of s remains possible  Usually, Shamir‘s and Blakley‘s scheme are used in finite fields -i.e. Galois fields (known from CRC) -this simplifies the computation and avoids rounding errors in the context of floating numbers Shamir‘s Secret Sharing Systems 5

Dining Cryptographers  Anonymous publications without any tracing possibility  n ≥ 3 cryptographers sit at a round table -neighbored cryptographers can communicate secretly  Each peer chooses secret number x i and communicates it to the right neighbor  If i wants to send a message m -he publishes s i = x i - x i-1 + m  else -he publishes s i = x i - x i-1  Now they compute the sum s=s s n -if s=0 then there is no message -else the sum of all messages 11

Encryption Methods  Symmetric encryption algorithms, e.g. -Feistel cipher -DES (Digital Encryption Standard) -AES (Advanced Encryption Standard)  Cryptographic hash function -SHA-1, SHA-2 -MD5  Asymmetric encryption -RSA (Rivest, Shamir, Adleman) -El-Gamal  Digital signatures (electronic signatures) -PGP (Phil Zimmermann), RSA 13

Symmetric Encryption  E.g. Caesar's code, DES, AES  Functions f and g, where -Encryption f f (key, text) = code -Decoding g: g (key, code) = text  The key -must remain secret -must be available to the sender and receiver 14

Feistel Chiffre  Splitting the message into two halves L 1, R 1 -Keys K 1, K 2,... -Several rounds: Resulting code: L n, R n  encoding -L i = R i-1 -R i = L i-1 ⊕ f(R i-1, K i )  Decryption -R i-1 = Li -L i-1 = R i ⊕ f(L i, K i )  f may be any complex function 15

Other Symmetric Codes  Skipjack -80-bit symmetric code -is based on Feistel Cipher -low security  RC bits key length -Rivest code 5 (1994) -Several rounds of the Feistel cipher 16

Digital Encryption Standard  Carefully selected combination of -Xor operations -Feistel cipher -permutations -table lookups -used 56-bit key  1975 developed at IBM -Now no longer secure -more powerful computers -New knowledge in cryptology  Succeeded by: AES (2001) 17

Advanced Encryption Standard  Carefully selected combination of -Xor operations -Feistel cipher -permutations -table lookups -multiplication in GF [2 8 ] -128, 192 or 256-bit symmetric key  Joan Daemen and Vincent Rijmen were selected as AES, among many -still considered secure 18

Cryptographic Hash Function  E.g. SHA-1, SHA-2, MD5  A cryptographic hash function h maps a text to a fixed-length code, so that -h(text) = code -it is impossible to find another text: h(text‘) = h(text) and text ≠ text'  Possible solution: -Using a symmetric cipher 19

Asymmetric Encryption  E.g. RSA, Ronald Rivest, Adi Shamir, Lenard Adleman, Diffie-Hellman, PGP  Secret key: sk -Only the receivers of the message know the secret key  Public key: pk -All participants know this key  Generated by -keygen(sk) = pk  Encryption function f and decryption function g -Known to everybody  Encryption -f(pk,text) = code -everybody can generate code  Decryption -g(sk,code) = code -only possibly by receiver 20

Chaum‘s Mix-Cascades  All peers -publish the public keys -are known in the network  The sender p 1 now chooses a route -p 1, r 1, r 2, r 3,..., p 2  The sender encrypts m according to the public keys from -p 2,... r 3, r 2, r 1 -and sends the message -f(pk k1,(r 2, f(pk r2...f(pk rk,(p 2,f(pk p2,m)))...))))) -to r 1  r 1 encrypts the code, deciphers the next hop r 2 and sends it to him ...  until p 2 receives the message and deciphers it 21

Chaum‘s Mix Cascades  No peer on the route -knows its position on the route -can decrypt the message -knows the final destination  The receiver does not know the sender  In addition peers may voluntarily add detour routes to the message  Chaum‘s Mix Cascades -aka. Mix Networks or Mixes -is safe against all sort of attacks, -but not against traffic analysis 22

TOR - Onion Routers  David Goldschlag, Michael Reed, and Paul Syverson, 1998  Goal -Preserve private sphere of sender and receiver of a message -Safety of the transmitted message  Prerequisite -special infrastructure (Onion Routers) all except some smaller number of exceptions cooperate 24

TOR - Onion Routers  Method -Mix Cascades (Chaum) -Message is sent from source to the target using proxies (Onion Routers) -Onion Routers unpredictably choose other routers as intermediate routers -Between sender, Onion Routers, and receiver the message is encrypted using symmetric cryptography -Every Onion Router only knows the next station -The message is encoded like an onion  TOR is meant as an infrastructure improvement of the Internet -not meant as a peer-to-peer network -yet, often used from peer-to-peer networks 25

Other Work based on Onion Routing  Crowds -Reiter & Rubin anonymous web-surfing based on Onion Routers  Hordes -Shields, Levine uses sub-groups to improve Onion Routing  Tarzan -Freedman, A Peer-to-Peer Anonymizing Network Layer -uses UDP messages and Chaum Mixes in group to anonymize Internet traffic -adds fake traffic against timing attacks 26

Free-Net  Ian Clarke, Oskar Sandberg, Brandon Wiley, Theodore Hong, 2000  Goal -peer-to-peer network -allows publication, replication, data lookup -anonymity of authors and readers  Files -are encoding location independent by encrypted and pseudonymously signed index files author cannot be identified -are secured against unauthorized change or deletion -are encoded by keys unknown by the storage peer secret keys are stored elsewhere -are replicated on the look up path -and erased using “Least Recently Used” (LRU) principle 27

Free-Net  Network Structure -is similar to Gnutella -Free-Net is like Gnutella Pareto distributed  Storing Files -Each file can be found, decoded and read using the encoded address string and the signed subspace key -Each file is stored together with the information of the index key but without the encoded address string -The storage peer cannot read his files unless he tries out all possible keywords (dictionary attack)  Storing of index files -The address string coded by a cryptographic secure hash function leads to the corresponding peer who stores the index data -address string -and signed subspace key -Using this index file the original file can be found 28

Free-Net 29

Free-Net 30  Lookup -steepest-ascent hill-climbing lookup is forwarded to the peer whose ID is closest to the search index -with TTL field i.e. hop limit  Files are moved to new peers -when the keyword of the file is similar to the neighbor‘s ID  New links -are created if during a lookup close similarities between peer IDs are discovered

Efficiency of Free-Net  Network structure of Free-Net is similar to Gnutella  The lookup time is polynomial on the average 31

Peer-to-Peer Networks 14 Security Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg