Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cryptography in World War II Jefferson Institute for Lifelong Learning at UVa Spring 2006 David Evans Class 4: Modern Cryptography

Similar presentations


Presentation on theme: "Cryptography in World War II Jefferson Institute for Lifelong Learning at UVa Spring 2006 David Evans Class 4: Modern Cryptography"— Presentation transcript:

1 Cryptography in World War II Jefferson Institute for Lifelong Learning at UVa Spring 2006 David Evans Class 4: Modern Cryptography http://www.cs.virginia.edu/jillcrypto

2 2 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Menu Some loose ends on WWII Maurice Burnett Modern Cryptography –Modern symmetric ciphers –Public-key cryptosystems

3 3 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography British Cipher Machine Design based on commercial Enigma 5 rotor wheels (instead of 3 in Enigma) Multiple rings per rotor Last 2 rotor wheels didn’t rotate British attempted to break it (without success) Typex Machine

4 4 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography German Code-Breaking Efforts About 6,000 people (compare to 12,000 working at Bletchley Park) Decentralized: each military branch had their own, didn’t share what they learned Effective against manual codes: broke about 50% of manually coded messages Didn’t attempt to break rotor-based ciphers – so confident Enigma was unbreakable, didn’t try to Typex and similar machines

5 5 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography

6 6 From http://www.codesandciphers.org.uk/lorenz/fish.htm Lorenz Cipher

7 7 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Modern Symmetric Ciphers A billion billion is a large number, but it's not that large a number. Whitfield Diffie Same idea but: –Use digital logic instead of mechanical rotors –Larger keys (random bits, not rotor alignments) Lorenz  5 12 < 10 9 Modern  128 bits > 10 37 –Encrypt blocks of letters at a time

8 8 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Modern Ciphers AES (Rijndael) successor to DES selected 2001 128-bit keys, encrypt 128-bit blocks Brute force attack (around 10 30 times harder than Lorenz) –Try 1 Trillion keys per second –Would take 10790283070806000000 years to try all keys! –If that’s not enough, can use 256-bit key No known techniques that do better than brute force search

9 9 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Login: alyssa Password: fido Terminal Trusted Subsystem Eve Login Process login sends

10 10 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Sending Passwords Encrypt User Server The Internet

11 11 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Encrypt Decrypt Plaintext Ciphertext Plaintext User Server C = Encrypt K (P) P = Decrypt K (C) KK The Internet

12 12 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Key Agreement Demo (Animated version at end of slides.)

13 13 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Asymmetric Cryptosystems Need a hard problem (like symmetric cryptosystems) With a trap door: if you know a secret, the hard problem becomes easy

14 14 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography One-Way Functions Easy to compute, hard to invert Trap-door one way function: –D (E (M)) = M –E and D are easy to compute. –Revealing E doesn’t reveal an easy way to compute D. –Hence, anyone who knows E can encrypt, but only someone who knows D can decrypt

15 15 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography RSA [Rivest, Shamir, Adelman 78] One-way function: multiplication is easy, factoring is hard Trap-door: number theory (Euler and Fermat)

16 16 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Security of RSA n is public, but not p and q where n = pq How much work is factoring n ? n ~200 digits – would take quintillions of years Number Field Sieve (fastest known factoring algorithm) is: O(e 1.9223((ln (n)) 1/3 (ln (ln (n))) 2/3 )

17 17 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Asymmetric Cryptosystems Encryption and Decryption are done with different keys Keep one of the keys secret, reveal the other E KRA (E KUA (M)) = M Alice’s Public Key: KUA Alice’s Private Key: KRA Only KRA can decrypt a message encrypted using KUA.

18 18 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Public-Key Applications: Privacy Alice encrypts message to Bob using Bob’s Public Key Only Bob knows Bob’s Private Key  only Bob can decrypt message Encrypt Decrypt Plaintext Ciphertext Plaintext Alice Bob Bob’s Public Key Bob’s Private Key

19 19 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Signatures Bob knows it was from Alice, since only Alice knows Alice’s Private Key Non-repudiation: Alice can’t deny signing message (except by claiming her key was stolen!) Integrity: Bob can’t change message (doesn’t know Alice’s Private Key) Encrypt Decrypt Plaintext Signed Message Plaintext Alice Bob Alice’s Private Key Alice’s Public Key

20 20 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Encrypt Decrypt Plaintext Ciphertext Plaintext User Server KU S KR S The Internet Public Key Private Key How does User know the public key to use?

21 21 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Key Management

22 22 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Approach 1: Meet Secretly User and Server Operator meet secretly and swap public keys –If you can do that, might as well agree on a secret (symmetric key) instead –Doesn’t work for Internet transactions

23 23 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Approach 2: Public Announcement Publish public keys in a public forum –Append to email messages –Post on web site –New York Time classifieds Easy for rogue to pretend to be someone else –Forge email, alter web site, lie to New York Times

24 24 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Approach 3: Public Directory Trusted authority maintains directory mapping names to public keys Entities register public keys with authority in some secure way Authority publishes directory –Print using watermarked paper, special fonts, etc. –Allow secure electronic access Depends on secure distribution of directory’s key

25 25 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Approach 4: Certificates VeriSign UserServer KU S C S = E KR VeriSign [“Server”, KU S ] CSCS Request $$$$ E KUVeriSign (C S ) = [“Server”, KU S ] Knows KR S

26 26 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography SSL (Secure Sockets Layer) Browser Server Hello KR CA [Server Identity, KU S ] Check Certificate using KU CA Pick random K KU S [K] Find K using KR S Secure channel using K Note: This is slightly simplified from the actual SSL protocol. This version is vulnerable to a person-in- the-middle attack!

27 27 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Data encrypted using secret key exchanged using some public key associated with some certificate.

28 28 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography

29 29 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography

30 30 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography

31 31 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography SSL Recap Browser Server Hello KR CA [Server Identity, KU S ] Check Certificate using KU CA Pick random K KU S [K] Find K using KR S Secure channel using K Note: This is slightly simplified from the actual SSL protocol. This version is vulnerable to a person-in- the-middle attack!

32 32 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Questions?

33 33 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Animated version of Asymmetric Cryptography Demo

34 34 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Padlocked Boxes Alice Hi!

35 35 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Padlocked Boxes Alice Hi! Alice’s Padlock Alice’s Padlock Key

36 36 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Padlocked Boxes Alice Alice’s Padlock Key Shady Sammy’s Slimy Shipping Service

37 37 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Padlocked Boxes Alice Hi! Bob Bob’s Padlock Bob’s Padlock Key Alice’s Padlock Key

38 38 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Padlocked Boxes Alice Hi! Bob Bob’s Padlock Key Alice’s Padlock Key

39 39 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Padlocked Boxes Alice Hi! Bob Bob’s Padlock Key Alice’s Padlock Key

40 40 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Padlocked Boxes Alice Hi! Bob Bob’s Padlock Key

41 41 JILL WWII Crypto Spring 2006 - Class 4: Modern Cryptography Padlocked Boxes Alice Hi! Bob Bob’s Padlock Key Hi!


Download ppt "Cryptography in World War II Jefferson Institute for Lifelong Learning at UVa Spring 2006 David Evans Class 4: Modern Cryptography"

Similar presentations


Ads by Google