1 Introduction to Information Security 0368-3065, Spring 2016 Lecture 4: Applied cryptography: asymmetric Zvi Ostfeld Slides credit: Eran Tromer.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
The RSA Cryptosystem Dan Boneh Stanford University.
CS470, A.SelcukElGamal Cryptosystem1 ElGamal Cryptosystem and variants CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CS470, A.SelcukPublic Key Cryptography1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Cryptography1 CPSC 3730 Cryptography Chapter 13 Digital Signature Standard (DSS)
Introduction to Modern Cryptography Lecture 7 1.RSA Public Key CryptoSystem 2.One way Trapdoor Functions.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Topic 5 Essential Public Key Crypto Methods.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
CS470, A.SelcukRSA1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
1 Introduction to Information Security , Spring 2015 Lecture 7: Applied cryptography: asymmetric Eran Tromer Slides credit: John Mitchell, Stanford.
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
ASYMMETRIC CIPHERS.
Cryptography and Network Security Chapter 13
Lecture 6: Public Key Cryptography
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
8. Data Integrity Techniques
Chapter 5 Digital Signatures MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
The RSA Algorithm Rocky K. C. Chang, March
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Lecture 3.2: Public Key Cryptography II CS 436/636/736 Spring 2014 Nitesh Saxena.
10.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Symmetric-Key Cryptography.
Cryptography Lecture 8 Stefan Dziembowski
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Networks Management and Security Lecture 3.
1 Lect. 13 : Public Key Encryption RSA ElGamal. 2 Shamir Rivest Adleman RSA Public Key Systems  RSA is the first public key cryptosystem  Proposed in.
Midterm Review Cryptography & Network Security
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Chapter 21 Public-Key Cryptography and Message Authentication.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
Prepared by Dr. Lamiaa Elshenawy
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Digital Signature Standard (DSS) US Govt approved signature scheme designed by NIST & NSA in early 90's published as FIPS-186 in 1991 revised in 1993,
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
CPIS 312 Chapter Four: PUBLIC KEY CRYPTO. Index 2 A.Introduction A.1 Asymmetric Key Cryptography- Introduction A.2 General ideas about the Public Key.
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
Network security Cryptographic Principles
Basics of Cryptography
Asymmetric-Key Cryptography
Public Key Encryption and Digital Signatures
Cryptography Lecture 26.
Presentation transcript:

1 Introduction to Information Security , Spring 2016 Lecture 4: Applied cryptography: asymmetric Zvi Ostfeld Slides credit: Eran Tromer

2 Public-Key Encryption

3 Public-key encryption

4 Example: RSA

5 Why RSA works

6 RSA Example (taken from Wikipedia) The parameters used here are artificially small. 1. Choose two distinct prime numbers, such as p=61 and n= Compute n = pq giving n = 61 * 53 = Compute the totient of the product as φ(n) = (p − 1)(q − 1) giving φ(3233) = (61 − 1)(53 − 1) = Choose any number 1 < e < 3120 that is coprime to Choosing a prime number for e leaves us only to check that e is not a divisor of Let e = Compute d, the modular multiplicative inverse of e (mod φ(n)) yielding, d = 2753 The public key is (n = 3233, e = 17). The private key is (d = 2753).

7 RSA Example (Cont’) Encryption For instance, in order to encrypt m = 65, we calculate Decryption To decrypt c = 2790, we calculate

8 Textbook RSA is insecure  What if message is from a small set (yes/no)? Can build table (Deterministic)  What if there’s some protocol in which I can learn other message decryptions? (Chosen ciphertext attack)  What if I want to outbid you in secret auction? I take your encrypted bid c and submit c (101/100) e mod n (Malleability)

9 RSA Padding: OAEP Preprocess message for RSA  H and G are cryptographic hash functions (e.g., SHA-1) If RSA is trapdoor permutation, then this is chosen-ciphertext secure (if H,G “behave like random oracles”) H + G + Plaintext to encryptwith RSA rand.Message Decryption: Apply plain RSA decryption. Check pad, reject if invalid.  {0,1} n-1 [Bellare Rogaway ’94] [Shoup ‘01] [PKCS#1 v2] [RFC 2437]

10 Security of (properly-padded) RSA  If factoring is easy, RSA is broken. Converse conjectured but unproven.  Best factoring algorithm: Number Field Sieve (subexponential complexity)  Key size: Record: 768 bits, in 2009, using ∼ 2000 core-years. Popular until recently: 1024-bit. Estimated to be breakable by a large botnet or special-purpose hardware (<1M$ marginal cost). NIST recommendation:  3072 bits (equivalent to 128 bit symmetric).  2048 bits (equiv. to 112 bit symmetric) “acceptable until 2030”.  Quantum computers can factor in polynomial time (Shor’s algorithm). Appears possible in theory, but many believe it will take decades to solve the engineering/technological challenges. Record: factoring 15 and 21.

11 RSA discussion

12 Other public-key encryption schemes

13 Digital Signatures

14 Digital Signatures  Alice publishes key for verifying signatures  Anyone can check a message signed by Alice  Only Alice can send signed messages

15 Properties of signatures (for case of deterministic signatures)

16 RSA Signature Scheme  jjjjjjj Hybrid signature: sign hash of message instead of full plaintext

17 RSA Signature Scheme

18 Other digital signature schemes  DSA (Digital Signature Algorithm) Relies on hardness of discrete logarithms  Schemes based on elliptic curves Popular in modern systems due to faster operations and smaller key size  Signatures based just on hash functions (Lamport), with stateful signing algorithm and limited #messages.  Lattice-based schemes Generalization: succinct noninteractive proofs of knowledge (SNARK) allowing verifying the correctness not just of data, but also of computation. [whiteboard discussion]

19 Public-key infrastructure

20 Public-Key Infrastructure (PKI)  Anyone can send Bob a secret message Provided they know Bob’s public key  How do we know a key belongs to Bob? If imposter substitutes another key, can read Bob’s mail  One solution: PKI Trusted root authority (VeriSign, IBM, United Nations)  Everyone must know the verification key of root authority  Check your browser; there are hundreds! Root authority can sign certificates Certificates identify others, by linking their ID (e.g., domain name or legal name) to a verification key they own Certifiicates can also delegate trust to other certificate authorities  Leads to certificate chains Most common standard “X.509”

21 Public-Key Infrastructure Client (browser)

22 CA

23 Certificate authorities – practical problems Certification policy – when to sign server’s certificates? Inclusion in database of trusted Cas –Default database in browsers, OSs –Updates Transitive trusts, sub-CAs Practically: –Lax verification (attacks known) –Lax security (attacks known) –National/commercial bodies with diverse interests