Digital Signatures.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

Digital Signatures. Anononymity and the Internet.
Shared Secrets Keeping secrets on the web. Encryption Goal : hidden in plain sight.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Cryptography in World War II Jefferson Institute for Lifelong Learning at UVa Spring 2006 David Evans Class 4: Modern Cryptography
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Cryptography 101 How is data actually secured. RSA Public Key Encryption RSA – names after the inventors –Rivest, Shamir, and Adleman Basic Idea: Your.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Public Key Cryptography
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Computer Science Public Key Management Lecture 5.
Public Key Model 8. Cryptography part 2.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 12 Cryptography (slides edited by Erin Chambers)
How HTTPS Works J. David Giese. Hyper Text Transfer Protocol BrowserHTTP Server GET / HTTP/1.1 HOST: edge-effect.github.io HEADERS BODY HTTP/ OK.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Encryption Coursepak little bit in chap 10 of reed.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Pertemuan-13 Enkripsi and Authentication. Symmetric-key Cryptography  Data encrypted and decrypted with same key  Classical examples: Caesar cipher,
David Evans CS200: Computer Science University of Virginia Computer Science Class 36: Public-Key Cryptography If you want.
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Chapter 4: Public Key Cryptography
CPIS 312 Chapter Four: PUBLIC KEY CRYPTO. Index 2 A.Introduction A.1 Asymmetric Key Cryptography- Introduction A.2 General ideas about the Public Key.
1 Internet data security (HTTPS and SSL) Ruiwu Chen.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Secure HTTP (HTTPS) Pat Morin COMP 2405.
Cryptography – Test Review
Security Outline Encryption Algorithms Authentication Protocols
Unit 3 Section 6.4: Internet Security
Symmetric and Asymmetric Encryption
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Privacy & Security.
Public Key Encryption Systems
Public-Key Cryptography and RSA
Public Key Encryption and the RSA Algorithm
Big Numbers: Mathematics and Internet Commerce
Topic 1: Data, information, knowledge and processing
E-Commerce Security.
Public-Key Cryptography
Public Key Cryptography
Public Key Infrastructure
PART VII Security.
NET 311 Information Security
Security.
The Secure Sockets Layer (SSL) Protocol
Chapter 4 Cryptography / Encryption
Appendix 5: Cryptography p
MSIT 543 Cryptography Concepts and Techniques How RSA Encryption Works
NET 311 Information Security
Public-Key, Digital Signatures, Management, Security
Chapter 3 - Public-Key Cryptography & Authentication
Chapter 29 Cryptography and Network Security
Electronic Payment Security Technologies
Public Key Encryption Systems
Fluency with Information Technology Lawrence Snyder
Public Key Encryption Systems
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

Digital Signatures

Anononymity and the Internet

Potential For Mischief

Potential For Mischief

Dilemma Need encryption for security Encryption needs shared key

Dilemma Need encryption for security Encryption needs shared key Diffie Hellman produces shared key

Dilemma Need encryption for security Encryption needs shared key Diffie Hellman produces key But with who???

Symmetric Cryptography Traditional cryptography Same secret encrypts and decrypts: Shift by three letters XOR with bits

Asymmetric Cryptography Symmetric cryptography: Key for encoding same as key for decoding Shift three letters

Asymmetric Cryptography Asymmetric cryptography: Key for encoding different than for decoding

Asymmetric Cryptography Keys work in both directions

Asymmetric Cryptography You can't unlock with key used to lock

Public/Private Keys Make an A/B pair of asymmetric keys Give one away : Public Key Keep one secret : Private Key

Private Key Message is "Signed" Only owner can lock with private key Anyone can unlock Message is "Signed"

Public Key Everyone can lock with public key Only private key holder can unlock

Key Distribution Problem How do you get the right public key from Wells Fargo?

Key Distribution Problem How do you get the right public key from Wells Fargo? Sure, I'm Wells Fargo, here is my public key!!!

Signature Bank Record of signatures

Authenticating a Key Official key bank?? Wells Fargo

Can't Trust Internet Bank Same problem: Key Bank Sure, I'm the key bank, here is Wells Fargo's key!!!

Authenticating a Key Computers & Browsers come with public keys from Certification Authorities

Authenticating a Key Browsers come with public keys of known banks called Certification Authorities

Authenticating a Key Certification Authorities use private key to lock up public keys of other companies "Certificate"

Authenticating a Key If your computer can open box with Verisign public key you can trust what is inside "Certificate"

Chain Of Trust Reality may involve chain of locks

Chain Of Trust Reality may involve chain of locks

Web Security HTTPS : Secure web connection Browser asks server for certificated public key Browser picks shared secret Encrypts with public key, sends to server

Web Security HTTPS : Secure web connection Browser asks server for public key Browser picks shared secret, encrypts with public key, sends to server

Asymmetric Math Use same tricks as Diffie-Hellman: Exponents Mod

Asymmetric Math Possible to pick numbers A, B, C so that:

Asymmetric Math Example: A = 3, B = 7, C = 22 Encrypt with A, decrypt with B

Asymmetric Math Example: A = 3, B = 7, C = 22 OR encrypt with B, decrypt with A

RSA How do we pick A, B, C that work together??? RSA algorithm invented in 1977 (Rivest, Shamir, Adelman)

Picking Keys Start with two prime numbers p, q – multiply to make clock size (C)

Picking Keys Start with two prime numbers p, q – multiply to make clock size (C) Pick (A) that will be part of your private key: {A, C}

Picking Keys Start with two prime numbers p, q – multiply to make clock size (C) Pick (A) that will be part of your private key: {A, C} Calculate (B) from p, q and (A). This makes your public key: {B, C}

Picking Keys Start with two prime numbers p, q – multiply to make clock size (C) Pick (A) that will be part of your private key: {A, C} Calculate (B) from p, q and (A). This makes your public key: {B, C} If anyone figures out p and q they can use B to calculate A !!!

Picking Keys Start with two prime numbers p, q – multiply to make clock size (C) … If anyone figures out p and q they can use B to calculate A !!! To get p and q you have to factor C

Factoring Factoring large numbers is hard But we are getting faster

Factoring Factoring large numbers is hard But we are getting faster Larger keys : 2048 bits (prime numbers with 100's of digits)

Signed Message Messages can be anything Data, Other keys Any attempt to modify encrypted box will mess up the message

Four messages: Message 5 4 15 8 Encrypted Version 11 30 12 2 I sent four messages "signed" with private key My public key: exponent 3, clock 34 message = encrypted ^ exponent mod clock One message was modified, which one is it? Three should check out, one should not private key 11