Basics of Cryptography

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Information Security & Cryptographic Principles. Infosec and Cryptography Subjects / Topics : 1. Introduction to computer cryptography 1. Introduction.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Encryption Methods By: Michael A. Scott
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Introduction to Public Key Cryptography
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Public Key Cryptography July Topics  Symmetric and Asymmetric Cryptography  Public Key Cryptography  Digital Signatures  Digital Certificates.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Cryptography, Authentication and Digital Signatures
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Network Security Celia Li Computer Science and Engineering York University.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
CPIS 312 Chapter Four: PUBLIC KEY CRYPTO. Index 2 A.Introduction A.1 Asymmetric Key Cryptography- Introduction A.2 General ideas about the Public Key.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Overview of Cryptography
Security Outline Encryption Algorithms Authentication Protocols
Asymmetric-Key Cryptography
Public-Key Cryptography and Message Authentication
Cryptography Much of computer security is about keeping secrets
Computer Communication & Networks
Cryptographic Hash Function
Digital Signatures A digital signature is a protocol that produces the same effect as a real signature: It is a mark that only the sender can make but.
Public Key Encryption and Digital Signatures
Public-key Cryptography
Cryptography and Security Technologies
Basic Network Encryption
Cryptography.
NET 311 Information Security
Cryptography: Basics (2)
Lecture 4 - Cryptography
Chapter 4 Cryptography / Encryption
NET 311 Information Security
Network Security - A Lecture 1 - NETW4006 NETW4006-Lecture01 1.
Public-Key, Digital Signatures, Management, Security
Digital Signatures Reference: Pfleeger , Charles P., Security in Computing, 2nd Edition, Prentice Hall, /7/2019 Ref: Pfleeger96, Ch.4.
Chapter 3 - Public-Key Cryptography & Authentication
Chapter 29 Cryptography and Network Security
Basic Network Encryption
Basic of Modern Cryptography
Fluency with Information Technology Lawrence Snyder
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

Basics of Cryptography Aashutosh

Outline Introduction to Cryptography Private/Symmetric-key Cryptography Public/Asymmetric-key Cryptography Digital Signature

Introduction to Cryptography Needs and Requirements Well established needs for secure communication War time communication Business transactions Requirements of secure communication Secrecy Only intended receiver understands the message Authentication Sender and receiver need to confirm each others identity Message Integrity Ensure that their communication has not been altered, either maliciously or by accident during transmission

Introduction to Cryptography Basics Cryptography is the science of secret, or hidden writing It has follwoing main Components: Encryption Practice of hiding messages so that they can not be read by anyone other than the intended recipient Authentication & Integrity Ensuring that users of data/resources are the persons they claim to be and that a message has not been altered

Introduction to Cryptography Terminology Plaintext (or cleartext) The message. Denoted by M or P. Encryption (encipher) Encoding of message. Denoted by E. Ciphertext Encrypted message. Denoted by C. Decryption (decipher) decoding of ciphertext denoted by D.

Encryption and Decryption M C M E D The following identity must hold true: D(C) = M, where C = E(M)

Cryptography: Algorithms and Keys A method of encryption and decryption is called a cipher. Generally there are two related functions: one for encryption and other for decryption. Some cryptographic methods rely on the secrecy of the algorithms. Such methods are mostly of historical interest these days. All modern algorithms use a key to control encryption and decryption.

Key Based Encryption/Decryption M C M E D Symmetric Case: both keys are the same or derivable from each other. Asymmetric Case: keys are different and not derivable from each other.

Secret Key Cryptography M C M R S E D K is the secret key shared by both the sender (S) and receiver (R).

Secrete Key Cryptography Also called symmetric or single-key algorithms. The encryption and the decryption key are the same. Techniques based on a combination of substitution and permutation. Stream ciphers: operate on single bit or byte. Block ciphers: operate on blocks (typically 64 bits) Advantage: simple, fast. Disadvantage: key exchange, key management. Examples: DES,RC4, IDEA, Blowfish, AES, etc.

Private Key Cryptosystem (Symmetric)

Symmetric Key - Issues Key management, keys required = (p*(p-1))/2

Secrete Key Assurances Confidentiality is assurance that only owners of a shared secrete key can decrypt a message that has been encrypted with the shared secrete key Authentication is assurance of the identify of the person at the other end of the line (use challenge and response protocols) Integrity is assurance that a message has not been changed during transit and is also called message authentication (use message fingerprint) Non-repudiation is assurance that the sender cannot deny a file was sent. This cannot be done with secrete key alone (need trusted third party or public key technology)

Example: non-repudiation Scenario 1: Alice sends a stock buy request to Bob Bob does not buy and claims that he never received the request Scenario 2: Bob sends back an acknowledge message Again, Bob does not buy and claims that he never received it Alice presents the ack message as proof Can she prove that the ack message was created by him?

Public Key Cryptography KR(pub) KR(pri) M C M R S E D KR(pub) is Receiver’s public key and KR(pri) is Receiver’s private key.

Public Key Cryptographic Algorithms Find a hard math problem, that is easy to compute in the forward direction, but is difficult to solve in the reverse direction, unless you have some special knowledge.

General Strategy Also called public-key algorithms. Encryption key is different from decryption key. Furthermore, one cannot be calculated from other. Encryption key is often called the public key and decryption key is often called the private key. Advantages: better key management. Disadvantages: slower, more complex. Examples: RSA, Diffie-Hellman, El Gamal, etc.

Simplified Math Tricks Public key cryptography is based on the mathematical concept of multiplicative inverse. Multiplicative inverses are two numbers that when multiplied equals one (e.g., 7 x 1/7 = 1) In modular mathematics, two whole numbers are inverses if they multiplies to 1 (e.g., 3 x 7 mod 10 = 1) Use modular inverse pairs to create public and private keys. Example Message is 4 To scramble it, use 4 X 3 mod 10 = 2 To recover it, use 2 x 7 mod 10 = 4 The security of public key systems depends on the difficulty of calculating inverses.

Hybrid Cryptosystems In practice, public-key cryptography is used to secure and distribute session keys. These keys are used with symmetric algorithms for communication. Sender generates a random session key, encrypts it using receiver’s public key and sends it. Receiver decrypts the message to recover the session key. Both encrypt/decrypt their communications using the same key. Key is destroyed in the end.

Authentication Basics Authentication is the process of validating the identity of a user or the integrity of a piece of data. There are three technologies that provide authentication Message Digests / Message Authentication Codes Digital Signatures Public Key Infrastructure

Message Digest A message digest is a fingerprint for a document Purpose of the message digest is to provide proof that data has not altered Process of generating a message digest from data is called hashing Hash functions are one way functions with following properties Infeasible to reverse the function Infeasible to construct two messages which hash to same digest Commonly used hash algorithms are MD5 – 128 bit hashing algorithm by Ron Rivest of RSA SHA & SHA-1 – 162 bit hashing algorithm developed by NIST Message Digest Algorithm

Digital Signatures A digital signature is a protocol the produces the same effect as a real signature. It is a mark that only sender can make Other people can easily recognize it as belonging to the sender. Digital signatures must be: Unforgetable: If P signs message M with signature S(P,M), it is impossible for someone else to produce the pair [M, S(P,M)]. Authentic: R receiving the pair [M, S(P,M)] can check that the signature is really from P.

Digital Signatures: Symmetric Key Under private key encryption system, the secrecy of the key guarantees the authenticity of the message as well as its secrecy. It does not prevent forgery, however. There is no protection against repudiation (denial of sending a message). An arbitrator (a trusted third party) is needed to prevent forgery.

Digital Signatures - Public Key Public key encryption systems are ideally suited to digital signatures. Reverse of public key encryption/decryption. To sign a message, use your private key to encrypt the message. Send this signature together with the message. The receiver can verify the signature using your public key. Only you could have signed the message since your private key belongs to you and only you. The receiver saves the message and signature.

Digital Signature Process

Authentication Digital Cerftificates (PKI) A public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption. A digital certificate is a signed statement by a trusted party that another party’s public key belongs to them. This allows one certificate authority to be authorized by a different authority (root CA) Any one can start a certificate authority Name recognition is key to some one recognizing a certificate authority Verisign is industry standard certificate authority

Certificate Authority’s Private Key Identity Information Signature Algorithm Certificate Sender’s Public Key Certificate Authority’s Private Key

Q & A ?

THANK YOU !

References