DTTF/NB479: Dszquphsbqiz Day 27

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Hash Functions A hash function takes data of arbitrary size and returns a value in a fixed range. If you compute the hash of the same data at different.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Digital Signatures and Hash Functions. Digital Signatures.
Announcements: 1. Term project groups and topics due midnight 2. HW6 due next Tuesday. Questions? This week: Primality testing, factoring Primality testing,
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the orderQuestions? Review.
Announcements: 1. HW7 due next Tuesday. 2. Inauguration today! Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman,
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Authentication Methods: From Digital Signatures to Hashes.
Announcements:Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman, ElGamal Hash Functions and SHA-1 Hash Functions.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Announcements: 1. Presentations start Friday 2. Cem Kaner presenting O th block today. Questions? This week: DSA, Digital Cash DSA, Digital Cash.
Introduction to Modern Cryptography Homework assignments.
Announcements:Questions? This week: Birthday attacks, Digital signatures, DSA Birthday attacks, Digital signatures, DSA DTTF/NB479: DszquphsbqizDay 30.
Pass in HW6 now Can use up to 2 late days Can use up to 2 late days But one incentive not to burn them all: teams will get to pick their presentation day.
Announcements: 1. HW6 due now 2. HW7 posted Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman, ElGamal Hash Functions.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Chapter3 Public-Key Cryptography and Message Authentication.
Hash Functions Nathanael Paul Oct. 9, Hash Functions: Introduction Cryptographic hash functions –Input – any length –Output – fixed length –H(x)
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Announcements:Questions? This week: Digital signatures, DSA Digital signatures, DSA DTTF/NB479: DszquphsbqizDay 29.
Announcements: 1. Pass in HW7 now. 2. Project rubrics posted (peruse together) 3. Teams choose presentation dates now Questions? This week: Birthday attacks,
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Announcements: 1. Late HW7’s now. Questions? This week: Birthday attacks, Digital signatures, DSA Birthday attacks, Digital signatures, DSA DTTF/NB479:
Public Key Model 8. Cryptography part 2.
Digital Signatures (DSs) The digital signatures cannot be separated from the message and attached to another The signature is not only tied to signer but.
Lecture 15 Lecture’s outline Public algorithms (usually) that are each other’s inverse.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
IS 302: Information Security and Trust Week 5: Integrity 2012.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Chapter 21 Public-Key Cryptography and Message Authentication.
1 Hash Functions. 2 A hash function h takes as input a message of arbitrary length and produces as output a message digest of fixed length
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
Prepared by Dr. Lamiaa Elshenawy
Hash Functions Ramki Thurimella. 2 What is a hash function? Also known as message digest or fingerprint Compression: A function that maps arbitrarily.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 11 September 23, 2004.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Basics of Cryptography
Key Exchange References: Applied Cryptography, Bruce Schneier
Public-Key Cryptography and Message Authentication
DTTF/NB479: Dszquphsbqiz Day 26
CSE 4095 Digital Signatures and Hashing
Network Security Unit-III
Public-key Cryptography
Chapters 14,15 Security.
A way to detect a collision…
Information Security message M one-way hash fingerprint f = H(M)
ICS 454 Principles of Cryptography
Public-Key Cryptography and Message Authentication
Intro to Cryptography Some slides have been taken from:
ICS 454 Principles of Cryptography
Key Management Network Systems Security
Chapters 14,15 Security.
El Gamal and Diffie Hellman
DTTF/NB479: Dszquphsbqiz Day 25
Chapter 3 - Public-Key Cryptography & Authentication
Introduction to Modern Cryptography
DTTF/NB479: Dszquphsbqiz Day 25
Practical Aspects of Modern Cryptography
Presentation transcript:

DTTF/NB479: Dszquphsbqiz Day 27 Announcements: HW6 “double-late-day” due now HW7 posted, due next Tuesday. Get out the in-class assignment we did on ElGamal Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Hash Functions

ElGamal Name: ______________________ Show that Bob’s decryption works Plug in values for t, r, and b. Eve would like to know k. Show that knowing k allows decrpytion. Why? m=b-kt Why can’t Eve compute k from r or t? Need to calculate a discrete log to do so, which is hard when p is large Challenge: Alice should randomize k each time. If not, and Eve gets hold of a plaintext / ciphertext (m1, r1, t1), she can decrypt other ciphertexts (m2, r2, t2). Show how. Use m1, t1 to solve for bk. Then use b-k and t2 to find m2 If Eve says she found m from (r,t), can we verify that she really found it, using only the public key (and not k or a)? Explain. Not easily (see next slide) Bob publishes (a, p, b), where 1 < m < p and b=aa Alice chooses secret k, computes and sends to Bob the pair (r,t) where r=ak (mod p) t = bkm (mod p) Bob finds: tr-a=m (mod p) Notes:

Tying everything together Bob publishes (a, p, b), where 1 < m < p and b=aa Alice chooses secret k, computes and sends to Bob the pair (r,t) where r=ak (mod p) t = bkm (mod p) Bob finds: tr-a=m (mod p) Why does this work? If Eve says she found m from (r,t), can we verify that she really found it, using just m,r,t and the public key? Decision D-H Validity of (mod p) ElGamal ciphertexts. Computational D-H Decrypting (mod p) ElGamal ciphertexts. Not easily!

On to Hash Functions… But first, some more humor: http://www.xkcd.com/c153.html Thanks to Andrew and Ben, for each sending this to me independently

Hash Functions Goal: to provide a unique “fingerprint” of the message. Message m (long) Message digest, y (Shorter fixed length) Cryptographic hash Function, h Shrinks data, so 2 messages can have the same digest: m1 != m2, but h(m1) = h(m2) Goal: to provide a unique “fingerprint” of the message. How? Must demonstrate 3 properties: Fast to compute y from m. One-way: given y = h(m), can’t find any m’ satisfying h(m’) = y easily. Strongly collision-free: Can’t find any m1 != m2 such that h(m1)=h(m2) easily (Sometimes we can settle for weakly collision-free: given m, can’t find m’ != m with h(m) = h(m’).

Hash Functions 3 properties: Why do we care about these properties? Fast to compute One-way: given y = h(m), can’t find any m’ satisfying h(m’) = y easily. Strongly collision-free: Can’t find m1 != m2 such that h(m1)=h(m2) Why do we care about these properties? Use #1: Digital signatures If Alice signs h(m), what if Bob could find m’ != m, such that h(m) = h(m’)? He could claim Alice signed m’! Consider two contracts… Use #2: Error compression – simple example: Alice sends (m, h(m)), Bob receives (M, H). Bob checks if H=h(M). If not, there’s an error.

Hash Functions 3 properties: Examples: Fast to compute One-way: given y = h(m), can’t find any m’ satisfying h(m’) = y easily. Strongly collision-free: Can’t find m1 != m2 such that h(m1)=h(m2) Examples: h(m) = m (mod n) Given large prime p, such that q=(p-1)/2 is also prime, and primitive roots a and b for p: where m = m0 + m1q EHA (next) SHA-1 (tomorrow) MD4, MD5 (weaker than SHA) Lots more out there… For first 2 examples, please check properties 1-3.

EHA: Easy Hash Algorithm Break m into n-bit blocks, append zeros to get a multiple of n. There are L of them, where L =|m|/n Fast! But not very secure. Doing a left shift on the rows helps a little: Define as left-shifting m by y bits Then =h(m)

EHA: Easy Hash Algorithm 3 properties: Fast to compute One-way: given y = h(m), can’t find any m’ satisfying h(m’) = y easily. Strongly collision-free: Can’t find m1 != m2 such that h(m1)=h(m2) =h(m) Exercise: Show that the basic (unrotated) version doesn’t satisfy properties 2 and 3. What about the version that uses rotations?