Cryptography Reference: Network Security

Slides:



Advertisements
Similar presentations
Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Netprog: Cryptgraphy1 Cryptography Reference: Network Security PRIVATE Communication in a PUBLIC World. by Kaufman, Perlman & Speciner.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Attacks on Digital Signature Algorithm: RSA
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Lecture 22 Network Security CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Netprog: Security1 Security Terminology Traditional Unix Security TCP Wrapper Cryptography Kerberos.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Lecture 24 Cryptography CPE 401 / 601 Computer Network Systems slides are modified from Jim Kurose and Keith Ross and Dave Hollinger.
Introduction to Cryptography
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
May 2002Patroklos Argyroudis1 A crash course in cryptography and network security Patroklos Argyroudis CITY Liberal Studies.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
David Evans CS200: Computer Science University of Virginia Computer Science Class 36: Public-Key Cryptography If you want.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Digital Signatures, Message Digest and Authentication Week-9.
Cryptography: Digital Signatures Message Digests Authentication
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
1 Internet data security (HTTPS and SSL) Ruiwu Chen.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Web Security.
The Secure Sockets Layer (SSL) Protocol
Cryptography – Test Review
Encryption: Image Representation Privacy/Cryptography
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Key Exchange References: Applied Cryptography, Bruce Schneier
Computer Communication & Networks
Cryptography Reference: Network Security
Cryptography Reference: Network Security
Information Security message M one-way hash fingerprint f = H(M)
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Public-key Cryptography
Encryption
Basic Network Encryption
Introduction to security goals and usage of cryptographic algorithms
Cryptography.
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
NET 311 Information Security
12 E-Commerce Overview.
Keys Campbell R. Harvey Duke University, NBER and
Campbell R. Harvey Duke University and NBER
Pooja programmer,cse department
Security through Encryption
Campbell R. Harvey Duke University and NBER
Information Security message M one-way hash fingerprint f = H(M)
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
The Secure Sockets Layer (SSL) Protocol
Intro to Cryptography Some slides have been taken from:
Lecture 10: Network Security.
CDK: Chapter 7 TvS: Chapter 9
Public-Key, Digital Signatures, Management, Security
Introduction to Cryptography (1)
Chapter 29 Cryptography and Network Security
Basic Network Encryption
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

Cryptography Reference: Network Security PRIVATE Communication in a PUBLIC World. by Kaufman, Perlman & Speciner.

Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile environment (otherwise - why the need for cryptography?), it may be hard to share a secret key.

Public Key Cryptography (a.k.a. asymmetric cryptography) Relatively new field - 1975 (as far as we know, the NSA is not talking). Each entity has 2 keys: private key (a secret) public key (well known).

Public keys are used for encrypting. Private keys are used for decrypting. encryption plaintext ciphertext public key decryption ciphertext plaintext private key

Digital Signature Public key cryptography is also used to provide digital signatures. signing plaintext signed message private key verification signed message plaintext public key

Transmitting over an insecure channel. Alice wants to send Bob a private message. Apublic is Alice’s public key. Aprivate is Alice’s private key. Bpublic is Bob’s public key. Bprivate is Bob’s private key.

Hello Bob, Wanna get together? Alice Bob encrypt using Bpublic decrypt using Bprivate

OK Alice, Your place or mine? Bob decrypt using Aprivate encrypt using Apublic

Bob’s Dilemma Nobody can read the message from Alice, but anyone could produce it. How does Bob know that the message was really sent from Alice? Bob may be comforted to know that only Alice can read his reply.

Alice can sign her message! Alice can create a digital signature and prove she sent the message (or someone with knowledge of her private key). The signature can be a message digest encrypted with Aprivate.

Message Digest Also known as “hash function” or “one-way transformation”. Transforms a message of any length and computes a fixed length string. We want it to be hard to guess what the message was given only the digest. Guessing is always possible.

Alice’s Signature Alice feeds her original message through a hash function and encrypts the message digest with Aprivate. Bob can decrypt the message digest using Apublic. Bob can compute the message digest himself. If the 2 message digests are identical Bob knows Alice sent the message.

Revised Scheme Alice Bob Sign with Aprivate check signature using Apublic encrypt using Bpublic decrypt using Bprivate

Why the digest? Alice could just encrypt her name, and then Bob could decrypt it with Apublic. Why wouldn’t this be sufficient?

Implications Suppose Alice denies she sent the message? Bob can prove that only someone with Alice’s key could have produced the message.

Another possible problem Suppose O.J. receives a message from Alice including a digital signature. O.J. sends the same message to Bob claiming to be Alice, and includes the digital signature from the message Alice sent to him. Bob is convinced Alice sent the message!

Solution? Always start your messages with: Dear O.J. Create a digest from the encrypted message and sign that digest. There are many other schemes as well.

Speed Secret key encryption/decryption algorithms are much faster than public key algorithms. Many times a combination is used: use public key cryptography to share a secret key. use the secret key to encrypt the bulk of the communication.

Secure Protocols There are a growing number of applications for secure protocols: email electronic commerce electronic voting homework submission

Secure Protocols Many application protocols include the use of cryptography as part of the application level protocol. Secure Sockets Layer (SSL) is a different approach - a new layer is added that provides a secure channel (currently TCP only). Most secure WWW communication is SSL based.

Security There is a course on security offered - much more in depth. I have lots of books for anyone interested in secure protocols, encryption standards and algorithms, etc.