Public-Key, Digital Signatures, Management, Security

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents Security requirements Public key cryptography Key agreement/transport.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Network Security Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
Public Key Model 8. Cryptography part 2.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Network Security. Information secrecy-only specified parties know the information exchanged. Provided by criptography. Information integrity-the information.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Cryptography, Authentication and Digital Signatures
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
1 Public-Key Cryptography and Message Authentication.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Network Security David Lazăr.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Key management issues in PGP
Digital Signatures.
Reviews Rocky K. C. Chang 20 April 2007.
Basics of Cryptography
Security Outline Encryption Algorithms Authentication Protocols
Key Exchange References: Applied Cryptography, Bruce Schneier
Public-Key Cryptography and Message Authentication
Computer Communication & Networks
Privacy & Security.
Network Security.
Public Key Encryption Systems
What is network security?
B. R. Chandavarkar CSE Dept., NITK Surathkal
Public Key Encryption and Digital Signatures
Public-key Cryptography
Chapter 8 Network Security.
IS3230 Access Security Unit 9 PKI and Encryption
Chapter 8 Network Security.
Chapt. 10 – Key Management Dr. Wayne Summers
NET 311 Information Security
Enabling Technology1: Cryptography
Intro to Cryptography Some slides have been taken from:
NET 311 Information Security
Chapter 3 - Public-Key Cryptography & Authentication
Network Security Chapter 8.
Fluency with Information Technology Lawrence Snyder
Public Key Encryption Systems
Presentation transcript:

Public-Key, Digital Signatures, Management, Security By: Sunil, Zack, Yazeed, Rosh, James

Public Key Algorithms What is it? Distributing keys has always been a major issue in most cryptosystems Keys had to be safe from theft, but couldn’t be secured because they had to be distributed In 1976, two researchers from Stanford University, Diffie and Hellman proposed an entirely new kind of cryptosystem in which the encryption and decryption keys were completely different so that the decryption key could not be obtained from the encryption key Public-key cryptography requires each user to have two keys: a public key, used by the entire world for encrypting messages to be sent to the user, and a private key, which the user needs for decrypting messages Example: Alice uses Bob’s public key to encrypt the plaintext message using EB(P) = C Alice sends this to Bob Bob uses his private key to decrypt the ciphertext message using DB(C) = DB(EB(P)) = P

Public Key Algorithms (cont’d) RSA Algorithm discovered by Rivest, Shamir, and Adleman at M.I.T. Survived all attempts to break it for more than 30 years and is considered very strong Major disadvantage is that it requires keys of at least 1024 bits for good security which makes it slow Very slow for encrypting large amounts of data, but is widely used for key distribution Select two large primes, p and q and compute n = p x q and z = (p - 1)(q - 1) Choose d such that it is relatively prime to z and find e such that e x d = 1 mod z To encrypt a plaintext message: C = p^e mod n To decrypt a ciphertext message: P = c^d mod n Public key: (e,n) and Private key: (d,n)

Public Key Algorithms (cont’d) Other Public-Key Algorithms The first public-key algorithm was the knapsack algorithm Basically someone owns a large number of objects, each with a different weight. The owner encodes the message by secretly selecting a subset of the objects and placing them in the knapsack The knapsack algorithm is not considered to be secure and is not used in practice anymore Other public-key algorithms are based on the difficulty of computing discrete algorithms invented by El Gamal and Schnorr

Public Key Algorithms Question: What does Public-Key Cryptography require from each user?

Digital Signatures It basically is a unique code that is hard to replicate This is a secure way to verify the identity of the sender of a document A digital signature also prevents both the sending and receiving parties from altering a document after it is sent The goal of a digital signature is to ensure that a document was sent by (or approved by) the person who sent it

Digital Signatures (cont.) There are two different types of digital signatures; public key, and symmetric key A public key digital signature is a specific code that belongs to only one person, and anyone that person sends information to can verify the sender A symmetric key is a little different, when a symmetric key is used there is a single key shared by two people. Each of these individuals can verify that a document came from the other, however, any third party will not be able to identify a sender using this key. Message digest is known as a faster way to encrypt a document as both public and symmetric keys take a lot of time Message digest uses a mathematical formula designed to be hard to track back to a source

Digital signatures question Name one of the types of digital signatures

Management Key management consist of three steps: Exchange Users must set up the details of the cryptography Symmetric keys must be exchanged over a secure communication channel Storage Keys must be stored securely to maintain communications security Storage access code is given to users that are trusted Use Major issue is length of time a key is to be used in which it needs to be changed frequently As the stored key became readable thus it will increase the chances of it being cryptanalyzed

Types of Certificates TLS/SSL server certificate This a Client server connection which will the path validation algorithm. TLS/SSL client certificate Are used to authenticate the client connecting to a TLS service, for instance to provide access control End-entity or leaf certificate Any certificate that cannot be used to sign other certificates. For instance, TLS/SSL server and client certificates, email certificates, code signing certificates, and qualified certificates are all end-entity certificates.

Public key infrastructure Public key infrastructure (PKI) lets trusted electronic identities for people, services and things, which make it possible to implement strong authentication, data encryption and digital signatures They are Used to grant secure access to physical and digital resources; secure communication between people, services and things; and enable digital signing of documents and transactions

Management Question What are the three steps of key management?

Security- IP Security IP security: follows a framework that allows a pair of communicating entities to use a set of algorithm for secure communication. Protocols used by IP security Authentication Headers Encapsulating Security Security Associations IPsec can be Implemented in two mode Transport mode-only the payload of the IP packet is encrypted and/r authenticated. Tunnel mode-The entire IP packet is encrypted and/or authenticated. It is then encapsulated into a new IP packet with a new IP header.

Security - VPN / Firewall Other types of security are: Firewall: Which is a network security system that monitors and controls over all your incoming and outgoing network traffic based on advanced and a defined set of security rules. VPN (Virtual Private Network) is a service that lets you access the web safely and privately by routing your connection through a server and hiding your online actions.

Security - Wireless Security Wireless security: is the process of designing, implementing, and ensuring security on a wireless computer network Two of the most common type of wireless security is: 802.11 Security WEP (Wired Equivalent Privacy): The the first form of authentication used with Wi-Fi. It was easy to crack, and other systems are now more widely used WPA1 /WPA2 (WiFi Protected Access 1 / 2): uses an encryption device that encrypts the network with a 256-bit key; the longer key length improves security over WEP.

Security Question What does VPN stand for?

Video https://www.youtube.com/watch?v=FlIG3TvQCBQ

Questions?