Cryptography Lecture 27.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
CMSC 456 Introduction to Cryptography
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Topic 11: Key Distribution and Agreement 1 Information Security CS 526 Topic 11: Key Distribution & Agreement, Secure Communication.
Computer Science Public Key Management Lecture 5.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Apr 1, 2003Mårten Trolin1 Previous lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.

Computer and Network Security
Key management issues in PGP
TOPIC: HTTPS (Security protocol)
Web Security CS-431.
Chapter 5 Network Security Protocols in Practice Part I
Web Applications Security Cryptography 1
Cryptography CS 555 Topic 34: SSL/TLS.
Reviews Rocky K. C. Chang 20 April 2007.
Virtual Private Network (VPN)
Security Outline Encryption Algorithms Authentication Protocols
Tutorial on Creating Certificates SSH Kerberos
Cryptography and Network Security
Computer Communication & Networks
Secure Sockets Layer (SSL)
Information Security message M one-way hash fingerprint f = H(M)
Chapter 8 Network Security.
BINF 711 Amr El Mougy Sherif Ismail
Basic Network Encryption
Tutorial on Creating Certificates SSH Kerberos
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
CSE 4095 Transport Layer Security TLS
Public-Key Cryptography
Cryptography and Network Security
Cryptography Lecture 12.
CS 465 TLS Last Updated: Oct 31, 2017.
Cryptography Lecture 27.
CAS CS 538 Cryptography.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Chapter 8 Network Security.
Cryptography and Network Security
Information Security message M one-way hash fingerprint f = H(M)
TLS and DLP Behind the green lock.
The Secure Sockets Layer (SSL) Protocol
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Install AD Certificate Services
Transport Layer Security (TLS)
Public-Key, Digital Signatures, Management, Security
Cryptography Lecture 12.
Basic Network Encryption
Unit 8 Network Security.
Advanced Computer Networks
Network Security Chapter 8.
Cryptography Lecture 11.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Security at the Transport Layer
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Security: Integrity, Authentication, Non-repudiation
Cryptography and Network Security
Cryptography Lecture 26.
TLS Encryption and Decryption
A General Introduction to Modern Cryptography
Presentation transcript:

Cryptography Lecture 27

Public-key infrastructure (PKI)

Use signatures for secure key distribution! Alice asks the CA to sign the binding (Alice, pk) certCAAlice = SignskCA(Alice, pk) (CA must verify Alice’s identity out of band)

PKI models We saw two models last time: Roots of trust Web of trust

Public repository Store certificates in a central repository E.g., MIT PGP keyserver To find Alice’s public key Get all public keys for “Alice,” along with certificates on those keys Look for a certificate signed by someone you trust whose public key you already have

PKI in practice… Does not work quite as well as in theory… Proliferation of root CAs Compromises of CAs Revocation Users/browsers may not verify certificates

SSL/TLS How can you securely send your credit card number to Amazon? Secure Socket Layer (Netscape, mid-’90s) Transport Layer Security TLS 1.0 (1999) TLS 1.2 (2008) TLS 1.3 (2018) Used by every web browser for https connections

SSL/TLS Goals Not goals Understand (at a high level) a real-world crypto protocol Pull together everything learned in this course Not goals Understanding low-level details/implementation Defining or proving security

SSL/TLS Two phases Handshake protocol Record-layer protocol Establish a shared key between two entities Record-layer protocol Use the shared key for secure communication

Handshake protocol https://bank.com, NC pk, cert, NB Verify! c =Encpk(pmk) pkCA sk, pk, certCABank mk = H(pmk, NC, NB) kC, k’C, kS, k’S = G(mk) Macmk(transcript) pmk = Decsk(c) mk = H(pmk, NC, NB) kC, k’C, kS, k’S = G(mk) Verify! Macmk(transcript’) Verify!

Record-layer protocol Parties now share kC, k’C, kS, k’S Client uses kC, k’C to encrypt/authenticate all messages it sends Server uses kS, k’S to encrypt/authenticate all messages it sends Prevents reflection attacks Sequence numbers prevent replay attacks

Final review

Exam details Open book/notes Covers material from the entire semester No electronic devices Covers material from the entire semester Focus will be on material since the midterm Practice exam posted

Topics we covered Defining security E.g., for private-key encryption: perfect secrecy, EAV-security, CPA-security, CCA-security Security definitions will be tested Must be able to write pseudocode and give analysis showing that some scheme is insecure because it does not satisfy a given definition Assumptions Primitives (PRGs, stream ciphers, PRFs, block ciphers, hash functions) and instantiations (AES, SHA-256, …) Number-theoretic assumptions Proofs

Topics we covered Private-key encryption Message authentication codes Hash functions and applications Constructions of: Stream ciphers (LFSRs) Block ciphers (SPNs, Feistel networks) Hash functions (Davies-Meyer, Merkle-Damgard) Generic attacks on hash functions, block ciphers, etc.

Topics we covered Number theory/group theory RSA assumption, dlog assumption, DH assumptions Diffie-Hellman key exchange Public-key encryption Digital signatures

Goals Understand real-world crypto Almost everything we have covered in class is used in practice, or is the basis for something used in practice Know when to use different schemes Understand the formal guarantees that different schemes provide To make sure you understand a scheme, ask yourself if you could implement it