Introduction to - Cryptography - PKI (Public Key Infrastructure) - Secure Email with PGP (Pretty Good Privacy) Dr.Tech. Göran Pulkkis Arcada Polytechnic.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Public Key Infrastructure and Applications
Public Key Cryptosystem
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptographic Technologies
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Chapter3 Public-Key Cryptography and Message Authentication.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Public Key Algorithms 4/17/2017 M. Chatterjee.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
ASYMMETRIC CIPHERS.
Lecture 6: Public Key Cryptography
CN8816: Network Security1 Confidentiality, Integrity & Authentication Confidentiality - Symmetric Key Encryption Data Integrity – MD-5, SHA and HMAC Public/Private.
Public Key Model 8. Cryptography part 2.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Network and Communications Network Security Department of Computer Science Virginia Commonwealth University.
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
RSA By: Abhishek Naik Viswanath Chennuru CPSC 624.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Midterm Review Cryptography & Network Security
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
Chapter 21 Public-Key Cryptography and Message Authentication.
Elliptic Curve Cryptography Implementation & PKI Adoption Brian Saville Jonathan Mitchell.
Strength of Cryptographic Systems Dr. C F Chong, Dr. K P Chow Department of Computer Science and Information Systems The University of Hong Kong.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Elliptic Curve Cryptography
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Cryptography Gerard Klonarides. What is cryptography? Symmetric Encryption Symmetric Encryption Asymmetric Encryption Asymmetric Encryption Other cryptography.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
ECE Prof. John A. Copeland fax Office: GCATT Bldg.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Information Security and Management 10. Other Public-key Cryptosystems Chih-Hung Wang Fall
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
INCS 741: Cryptography Overview and Basic Concepts.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
RSA and El Gamal Cryptosystems
Asymmetric Cryptography
Presentation transcript:

Introduction to - Cryptography - PKI (Public Key Infrastructure) - Secure with PGP (Pretty Good Privacy) Dr.Tech. Göran Pulkkis Arcada Polytechnic ( ) Espoo, Finland

Cryptographic algorithms

Secret Key Cryptography

Public Key Cryptography

zinformation theory ztheory of computational complexity zinteger algebra (modulo arithmetics, factoring, random number generation, prime number generation and discrete logarithms) Mathematical basis of cryptography

Information theory z Confusion obscures the relationships between the plaintext and the encrypted ciphertext. The simplest confusion technique is substitution of binary patterns z Diffusion speads local information content of plaintext over the entire encrypted ciphertext. The simplest confusion technique is permutation of bit patterns

Quality Measures of Cryptosystems

Theory of Computational Complexity zthe computation time and memory space requirements of encryption and decryption operations zthe computation time requirements for breaking a cryptosystem

Ideal Cryptographic Algorithms zencryption and decryption operations have low complexity (=short execution times) zencryption can be broken only by guessing the correct key or trying out all possible keys, if the correct key is unknown (=exponential complexity - cracking time proportional to 2 n where n is the number of all possible keys)

Strong Encryption

zit has been mathematically proved to be ideal or zit has been for years been and is still being thoroughly studied in public research by many acknowledged cryptoanalysts all over the world and no easy cracking method (= estimated deterministic complexity lower than superpolynomial) is known in public A useful cryptographic algorithm

Conclusions for Applied Cryptography

Secret Key Algorithms in Use zTriple DES (Data Encryption Standard) with key length 112 or 168 bit zIDEA (International Data Encryption Standard) with key length 128 bits

 RSA (Rivest-Shamir-Adleman) with key length  1024 bits  ECC (Elliptic Curve Cryptography) based algorithms with key length  160 bits Public Key Algorithms in Use

Security of public key cryptosystems zirreproducible generation of large (>150 digits) random primes zthe high computational complexity of the problem to find the factors of a large (>300 digits) integer zthe high computational complexity of the problem to find the discrete logarithm in modulo arithmetics when the modulus is a large (>300 digits) integer

Modulo Arithmetics

zAn approach to secure random number generation is based on recording irreproducible physical randomness, like mouse movement traces, keystroke time intervals, physical noise, etc. zproved: number of primes  n/ln(n) when n . Thus there exists about /(154*ln(10))  3* positive primes which can be coded by 512 bits (“only” atoms in Universe). One of 300 numbers is on the average a prime! zlarge integers can efficiently be checked for primality in a PC (some milliseconds). Generate a large random odd integer, then step +2 and check. On average about 300 steps are needed until a prime is found Generation of large random primes

Basic Cryptographic Protocols zShared Secret Key Generation (Diffie-Hellman Key Exchange) zDigital Signatures - generation and checking zAuthentication Protocols (example: Kerberos, implemented in Win2000 logon)

Diffie-Hellman (D-H) Key Exchange zPublic key algorithms much slower than secret key algorithms (RSA ~ 1000 times slower than IDEA) zProtected info exchange using a shared secret key zD-H: A and B can agree on a shared secret key by exchanging only unencrypted integer values  Mathematics of D-H: K = (  XA mod p) XB mod p = (  XB mod p) XA mod p, when  (=a generator for modulo base p), p (=a prime),  XA mod p and  XB mod p are exchanded, XA is secret of A, XB is secret of B and K is the shared secret key

Digital signature generation zA message/document is combined with an encrypted (private key of signer) hash (a message digest) message hash algorithm hash encryption Private key of signer encrypted hash message Signed message

zThe unencrypted hash of a signed message is compared with the hash of the original message Checking a digital signature encrypted hash message Signed message hash algorithm hash decryption Public key of signer hash OK if match

Hash algorithms zReduce variable-length messages/documents to fixed-length (usually 128 or 160 bit) hashes zOriginal info not possible to deduce from a hash zProbability that 2 different messages/documents produce same hash ~ 0 (2 160 hash patterns more than atoms in a 6-dimensional Universe, where each atom is replaced by a new Universe) zhash = message digest or fingerprint zCommon hash algorithms: MD5 (128 bit), SHA-1 (160 bit), RIPEMD-160 (160 bit)