Information Systems Security Cryptography Domain #3.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Crytography Chapter 8.
1 ITNS and CERIAS CISSP Luncheon Series: Cryptography Presented by Addam Schroll, CISSP.
Chapter 5 Network Security Protocols in Practice Part I
Encryption Matches Domain 4.0 Basics of Cryptography (15 percent of Security +) Network Security Class Dr. Kleist Note: Most material from Harris, Shon.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Principles of Information Security, 2nd edition1 Cryptography.
Cryptography.
Web Security for Network and System Administrators1 Chapter 4 Encryption.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Principles of Information Security, 2nd edition2 Learning Objectives Upon completion of this material, you should be able to:  Describe the most significant.
Cryptography Basic (cont)
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Cryptography.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Introduction Cryptography: process of making and using codes to secure transmission of information Encryption: converting original message into a form.
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
Linux Networking and Security Chapter 8 Making Data Secure.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Crypto Bro Rigby. History
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Cryptography, Authentication and Digital Signatures
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Cryptography Lynn Ackler Southern Oregon University.
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Chapter 7: Cryptographic Systems
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Web Applications Security Cryptography 1
ISA 400 Management of Information Security
Chapter 8 Network Security.
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-501)
Security through Encryption
PART VII Security.
Presentation transcript:

Information Systems Security Cryptography Domain #3

Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data integrity –Source authentication –Non-repudiation

Definitions  Cryptography –Hiding the meaning of communication  Cipher –Transforms characters or bits into an unreadable format  Cryptographic Algorithm –Procedure that turns readable data into an unreadable format (usually through mathematical formulas

More Definitions  Cryptanalysis –Science of studying and breaking encryption mechanisms  Cryptology –Study of cryptography and cryptanalysis  Key Clustering –When two keys generate the same ciphertext from the same plaintext

MORE Definitions  Cryptosystem –Encompasses all of the components for encryption and decryption  Plaintext –Readable format / decrypted  Ciphertext –Unreadable format / encrypted  Work Factor –Time, effort, and resources necessary to break a cryptosystem (should be too high for compromise)

Symmetric Cryptography  Two instances of the same key –One key used for encryption and decryption –Sender/receiver use same key (public/shared)  Key distribution a problem  Secure 2 nd channel needed or offline  Does not implement non-repudiation

Historical Symmetric Keys  Hieroglyphics –Recorded in use in 2000 B.C. –1 st known type of cryptography –Only certain people knew the symbols –Used to glorify the life of deceased

Scytale Cipher  Paper or leather was wrapped around a rod  Message was written on paper and delivered by messenger  Sender and receiver had to have rod of same diameter  Was used around 400 B.C.  Transposition Cipher

Caesar Cipher  Symmetric cipher  Keys shifted ‘n’ number of letters  Also referred to as a shift cipher  If one alphabet is used – monoalphabetic substitution  If two alphabets are used – polyalphabetic substitution

Example  Decode the following messages:  UIJT POF JT FBTA

Vigenere Cipher  Polyalphabetic substitution cipher  Proposed by court of King Henry III  An extension of the Caesar Cipher  Strength is no frequency analysis can be performed

Enigma Machine  Rotor cipher used polyalphabetic substitution  Employed in WWII  Symmetric – original setting of rotors and how rotors moved must be the same  Sender entered characters and the rotors moved

Vernam Cipher  One-time pad –Only method that is completely secure –Still used today for backups encryption method –Senders uses one-time pad to encrypt and receiver uses twin to decrypt

Vernam  Deemed unbreakable if: –Pad is truly random values –Used only once –Securely distributed –Securely stored –Pad is at least as long as message

Key & Algorithm Relationship  Key – long string of values  Algorithm – group of mathematical equations that can be used for the encryption process  Used together – key values are used by the algorithm to indicate which equations to use, in what order, and with what values

Breaking Cryptosystems  Brute Force –Attempts all possible combinations of a given key space to derive the key  Takes ciphertext, applies key, and sees if understandable plaintext is derived –How many possible keys?  40-bit key = 1 trillion  56-bit key = 72 quadrillion –Easily breakable due to Moore’s Law –In 1998, broke DES in three days with 1536 PCs running at 40 MHz

Frequency Analysis  Patterns in ciphertext are identified and matched back to plaintext  For example, the most common letters in the English language are “iron seat”  Allows attackers to reverse-engineer encryption process

Characteristics of Strong Algorithms  Confusion –Complexity of the process to increase the workfactor of reverse engineering –Interceptor should not be able to predict what changing one character will do to ciphertext  Diffusion –Component going through an encryption should have MANY things take place –Change should affect many part of the ciphertext

Kerckhoff’s Principle  Only secrecy involved with cryptography should be the key  Should not base security on figuring out the algorithm  Algorithms should be publicly known  Government does NOT agree

Type of Ciphers Used Today  Substitution Methods  Transposition Methods  Symmetric Ciphers –Block –Stream  Asymmetric Ciphers

Encryption/Decryption  Substitution –Substitute one bit for another –Destination has to have the correct key to indicate how to substitute  Transposition –Bits are moved to new place in stream –No new bits are introduced –Destination must have correct key to unscramble

Symmetric – Block Cipher  Message is divided into blocks and put through mathematical function  Each block is encrypted separately  While message is not encrypted as one entity  Best used in software implementation

S-Box  Substitution box is common component  Table where a lookup using a few bits as an index yields some other bits  For example, in an 8 by 32 s-box, you enter with 8 bits and come out with 32  DES uses 6 by 4 boxes  Blowfish uses 8 by 32 boxes

Symmetric Stream Cipher  Encrypts individual bits of the message  Bits are X-ORed with a bit from message  Stream algorithms have keystroke generators  Best used in hardware implementations  Caesar cipher is an example

Message Authentication Code (MAC)  MACs are computed and verified with same key  Four types –Unconditionally secure  One time pad –Has function-based MAC (HMAC)  Uses key with hash function (MD5) –Stream – broken into two substreams –Block – encrypt message and output final block of ciphertext as checksum (DES)

Digital Signatures  Provide Authenticity and Non-Repudiation –After hashed, MD value is encrypted with sender’s private key –Receiver validates the digital signature by decrypting it with the sender’s public key –Provides data integrity, authenticity, and non- repudiation

Digital Signature vs. MAC  Symmetric Cryptography –MAC = hash + symmetric key  Asymmetric Cryptography –DS = hash + asymmetric key

US Government Standard  Digital Signature Standard (DSS) –Secure hashing algorithm (SHA) must be used for message digest creation. –DSA, RSA, and ECDSA asymmetric algorithms can be used for digital signature creation  ECDSA = elliptic curve digital signature algorithm

Symmetric Algorithms  Data Encryption Standard (DES) – Break work in half and XOR several times. Became standard in  Triple DES – Encrypted/decrypted with 3 separate keys. Strength of  Advanced Encryption Standard (AES) - Adopted in 1997 by NIST. Had larger block size then DES

Advantages of Symmetric  Very fast and secure method for confidentiality  Implemented in either hardware or software  Usually available at no cost to user

Disadvantages  Not able to provide non-repudiation  Can not provide access control or digital signatures  Need to share key

Security in Hashing  Strength of Hashing Algorithm –The hash should be computed over the entire message –Messages cannot be disclosed by MD value –Different messages should generate different MD values  Collision free  Resistant to birthday attacks

Hashing Issue  It is easier to find 2 messages that have the same MD than looking for one particular MD value on a message  Hashing value (n) Brute force to find hash value (2n) Brute force to find any 2 matching hash values 2(n/2)  Crux – A hashing algorithm that generates a larger MD value is less vulnerable to a bday attack than one that creates a smaller one

Key Management  Responsibilities –Secure key creation and distribution –Secure key recovery –Secure key storage and destruction  Characteristics –Split knowledge and control –Length of key –Never available in clear text

Asymmetric Key Algorithms Public Key Cryptography  No key exchange needed  Users can generate their own public/private key pairs and exchange them  If you receive a public key from Bob, how do you know it is really Bob?  Need a trusted third party to vouch for the identity of the owner of a public key

Asymmetric Keys  Allows non-repudiation and access control  Extremely slow  Output may be much larger than the plaintext  Hashing  Integrity  Digital Signatures

CA and RA Roles  Registration Authority –Accepts registration requests from users –Validates users identities –Passes request to CA  Certificate Authority –Creates digital signature –Binds identity to signature –Maintains certificate during lifetime  Verisign, Thawte, IP, Belsign, etc.

Example  Bob wants to participate in a PKI –Bob send request to RA –RA validates Bob’s identity –RA sends request to CA –CA generates certificate and sends to Bob –Bob’s identity is now bound to the public key that is embedded in the digital certificate

Components of PKI  Certificate Revocation Lists (CRL) –Certificates can become revoked –CRL is list of revoked certificates signed by CA –Method to tell others not to trust (compromised)  Certificate Directory –Storage of certificates –Usually publicly accessible –Each certificate is digitally signed

Steganography  Hiding information in media –No algorithm, key or encryption required –Hides data –Digital watermarks are used to detect –Messages can be sent without knowledge –Specialized tools to carry this out  Hide and Seek  Steg Detect

Standards  Pretty Good Privacy (PGP) –Free client that provides security –Uses passphrases instead of passwords –Web of trust instead of hierarchy of CAs  PGP provides confidentiality via IDEA  Integrity via MD5

Secure Protocols  Secure Hypertext (SHTTP) –Protects each message –Older less used  HTTPS –HTTP runs on top of SSL  Provides secure communication channel  All messages are protected  Secure Socket Layer (SSL) –Netscape developed; requies PKI –Works at transport layer

Secure Standard  Secure MIME (SMIME) –Secure Multipurpose Internet Mail Extension –Allows for encryption, hashing, and digital signatures to take place in a uniform manner – client vendors follow this standard  Transparent between different clients

Secure Electronic Transaction  SET –Developed by Visa and Mastercard for more secure monetary transactions over the Internet –Uses PKI to protect sensitive data and authenticates each ‘hop’ in the transaction  Slow in acceptance and deployment  Goal to replace SSL  Slow the throughput of the transaction

Network Layer Protection  IPSec –Developed because IPv4 has no security –Sets up a secure channel between computers instead of between applications  Application secure channels provided by SSL –Network layer security –Provides host-to-host, host-to-subnet, and subnet-to-subnet connections

Key Issues with IPSec  Internet Key Exchange (IKE) –Used to negotiate the key exchange between two entities –Suite of ISAKMP and Oakley protocols  Internet Security Association and Key Management Protocol (ISAKMP) –Framework for key negotiation  Oakley Protocol –Negotiates key information using Diffie-Hellman algorithm

IPSec Modes of Operation  Transport Mode –Offers payload protection –Protects header up to the network layer  Tunnel Mode –Protects the whole packet –Includes payload and all headers –Creates a new IP header`

Attacks on Crypto  Ciphertext-only Attack –Attacker only has ciphertext –Goal to reverse the encryption process  Known plaintext attack –Attacker has ciphertext and plaintext  Chosen-plaintext attack –Attacker can choose what plaintext is encrypted  Chosen-ciphertext attack –Attacker can choose ciphertext to be decrypted

More Attacks  Replay Attack –Attacker obtains a set of credentials and sends them to authentication source –Timestamps and sequence numbers protect against this attack  Man in Middle Attack –Attacker injects itself between two users and reads messages –Sequence numbers and digital signatures protect against this attack