Cryptography in World War II Jefferson Institute for Lifelong Learning at UVa Spring 2006 David Evans Class 4: Modern Cryptography

Slides:



Advertisements
Similar presentations
Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
Advertisements

IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Cryptology Making & Breaking Codes & Ciphers. AJ 1152 Cryptology Cryptography –Science of creating codes or ciphers Cryptanalysis –Science of breaking.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Digital Signatures. Anononymity and the Internet.
Modern Cryptography.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Cryptographic Technologies
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
David Evans CS150: Computer Science University of Virginia Computer Science Class 36: Public Key Crypto.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 12 Cryptography (slides edited by Erin Chambers)
How HTTPS Works J. David Giese. Hyper Text Transfer Protocol BrowserHTTP Server GET / HTTP/1.1 HOST: edge-effect.github.io HEADERS BODY HTTP/ OK.
Lecture 11: Key Distribution
Computer Science 101 Cryptography Part II
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
David Evans CS588: Security and Privacy University of Virginia Computer Science Lecture 12: Non-secret Key Cryptosystems.
CS110: Computers and the Internet Encryption and Certificates.
Public-Key Cryptography CS110 Fall Conventional Encryption.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
David Evans CS200: Computer Science University of Virginia Computer Science Class 36: Public-Key Cryptography If you want.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Midterm Review Cryptography & Network Security
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
David Evans CS588: Security and Privacy University of Virginia Computer Science Lecture 14: Public Key Infrastructure.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
1 Network Security Basics. 2 Network Security Foundations: r what is security? r cryptography r authentication r message integrity r key distribution.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Overview of Cryptography & Its Applications
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Encryption CS110: Computer Science and the Internet.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Key Management Network Systems Security Mort Anvari.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
David Evans CS588: Security and Privacy University of Virginia Computer Science Lecture 10: Certificates and Hashes.
INCS 741: Cryptography Overview and Basic Concepts.
Digital Signatures.
Cryptography & Security
Lecture 10: Network Security.
Class 36: Public-Key Cryptography
Presentation transcript:

Cryptography in World War II Jefferson Institute for Lifelong Learning at UVa Spring 2006 David Evans Class 4: Modern Cryptography

2 JILL WWII Crypto Spring Class 4: Modern Cryptography Menu Some loose ends on WWII Maurice Burnett Modern Cryptography –Modern symmetric ciphers –Public-key cryptosystems

3 JILL WWII Crypto Spring Class 4: Modern Cryptography British Cipher Machine Design based on commercial Enigma 5 rotor wheels (instead of 3 in Enigma) Multiple rings per rotor Last 2 rotor wheels didn’t rotate British attempted to break it (without success) Typex Machine

4 JILL WWII Crypto Spring Class 4: Modern Cryptography German Code-Breaking Efforts About 6,000 people (compare to 12,000 working at Bletchley Park) Decentralized: each military branch had their own, didn’t share what they learned Effective against manual codes: broke about 50% of manually coded messages Didn’t attempt to break rotor-based ciphers – so confident Enigma was unbreakable, didn’t try to Typex and similar machines

5 JILL WWII Crypto Spring Class 4: Modern Cryptography

6 From Lorenz Cipher

7 JILL WWII Crypto Spring Class 4: Modern Cryptography Modern Symmetric Ciphers A billion billion is a large number, but it's not that large a number. Whitfield Diffie Same idea but: –Use digital logic instead of mechanical rotors –Larger keys (random bits, not rotor alignments) Lorenz  5 12 < 10 9 Modern  128 bits > –Encrypt blocks of letters at a time

8 JILL WWII Crypto Spring Class 4: Modern Cryptography Modern Ciphers AES (Rijndael) successor to DES selected bit keys, encrypt 128-bit blocks Brute force attack (around times harder than Lorenz) –Try 1 Trillion keys per second –Would take years to try all keys! –If that’s not enough, can use 256-bit key No known techniques that do better than brute force search

9 JILL WWII Crypto Spring Class 4: Modern Cryptography Login: alyssa Password: fido Terminal Trusted Subsystem Eve Login Process login sends

10 JILL WWII Crypto Spring Class 4: Modern Cryptography Sending Passwords Encrypt User Server The Internet

11 JILL WWII Crypto Spring Class 4: Modern Cryptography Encrypt Decrypt Plaintext Ciphertext Plaintext User Server C = Encrypt K (P) P = Decrypt K (C) KK The Internet

12 JILL WWII Crypto Spring Class 4: Modern Cryptography Key Agreement Demo (Animated version at end of slides.)

13 JILL WWII Crypto Spring Class 4: Modern Cryptography Asymmetric Cryptosystems Need a hard problem (like symmetric cryptosystems) With a trap door: if you know a secret, the hard problem becomes easy

14 JILL WWII Crypto Spring Class 4: Modern Cryptography One-Way Functions Easy to compute, hard to invert Trap-door one way function: –D (E (M)) = M –E and D are easy to compute. –Revealing E doesn’t reveal an easy way to compute D. –Hence, anyone who knows E can encrypt, but only someone who knows D can decrypt

15 JILL WWII Crypto Spring Class 4: Modern Cryptography RSA [Rivest, Shamir, Adelman 78] One-way function: multiplication is easy, factoring is hard Trap-door: number theory (Euler and Fermat)

16 JILL WWII Crypto Spring Class 4: Modern Cryptography Security of RSA n is public, but not p and q where n = pq How much work is factoring n ? n ~200 digits – would take quintillions of years Number Field Sieve (fastest known factoring algorithm) is: O(e ((ln (n)) 1/3 (ln (ln (n))) 2/3 )

17 JILL WWII Crypto Spring Class 4: Modern Cryptography Asymmetric Cryptosystems Encryption and Decryption are done with different keys Keep one of the keys secret, reveal the other E KRA (E KUA (M)) = M Alice’s Public Key: KUA Alice’s Private Key: KRA Only KRA can decrypt a message encrypted using KUA.

18 JILL WWII Crypto Spring Class 4: Modern Cryptography Public-Key Applications: Privacy Alice encrypts message to Bob using Bob’s Public Key Only Bob knows Bob’s Private Key  only Bob can decrypt message Encrypt Decrypt Plaintext Ciphertext Plaintext Alice Bob Bob’s Public Key Bob’s Private Key

19 JILL WWII Crypto Spring Class 4: Modern Cryptography Signatures Bob knows it was from Alice, since only Alice knows Alice’s Private Key Non-repudiation: Alice can’t deny signing message (except by claiming her key was stolen!) Integrity: Bob can’t change message (doesn’t know Alice’s Private Key) Encrypt Decrypt Plaintext Signed Message Plaintext Alice Bob Alice’s Private Key Alice’s Public Key

20 JILL WWII Crypto Spring Class 4: Modern Cryptography Encrypt Decrypt Plaintext Ciphertext Plaintext User Server KU S KR S The Internet Public Key Private Key How does User know the public key to use?

21 JILL WWII Crypto Spring Class 4: Modern Cryptography Key Management

22 JILL WWII Crypto Spring Class 4: Modern Cryptography Approach 1: Meet Secretly User and Server Operator meet secretly and swap public keys –If you can do that, might as well agree on a secret (symmetric key) instead –Doesn’t work for Internet transactions

23 JILL WWII Crypto Spring Class 4: Modern Cryptography Approach 2: Public Announcement Publish public keys in a public forum –Append to messages –Post on web site –New York Time classifieds Easy for rogue to pretend to be someone else –Forge , alter web site, lie to New York Times

24 JILL WWII Crypto Spring Class 4: Modern Cryptography Approach 3: Public Directory Trusted authority maintains directory mapping names to public keys Entities register public keys with authority in some secure way Authority publishes directory –Print using watermarked paper, special fonts, etc. –Allow secure electronic access Depends on secure distribution of directory’s key

25 JILL WWII Crypto Spring Class 4: Modern Cryptography Approach 4: Certificates VeriSign UserServer KU S C S = E KR VeriSign [“Server”, KU S ] CSCS Request $$$$ E KUVeriSign (C S ) = [“Server”, KU S ] Knows KR S

26 JILL WWII Crypto Spring Class 4: Modern Cryptography SSL (Secure Sockets Layer) Browser Server Hello KR CA [Server Identity, KU S ] Check Certificate using KU CA Pick random K KU S [K] Find K using KR S Secure channel using K Note: This is slightly simplified from the actual SSL protocol. This version is vulnerable to a person-in- the-middle attack!

27 JILL WWII Crypto Spring Class 4: Modern Cryptography Data encrypted using secret key exchanged using some public key associated with some certificate.

28 JILL WWII Crypto Spring Class 4: Modern Cryptography

29 JILL WWII Crypto Spring Class 4: Modern Cryptography

30 JILL WWII Crypto Spring Class 4: Modern Cryptography

31 JILL WWII Crypto Spring Class 4: Modern Cryptography SSL Recap Browser Server Hello KR CA [Server Identity, KU S ] Check Certificate using KU CA Pick random K KU S [K] Find K using KR S Secure channel using K Note: This is slightly simplified from the actual SSL protocol. This version is vulnerable to a person-in- the-middle attack!

32 JILL WWII Crypto Spring Class 4: Modern Cryptography Questions?

33 JILL WWII Crypto Spring Class 4: Modern Cryptography Animated version of Asymmetric Cryptography Demo

34 JILL WWII Crypto Spring Class 4: Modern Cryptography Padlocked Boxes Alice Hi!

35 JILL WWII Crypto Spring Class 4: Modern Cryptography Padlocked Boxes Alice Hi! Alice’s Padlock Alice’s Padlock Key

36 JILL WWII Crypto Spring Class 4: Modern Cryptography Padlocked Boxes Alice Alice’s Padlock Key Shady Sammy’s Slimy Shipping Service

37 JILL WWII Crypto Spring Class 4: Modern Cryptography Padlocked Boxes Alice Hi! Bob Bob’s Padlock Bob’s Padlock Key Alice’s Padlock Key

38 JILL WWII Crypto Spring Class 4: Modern Cryptography Padlocked Boxes Alice Hi! Bob Bob’s Padlock Key Alice’s Padlock Key

39 JILL WWII Crypto Spring Class 4: Modern Cryptography Padlocked Boxes Alice Hi! Bob Bob’s Padlock Key Alice’s Padlock Key

40 JILL WWII Crypto Spring Class 4: Modern Cryptography Padlocked Boxes Alice Hi! Bob Bob’s Padlock Key

41 JILL WWII Crypto Spring Class 4: Modern Cryptography Padlocked Boxes Alice Hi! Bob Bob’s Padlock Key Hi!