Network Security Review. Secure channel Communication security Confidentiality Message Traffic Authentication Integrity How to achieve? Establish shared.

Slides:



Advertisements
Similar presentations
Security and Privacy over the Internet Chan Hing Wing, Anthony Mphil Yr. 1, CSE, CUHK Oct 19, 1998.
Advertisements

L8. Reviews Rocky K. C. Chang, May Foci of this course 2 Rocky K. C. Chang  Understand the 3 fundamental cryptographic functions and how they are.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
7. Asymmetric encryption-
Public-key based. Public-key Techniques based Protocols –may use either weak or strong passwords –high computation complexity (Slow) –high deployment.
Gene Itkis: BU CAS Network Security
Mid-term Review Network Security. Gene Itkis: CS558 Network Security2 Secure channel SSL SSL (and many others: incl. IPSEC) Shared key establishing Trusted.
Mid-term Review Network Security. Secure channel SSL SSL (and many others: incl. IPSEC) Shared key establishing Trusted party (Kerberos, etc. - to be.
0 SSL3.0 / TLS1.0 Secure Communication over Insecure Line.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Mid-term Review Network Security. Secure channel SSL (and many others:incl. IPSEC) Shared key establishing Trusted party (Kerberos, etc. - to be covered)
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Topic 11: Key Distribution and Agreement 1 Information Security CS 526 Topic 11: Key Distribution & Agreement, Secure Communication.
Public Key Algorithms 4/17/2017 M. Chatterjee.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
Introduction to Computer and Network Security Iliano Cervesato 2 September 2008 – Public-key Encryption.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
ASYMMETRIC CIPHERS.
Lecture 6: Public Key Cryptography
CN8816: Network Security1 Confidentiality, Integrity & Authentication Confidentiality - Symmetric Key Encryption Data Integrity – MD-5, SHA and HMAC Public/Private.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
Prime Numbers Prime numbers only have divisors of 1 and self
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Introduction to Modern Cryptography Lecture 5 Number Theory: 1. Quadratic residues. 2. The discrete log problem. Intro to Public Key Cryptography Diffie.
Midterm Review Cryptography & Network Security
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 23/10/2015 | pag. 2.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Topic 14: Secure Communication1 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication.
Information Security CS 526
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
Ln Lou Modern Cyphers. 0. Security System Key Plain Text Cipher Text Encryption (K × P → C) Decryption (K × C → P)
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Lecture 6.1: Misc. Topics: Number Theory CS 250, Discrete Structures, Fall 2011 Nitesh Saxena.
Chapter 4: Public Key Cryptography
Computer and Network Security - Message Digests, Kerberos, PKI –
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Cryptography in the Real World Diffie-Hellman Key Exchange RSA Analysis RSA Performance SSH Protocol Page 1.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Lecture 6. RSA Use in Encryption to encrypt a message M the sender: – obtains public key of recipient PU={e,n} – computes: C = M e mod n, where 0≤M
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
CPIS 312 Chapter Four: PUBLIC KEY CRYPTO. Index 2 A.Introduction A.1 Asymmetric Key Cryptography- Introduction A.2 General ideas about the Public Key.
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
Reviews Rocky K. C. Chang 20 April 2007.
Public Key Encryption and Digital Signatures
LAB 3: Digital Signature
Presentation transcript:

Network Security Review

Secure channel Communication security Confidentiality Message Traffic Authentication Integrity How to achieve? Establish shared key Encrypt MAC Left out: non-repudiation, etc.

Shared Key Establishment “Trusted third party” Kerberos Tickets Public key methods SSL IPSEC “Out-of-band”

Public Key Crypto

Public Key techniques Diffie-Hellman RSA N=pq; ed  1 (mod  (N)) Public:e,N;Private:d,N Encrypt M: C  M e modN Decrypt C: M  C d modN Sign M: S  M d mod N Verify S: S e  M (modN) AliceBob ab p, g m a  g a mod pm b  g b mod p mama mbmb m b a mod pm a b mod p=g ab mod p= shared secret key! Discrete log: Given y,p,b Find x: b x mod p = y ? Factoring: Given N=pq Find p,q

Discrete log based schemes DH (key establishment) DSS/DSA (signatures) El-Gamal (signatures, encryption) Elliptic Curves Cryptography (ECC) Why modulus (p) is so large? Little-step/giant-step attack

Factoring based RSA Square Roots (=Factoring) Rabin (Encryption, Signature) Fiat-Shamir (ID scheme, Signature)

World mod N How many objects? |Z * N |=  (N); for all z  Z * N, z  (N) mod N=1 If N=pq, then  (N)= (p-1)(q-1) [ If N=p, then  (N)= p-1 ] Blum integers: N=pq, p  q  3 (mod 4) Then x (p+1)/4 mod p= y; y 2  x (p+1)/2  x (p-1)/2 x  ±x mod p

Chinese Remainder Theorem (CRT) Given y 2  x mod p; z 2  x mod q; N=pq; Find s: s 2  x mod N More generally: Given a,A, b,B; Find x: x  a mod A, x  b mod B Let u, v be s.t. uA  1 mod B, vB  1 modA Then x=uAb+vBa [indeed: x mod A = uAb+vBa = vBa = a; x mod B = uAb+vBa = uAb = b] How to find u,v?

Extended GCD Euclid’s GCD algorithm (greatest common divisor): gcd(a,b) = gcd( b, a mod b) =…= gcd(a’,b’)=c a’=ib’+c, …, ax+by=c If gcd(a,b)=1: ax  1 mod b

Summary (factoring-based) RSA Given p,q; Can compute  (N), for N=pq; With Extended gcd, can compute e, d  1/e mod  (N); gcd(e,  (N)) must be 1 Rabin Using Blum integers can compute SQRT mod p,q Using CRT can combine them to SQRT mod N

Prime number generation Why? How? Exhaustive search Too long Miller-Rabin Little Fermat’s Theorem (again) Prime Number Theorem #of primes between R and 2R is  R/lnR i.e. Prob[ random R is a prime ]  1/lnR

Efficiency for all Exponentiation: Repetitive Squaring b A mod N takes  1.5 lg A long multiplications Cost of multiplication  quadratic in length Optimization: mod N  (mod p) + (mod q) +CRT Watch out!

Attacks on factoring  (N), N => factoring (quadratic equation) Trick: obtain x, s.t. x  0 mod p, x mod q  0 gcd(x, N)=p SQRT modN => Factoring v  y 2 mod N; z  SQRT modN (v) If z  ±y, then x  y-z Computing (mod p) + (mod q) + CRT Random error mod p (or mod q) => factoring

Other Crypto Encryption Hashing MACs

Encryption One time pad Block cipher DES Feistel approach AES/Rijndael Modes of operation EBC, CFB, CBC, etc. Stream ciphers RC-4 Pseudo-random generators

Hashing Hashing algorithms MD-5 SHA Applications Digital signatures MAC

Systems Certificates SSL IPSEC Kerberos

Certificates X-509 CA’s Trust infrastructure Hierarchical X.509 Networks of Trust PGP

SSL TCP level secure channel Establish Shared Secret DH+Certificates [+signatures] RSA+Certificates [+signatures] Kerberos [TLS]  Do not confuse with Kerberos over SSL/TLS Encrypt & MAC Usually authenticates only server Client authentication possible Typical application: HTTPS

IPSEC IP level secure channel Similar tools to SSL Some traffic confidentiality Both ends authenticated Tunneling Typical application:VPN

Kerberos Key-Distribution Centers approach Trusted Third Party – another term Authentication Server Ticket Granting Servers Tickets Realms

Other topics Firewalls Non-repudiation SET

Final: Tuesday May am See you there! Best of Luck!!!