Cryptography and Internet Security How mathematics makes it safe to shop on-line John Lindsay Orr University of Nebraska - Lincoln.

Slides:



Advertisements
Similar presentations
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Digital Signatures. Anononymity and the Internet.
Data encryption with big prime numbers
22C:19 Discrete Structures Integers and Modular Arithmetic
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
Public Key Encryption Algorithm
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Cryptography 101 How is data actually secured. RSA Public Key Encryption RSA – names after the inventors –Rivest, Shamir, and Adleman Basic Idea: Your.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
CS 105 – Introduction to the World Wide Web  HTTP Request*  Domain Name Translation  Routing  HTTP Response*  Privacy and Cryptography  Adapted.
Overview of Cryptography Oct. 29, 2002 Su San Im CS Dept. EWU.
Cryptography Lecture 11: Oct 12. Cryptography AliceBob Cryptography is the study of methods for sending and receiving secret messages. adversary Goal:
Public Key Cryptography
Public Encryption: RSA
RSA Encryption William Lu. RSA Background  Basic technique first discovered in 1973 by Clifford Cocks of CESG (part of British GCHQ)  Invented in 1977.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Public Key Algorithms 4/17/2017 M. Chatterjee.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
RSA Encryption Caitlin O’Dwyer. What is an RSA Number? An RSA number n is a number s.t. n=pq Where p and q are distinct, large, prime integers.
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
Codes, Ciphers, and Cryptography-RSA Encryption
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
RSA and its Mathematics Behind
CS110: Computers and the Internet Encryption and Certificates.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Encryption Coursepak little bit in chap 10 of reed.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
Midterm Review Cryptography & Network Security
Tyepmg Pic Gvctxskvetlc April 25, The Caesar Cipher (Suetonius) “If Caesar had anything confidential to say, he wrote it in cipher, that is,
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Darci Miyashiro Math 480 April 29, 2013
Public-Key Encryption
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
What is RSA RSA is a system employed to create the encrypted message in which the key used for encryption is different from that used to decrypt. It is.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
P1. Public-Key Cryptography and RSA 5351: Introduction to Cryptography Spring 2013.
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
1 Security and Cryptography: basic aspects Ortal Arazi College of Engineering Dept. of Electrical & Computer Engineering The University of Tennessee.
RSA and its Mathematics Behind July Topics  Modular Arithmetic  Greatest Common Divisor  Euler’s Identity  RSA algorithm  Security in RSA.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
What use are prime numbers? ?. o All the primes, apart from 2, are odd numbers. o 1 is not a prime number. Why? o There are infinitely many prime numbers!
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Encryption CS110: Computer Science and the Internet.
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Ch1 - Algorithms with numbers Basic arithmetic Basic arithmetic Addition Addition Multiplication Multiplication Division Division Modular arithmetic Modular.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Data encryption with big prime numbers DANIEL FREEMAN, SLU.
RSA Cryptosystem Great Theoretical Ideas In Computer Science S. Rudich V. Adamchik CS Spring 2006 Lecture 8Feb. 09, 2006Carnegie Mellon University.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CPIS 312 Chapter Four: PUBLIC KEY CRYPTO. Index 2 A.Introduction A.1 Asymmetric Key Cryptography- Introduction A.2 General ideas about the Public Key.
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
Digital Signatures.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Public-Key Cryptography and RSA
Modular Arithmetic and RSA Encryption
Appendix 5: Cryptography p
MSIT 543 Cryptography Concepts and Techniques How RSA Encryption Works
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Presentation transcript:

Cryptography and Internet Security How mathematics makes it safe to shop on-line John Lindsay Orr University of Nebraska - Lincoln

Goals Bad guys on the net: Why we need internet security Codes and ciphers: Julius Caesar and MI5 The chicken and the egg: Asymmetric ciphers 525,600 minutes : Why asymmetric ciphers work The bad guys get smart: Man-in-the-middle attacks Digital signatures and certificate authorities Security ain’t safety: Phishing

Bad Guys on the Net Why we need internet security

Alice Server

Alice Server

Alice Server

…if he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet, that not a word could be made out. If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others. …si qua occultius perferenda erant, per notas scripsit, id est sic structo litterarum ordine, ut nullum uerbum effici posset: quae si qui inuestigare et persequi uelit, quartam elementorum litteram, id est D pro A et perinde reliquas commutet. Suetonius Life of Julius Caesar, 56 Codes and Ciphers Julius Caesar and MI5

zabIJK H a r r y P o t t e r S r w w h u Hdu y “… substitute the fourth letter of the alphabet, namely D, for A, and so with the others…”

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z AHRY KD UB DKUUB

… … Modular Arithmetic

H K A D R U Y B Caesar Cipher (twice)

H K A G R A Y K Polyalphabetic Cipher (twice)

A cipher is a set of rules for encrypting data. A cipher is symmetric if knowledge of the information needed to encrypt also gives you knowledge of how to decrypt.

The Chicken and the Egg Symmetric and asymmetric ciphers

Alice Let’s use a + 3 (mod 26) Okey dokey.. a – 3 (mod 26) Server

An asymmetric cipher, or public key cipher, is one where knowing the information needed to encrypt doesn’t help you decrypt. An asymmetric cipher has two parts: A public key k public encrypts A private key k private decrypts Keep the private key secret – give the public key to anyone.

Alice You use k public Okey dokey.. k public k private Server (Alice) k public (Alice) k public

Alice Server You use k public Okey dokey, but now… (Alice) …you use k public (Server)

525,600 Minutes Why asymmetric ciphers work

So: An asymmetric cipher, or public key cipher, is one where knowing the information needed to encrypt doesn’t help you decrypt. How is this possible? In fact, k public and k private are related, but… k public k private

RSA Public Key Cryptography Described by Rob Rivest, Adi Shamir, and Leonard Adleman at MIT in The idea is based on prime numbers…

A prime number is one whose only factors are 1 and itself. e.g. 2, 3, 5, 7, 11, 13 but not 4, or 6 Theorem. Every number is the product of prime numbers. e.g. 1,386 = 2×693 = 2×3×231 = 2×3×3×77=2×3×3×7×11 Theorem. There is no biggest prime number. If 2,3,5,7,…,P were all the prime numbers then what about × 3 × 5 × 7 × … × P

Each of these numbers is the product of exactly two prime numbers. What are they? ,989,977,669 = 2 × 3 = 2 × 5 = 3 × 7 = 13 × 17 = 23 × 31 = 611,953 × 746,773 = P 5000 × P 6000 The RSA public key consists of a number which is the product of two prime numbers. If you could figure out which two prime numbers you could find the private key.

“Ask a computer – computers are good at these kind of things…” Look again at 456,989,977,669= 611,953 × 746,773

10 44 = 100,000,000,000,000,000,000,000,000,000,000,000,000,000,000 seconds There are 60 × 24 × 365 = 525,600 minutes in a year and so there are 60 × 525,600 = 31,536,000 seconds. So seconds is That’s 3,170,000,000,000,000,000,000,000,000,000,000,000 years Age of the universe = 13,700,000,000 years

Theorem. There is no biggest prime number. And we have good algorithms for finding very big prime numbers (100’s of digits) But we have no methods of finding the prime factors of N=PQ that are qualitatively better than just checking all possibilities: T = C A d where d = # digits in N

How does RSA work? Need to generate a public and a private key. Step 1: Pick two (very) big prime numbers p and q Step 2: Pick a number 0 < r < (p – 1)(q – 1) Step 3: Find a number 0 < s < (p – 1)(q – 1) such that Key Fact: For any number x,

How does RSA work? (cont…) Key Fact: For any number x, Let n = pq Now, given x… To encode x: Calculate y = the remainder of x r ÷ n To decode y: Calculate the remainder of y s ÷ n Public Key: n and r Private Key: n and s Why does it work?

“Fermat’s Little Theorem” “Chinese Remainder Theorem”

The Bad Guys Get Smart Man-in-the-middle attacks

Alice Server You use k public (Alice) Okey dokey.. (Alice) k public (Alice) k private (Alice) k public (Alice) k public

(Alice) k private (Alice) k public Mallory Alice Server You use k public (Alice) Okey dokey.. You use k public (Mallory) Okey dokey.. (Mallory) k public (Alice) k public (Mallory) k private (Mallory) k public (Alice) k public (Mallory) k public

Digital Signatures

Bob (Bob) k private (Bob) k private (Bob) k public (Bob) k public Digital Signatures Anyone can read the message… …but only one person could have written the message… Bob!

(CA) Mallory Alice Server (Alice) k private (Alice) k public Certificate Authority k private (CA) k public (Alice) k public (CA) k private (Alice) k public

Security Ain’t Safety Phishing