Stephen S. Yau 1CSE465-591 Fall 2006 Cryptography.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CLASSICAL ENCRYPTION TECHNIQUES
Cryptography Ch-1 prepared by: Diwan.
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Principles of Information Security, 2nd edition1 Cryptography.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Lecture 1 Overview.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Cryptography Week-6.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Cryptography Lecture 1: Introduction Piotr Faliszewski.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Cryptography, Authentication and Digital Signatures
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
ITMS – 3153 Information Systems Security
Midterm Review Cryptography & Network Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Computer and Internet Security. Introduction Both individuals and companies are vulnerable to data theft and hacker attacks that can compromise data,
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Information Hiding Nattawat Laksanawisit At National Chi Nan University.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
1 Public-Key Cryptography and Message Authentication.
Encryption.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Overview of Cryptography & Its Applications
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Network Security Celia Li Computer Science and Engineering York University.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
INCS 741: Cryptography Overview and Basic Concepts.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Introduction (Pendahuluan)  Information Security  Criptography.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography – Test Review
Public Key Encryption and Digital Signatures
Encryption
Cryptography.
PART VII Security.
Basic of Modern Cryptography
Presentation transcript:

Stephen S. Yau 1CSE Fall 2006 Cryptography

Stephen S. Yau 2CSE Fall 2006 Cryptography In Greek means “secret writing” In Greek means “secret writing” An outsider (interceptor/intruder/adversary) can make following threats: An outsider (interceptor/intruder/adversary) can make following threats: Block message (affecting availability) Block message (affecting availability) Intercept message (affecting secrecy) Intercept message (affecting secrecy) Modify message (affecting integrity) Modify message (affecting integrity) Fabricate message (affecting integrity) Fabricate message (affecting integrity) Cryptography is the fundamental technique to counter these threats because the outsider does not understand the meaning of messages Cryptography is the fundamental technique to counter these threats because the outsider does not understand the meaning of messages T1: ch8.1 T2: ch9.1

Stephen S. Yau 3CSE Fall 2006 Cryptography (cont.) Cryptography: Study of mathematical techniques related to certain aspects of information security, such as confidentiality, data integrity, entity authentication, and data origin authentication. Cryptography: Study of mathematical techniques related to certain aspects of information security, such as confidentiality, data integrity, entity authentication, and data origin authentication. The basic component of cryptography is a cryptosystem The basic component of cryptography is a cryptosystem Cryptanalyst: Person working for unauthorized interceptor Cryptanalyst: Person working for unauthorized interceptor Cryptographer: Person working for legitimate sender or receiver Cryptographer: Person working for legitimate sender or receiver Cryptology: Study of encryption and decryption, including cryptography and cryptanalysis. Cryptology: Study of encryption and decryption, including cryptography and cryptanalysis.

Stephen S. Yau 4CSE Fall 2006 Cryptosystem A cryptosystem is a 5-tuple ( , D, M, K, C), where M is the set of plaintexts, K is the set of keys, C is the set of ciphertexts,  :   K→C is the set of encipher (encryption) functions, and D: C  K→M is the set of deciphering (decryption) functions. A cryptosystem is a 5-tuple ( , D, M, K, C), where M is the set of plaintexts, K is the set of keys, C is the set of ciphertexts,  :   K→C is the set of encipher (encryption) functions, and D: C  K→M is the set of deciphering (decryption) functions. Plaintext M: set of messages in original form Plaintext M: set of messages in original form Ciphertext C: set of messages in encrypted form Ciphertext C: set of messages in encrypted form

Stephen S. Yau 5CSE Fall 2006 Cryptosystem (cont.) Encryption: Process of encoding (enciphering) a message so that its meaning is not obvious. Encryption: Process of encoding (enciphering) a message so that its meaning is not obvious. Provide confidentiality Provide confidentiality Principle of Encryption Principle of Encryption Very hard (impossible) to find out the message without knowing the key Very hard (impossible) to find out the message without knowing the key Very easy (and fast) to find out the message knowing the key Very easy (and fast) to find out the message knowing the key Decryption: Process of decoding (deciphering or transforming) an encrypted message to its original form. Decryption: Process of decoding (deciphering or transforming) an encrypted message to its original form.

Stephen S. Yau 6CSE Fall 2006 Types of Cryptosystems Symmetric cryptosystems (also called single-key cryptosystems) are classical cryptosystems: Symmetric cryptosystems (also called single-key cryptosystems) are classical cryptosystems: M = D(K, E(K, M)) The encryption key and decryption key are the same. The encryption key and decryption key are the same. Asymmetric cryptosystem: Asymmetric cryptosystem: M = D(K d, E(K e, M)) K d is the decryption key and K e is the encryption key K d is the decryption key and K e is the encryption key K d ≠ K e K d ≠ K e T1: ch8.2 T2: ch9.2

7 One-Time Pad One-Time Pad (OTP) is the only mathematically secure cryptosystem. One-Time Pad (OTP) is the only mathematically secure cryptosystem. Mathematical Security: using theory of statistics and probability, the ciphertext C generated by the encryption algorithm E has been proven to be undecipherable, except using the right decryption algorithm D. Mathematical Security: using theory of statistics and probability, the ciphertext C generated by the encryption algorithm E has been proven to be undecipherable, except using the right decryption algorithm D. OTP uses a symmetric key, which should be statistically proven to be random OTP uses a symmetric key, which should be statistically proven to be random Message Key … Cipher … … Sender Message Key … Cipher … … Receiver T1: ch8.2.2 T2: ch9.2.2

Stephen S. Yau 8CSE Fall 2006 One Time Pad (cont.) A and B wish to communicate privately using the one-time pad (it uses a symmetric key K) A and B wish to communicate privately using the one-time pad (it uses a symmetric key K) They have previously agreed upon secret key K which is a string of n randomly chosen bits They have previously agreed upon secret key K which is a string of n randomly chosen bits If A wishes to send an n-bit message M to B, A sends to B the ciphertext C = M XOR K, If A wishes to send an n-bit message M to B, A sends to B the ciphertext C = M XOR K, The received ciphertext can be decrypted by B to obtain M, since M = C XOR K. The received ciphertext can be decrypted by B to obtain M, since M = C XOR K. When another message is to be sent, another key K must be used, hence the name “one- time pad” When another message is to be sent, another key K must be used, hence the name “one- time pad”

Stephen S. Yau 9CSE Fall 2006 Difficulties of OTP To ensure the security of the system, key size should not be less than message size (not necessary for other cryptosystems) To ensure the security of the system, key size should not be less than message size (not necessary for other cryptosystems) Generating a fully random key is practically very difficult Generating a fully random key is practically very difficult Sending an unrepeated key with the same size of the message through a secure channel to the receiver is not practical Sending an unrepeated key with the same size of the message through a secure channel to the receiver is not practical

Stephen S. Yau 10CSE Fall 2006 Computational Security An encryption scheme is computationally secure if it takes exponentially long time to break the ciphertext. An encryption scheme is computationally secure if it takes exponentially long time to break the ciphertext. Lifetime of a cryptosystem: The minimum time for unauthorized decoding of encrypted message Lifetime of a cryptosystem: The minimum time for unauthorized decoding of encrypted message Defined for each application, Defined for each application, Examples: Examples: Military orders = 1 hour to 3 years Military orders = 1 hour to 3 years Check transactions = 1 year Check transactions = 1 year Business agreements = years Business agreements = years

Stephen S. Yau 11CSE Fall 2006 Classical Cryptography Basic techniques for classical ciphers Basic techniques for classical ciphers Substitution: One letter is exchanged for another Substitution: One letter is exchanged for another Transposition: The order of the letters is rearranged Transposition: The order of the letters is rearranged Classical ciphers Classical ciphers Mono-alphabetic: Letters of the plaintext alphabet are mapped into other unique letters Mono-alphabetic: Letters of the plaintext alphabet are mapped into other unique letters Poly-alphabetic: Letters of the plaintext alphabet are mapped into letters of the ciphertext space depending on their positions in the text Poly-alphabetic: Letters of the plaintext alphabet are mapped into letters of the ciphertext space depending on their positions in the text Stream: Key stream is generated and used to encrypt the plaintext (Symmetric Key Algorithms) Stream: Key stream is generated and used to encrypt the plaintext (Symmetric Key Algorithms)

Stephen S. Yau 12CSE Fall 2006 Substitution Substitute each letter in the plaintext for another one Substitute each letter in the plaintext for another one Goal: Confusion – difficult to determine how a message and key were transformed into ciphertext. Goal: Confusion – difficult to determine how a message and key were transformed into ciphertext. Example (Caesar Cipher) Example (Caesar Cipher) a b c d e f g h i j k l m n o p q r s t u v w x y z a b c d e f g h i j k l m n o p q r s t u v w x y z q e r y u i o p a s d f g w h j k l z x c v b n m t q e r y u i o p a s d f g w h j k l z x c v b n m t under attack we need help under attack we need help  cwyul qxxqrd bu wuuy pufj T1: ch8.2.2 T2: ch9.2.2

Stephen S. Yau 13CSE Fall 2006 Transposition Change the positions of the characters in the plaintext Change the positions of the characters in the plaintext Goal: Diffusion – spread the information from the message or the key across the ciphertext. Goal: Diffusion – spread the information from the message or the key across the ciphertext. Example: Example: message: meet me after the toga party message: meet me after the toga party m e m a t r h t g p r y m e m a t r h t g p r y e t e f e t e o a a t e t e f e t e o a a t Ciphertext: MEMATRHTGPRYETEFETEOAAT Ciphertext: MEMATRHTGPRYETEFETEOAAT T1: ch8.2.1 T2: ch9.2.1

Stephen S. Yau 14CSE Fall 2006 Four Secure Key Distribution Strategies for Symmetric Cryptosystems 1. A key K can be selected by A to be shared with B, and K needs to be physically delivered to B 2. A third party can select the same key K and physically deliver K to A and B 3. If A and B have previously used a key K’, one party can transmit the new key K to the other, encrypted using the old key K’ 4. If A and B each has an encrypted connection to a third party C, C can transmit the new key K on the encrypted links to both A and B

Stephen S. Yau 15CSE Fall 2006 Asymmetric Key Cryptosystem (Public Key Cryptosystem) Uses public and private keys Uses public and private keys Public key for encryption Public key for encryption Private key for decryption Private key for decryption Examples: Examples: RSA RSA Trapdoor one-way function Trapdoor one-way function Elliptical curve cryptography Elliptical curve cryptography T1: ch8.3 T2: ch9.3

Stephen S. Yau 16CSE Fall 2006 RSA Principle Developed by Ron Rivest, Adi Shamir, and Leonard Adleman. (MIT, 1977) Developed by Ron Rivest, Adi Shamir, and Leonard Adleman. (MIT, 1977) C = m e mod (pq) p, q: any two large prime numbers (more than 512 bits) p, q: any two large prime numbers (more than 512 bits) e: public key e: public key d: private key d: private key Knowing C and e, it is “infeasible” to calculate m without knowing d, p and q Knowing C and e, it is “infeasible” to calculate m without knowing d, p and q Knowing d, p and q, it is easy to find the original plaintext message m = C d mod (pq) Knowing d, p and q, it is easy to find the original plaintext message m = C d mod (pq) T1: ch8.3.1 T2: ch9.3.2

Stephen S. Yau 17CSE Fall 2006 RSA Principle (cont.) Sender Intruder Receiver C {m, e, p, q; C= m e mod(pq)} {C, e, p, q; m=C d mod(pq)} {C, e}

Stephen S. Yau 18CSE Fall 2006 Public Key Distribution and Authentication Using the “Right” Public Key: Using the “Right” Public Key: Must be authentic, not necessarily secret Must be authentic, not necessarily secret Obtaining the “Right” Public Key: Obtaining the “Right” Public Key: Directly from its owner Directly from its owner Indirectly, in a signed message from a Certification Authority (CA): Indirectly, in a signed message from a Certification Authority (CA): A Certificate is a digitally signed message from a CA binding a public key to a name A Certificate is a digitally signed message from a CA binding a public key to a name Certificates can be passed around, or managed in directories Certificates can be passed around, or managed in directories Protocols: X.509 (RFC 2459), SPKI/SDSI, etc. Protocols: X.509 (RFC 2459), SPKI/SDSI, etc.

Stephen S. Yau 19CSE Fall 2006 References Matt Bishop,, Addison- Wesley, 2004, ISBN: Matt Bishop, Introduction to Computer Security, Addison- Wesley, 2004, ISBN: Matt Bishop, Computer Security: Art and Science, Addison- Wesley, 2002, ISBN: Matt Bishop, Computer Security: Art and Science, Addison- Wesley, 2002, ISBN:

Stephen S. Yau 20CSE Fall 2006 Steganography

Stephen S. Yau 21CSE Fall 2006 Secure Communication Two parties, Alice and Bob, can exchange information over an insecure medium in such a way that even if an intruder (Willie) is able to intercept, read and perform computation on the intercepted information, Willie will not be able to decipher the content of the exchanged information.

Stephen S. Yau 22CSE Fall 2006 Encryption may not be enough Prisoners Problem: – Alice and Bob are in jail and wish to hatch an escape plan. All their communications pass through the warden,Willie, and if Willie detects any encrypted messages, he can simply stop the communication. So they must find some way of hiding their secret message in an innocuous looking text.

Stephen S. Yau 23CSE Fall 2006 Steganography The art of hiding information in ways that prevent detection of hidden messages. In Greek means “covered writing” Steganography and cryptography are cousins in the spy craft family While the goal of the cryptography system is to conceal the content of the messages, the goal of information hiding or steganography is to conceal their existence

Stephen S. Yau 24CSE Fall 2006 Steganography What to hide – Texts – Images – Sound How to hide – embed text in text/images/audio/video files – embed image in text/images/audio/video files – embed sound in text/images/audio/video files

Stephen S. Yau 25CSE Fall 2006 Steganographic System

Stephen S. Yau 26CSE Fall 2006 Comparison Cryptography C = E k (P) Plain text P = D k (C) Key Steganography secret message cover image f Stego message f Ciphertext

Stephen S. Yau 27CSE Fall 2006 A Real Example During WW2 the following cipher message was actually sent by a German spy “Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils” Hidden Message “Pershing sails from NY June 1” Can be obtained by extracting the second letter in each word of the message sent

Stephen S. Yau 28CSE Fall 2006 Steganographic Techniques Genome Steganography: Encoding a hidden message in a strand of human DNA Hiding in Text: Information hidden in documents by manipulating the positions of lines and words Hiding in Images/Videos: least significant bit insertion masking and filtering applying more sophisticated image processing algorithms

Stephen S. Yau 29CSE Fall 2006 Steganographic Techniques (Cont.) Hiding data in audio files: Data can be hidden in the audio files. Slight alterations on sound, such as tiny shifts in phase angle, speech cadence, and frequency, can transport hidden information, but are indiscernible to human senses Hiding in video file: least significant bit insertion masking and filtering applying more sophisticated image processing algorithms

Stephen S. Yau 30CSE Fall 2006 Steganographic Techniques (Cont.) Hiding in the disk space: Hiding the data in unused or reserved space. Hiding data in software and circuitry: Data can be hidden in the layout of the code distributed in a program or the layout of electronic circuits on a board. Hiding in network packets: Hidden in packets transmitted through the Internet.

Stephen S. Yau 31CSE Fall 2006 Digital Watermarking Watermarking is used primarily for identification and entails embedding a unique piece of information within a medium without noticeably altering the medium Watermarking is used primarily for identification and entails embedding a unique piece of information within a medium without noticeably altering the medium The difference between Steganography and Watermarking is primarily intent. The difference between Steganography and Watermarking is primarily intent. Steganography conceals information; Steganography conceals information; Watermarks extend information and become an attribute of the cover image Watermarks extend information and become an attribute of the cover image Publishing and broadcasting industries are interested in techniques for hiding encrypted copyright marks and serial numbers in digital films, audio recordings, books and multimedia products. Publishing and broadcasting industries are interested in techniques for hiding encrypted copyright marks and serial numbers in digital films, audio recordings, books and multimedia products.

Stephen S. Yau 32CSE Fall 2006 References Stefan Katzenbeisser, Fabien A. P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Books, January 2000 Stefan Katzenbeisser, Fabien A. P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Books, January 2000