McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 1 Security PART VII.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Modern Symmetric-Key Ciphers
Modern Symmetric-Key Ciphers
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Chapter 5 Cryptography Protecting principals communication in systems.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
K. Salah1 Cryptography Module II. K. Salah2 Data Encryption Standards DES.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Lecture 23 Symmetric Encryption
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Network Security Chapter
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
SYMPATRIC ENCRYPTION L.Tahani Al jehani. Introduction  Definition  Cryptography, a word with Greek origins, means “secret writing”.  It refers to the.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Chapter 12 Cryptography (slides edited by Erin Chambers)
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Dr. Khalid A. Kaabneh Amman Arab University
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
CSCI 5857: Encoding and Encryption
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Midterm Review Cryptography & Network Security
Chapter 20 Symmetric Encryption and Message Confidentiality.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Symmetric-Key Cryptography
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2003 Chapter 19 Data Encryption.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Modes of Operation INSTRUCTOR: DANIA ALOMAR. Modes of Operation A block cipher can be used in various methods for data encryption and decryption; these.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
Traditional Symmetric-Key Ciphers
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Introduction to Modern Symmetric-key Ciphers
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Lecture 23 Symmetric Encryption
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
5.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 5 Introduction to Modern Symmetric-key Ciphers.
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
PART VII Security.
Presentation transcript:

McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII

McGraw-Hill©The McGraw-Hill Companies, Inc., Security Topics

McGraw-Hill©The McGraw-Hill Companies, Inc., Chapters Chapter 29 Cryptography Chapter 30 Message Authentication, User Authentication, and Key Management Chapter 31 Security Protocols in The Internet

McGraw-Hill©The McGraw-Hill Companies, Inc., Chapter 29 Cryptography

McGraw-Hill©The McGraw-Hill Companies, Inc., Cryptography Cryptography refers to the science and art of transforming messages to make them secure and immune to attacks. Original message before being transformed is called plaintext. After the message is transformed, is called ciphertext. An encryption algorithm transforms the plaintext to ciphertext; a decryption algorithm transforms the ciphertext back to plaintext. The term cipher is used to refer to encryption and decryption algorithms.

McGraw-Hill©The McGraw-Hill Companies, Inc., Encryption and Decryption A key is a number (value) that the cipher, as an algorithm, operates on. To encrypt a message, we need an encryption algorithm, an encryption key, and the plaintext. These create the ciphertext. To decrypt a message, we need a decryption algorithm, a decryption key, and the ciphertext. These reveal the plaintext. In cryptography, the encryption/decryption algorithms are public; but the keys are secret.

McGraw-Hill©The McGraw-Hill Companies, Inc., Types of Cryptography Algorithms Symmetric-Key Cryptography Also known as Secret-key Asymmetric-key Cryptography Also Known as public-key

McGraw-Hill©The McGraw-Hill Companies, Inc., Symmetric-key cryptography In symmetric-key cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared. In symmetric-key cryptography, the same key is used in both directions The algorithm used for decryption is the inverse of the algorithm used for encryption. It takes less time to encrypt a message using a symmetric-key algorithm than it takes to encrypt using a public-key algorithm. Symmetric-key cryptography is often used for long messages Dis-adv: Each pair of users must have a unique symmetric key.

McGraw-Hill©The McGraw-Hill Companies, Inc., Traditional Ciphers Substitution Cipher Monoalphabetic Substitution Polyalphabetic Substitution Transpositional Cipher Block Cipher Data Encryption Standard (DES)

McGraw-Hill©The McGraw-Hill Companies, Inc., Monoalphabetic Substitution A cipher using the substitution method substitutes one symbol with another. Monoalphabetic: A character in the plaintext is always changed to the same character in the ciphertext regardless of its position in the text. Example: Caesar Cipher. Here, shifting of key is used. Easy to attack.

McGraw-Hill©The McGraw-Hill Companies, Inc., Example of Monoalphabetic substitution In monoalphabetic substitution, the relationship between a character in the plaintext to the character in the ciphertext is always one-to-one

McGraw-Hill©The McGraw-Hill Companies, Inc., Polyalphabetic Substitution In polyalphabetic substitution, the relationship between a character in the plaintext and a character in the ciphertext is one-to-many Each occurrence of a character can have a different substitute Key is like: Take the position of the character in the text, divide the number by 10, and let the remainder be the shift value. Ex. Vigenere Cipher. Difficult to attack when compared to Monoalphabetic. Although the encryption changes the frequency of the characters, the character relationships are still preserved. So, good trial-and-error attack can break the code.

McGraw-Hill©The McGraw-Hill Companies, Inc., Transpositional cipher The characters retain their plaintext form but change their positions to create the ciphertext. The text is organized into a two-dimensional table, and the columns are interchanged according to a key. The character frequencies are reserved, and the attacker can find the plaintext through trial and error.

McGraw-Hill©The McGraw-Hill Companies, Inc., Block cipher Traditional ciphers used a character or symbol as the unit of encryption/decryption. Modern ciphers use a block of bits as the unit of encryption/decryption. P-box (P for permutation) performs a transposition at the bit level. It can be implemented in hardware or software, but hardware is faster. Both the plaintext and ciphertext have the same number of 1s and 0s.

McGraw-Hill©The McGraw-Hill Companies, Inc., Block cipher S-box (S for substitution) performs a substitution at the bit level. The S-box substitutes one decimal digit with another. The S-box normally has three components: an encoder, a decoder, and a P-box. The decoder changes an input of n bits to an output of 2 n bits. This output has one single 1 (the rest are 0s) located at a position determined by the input. The P-box permutes the output of decoder, and the encoder changes the output of the P-box backs to a binary number in the same way as the decoder, but inversely. P-box

McGraw-Hill©The McGraw-Hill Companies, Inc., Product block P-boxes and S-boxes can be combined to get a more complex cipher block, called Product block. Data Encryption Standard (DES) uses an algorithm that encrypts a 64-bit plaintext using a 56-bit key. The text is put through 19 different and complex procedures to create a 64-bit ciphertext.

McGraw-Hill©The McGraw-Hill Companies, Inc., General scheme of DES DES has two transposition blocks, one swapping block, and 16 complex blocks called iteration blocks. The 16 iterative blocks are conceptually the same, but each uses a different key derived from the original key. DES works on 8 characters (bytes) at a time.

McGraw-Hill©The McGraw-Hill Companies, Inc., Figure Iteration block In each block, the previous right 32 bits become the next left 32 bits (swapping). The next right 32 bits, however, come from first applying an operation (a function) on the previous right 32 bits and then XORing the result with the left 32 bits.

McGraw-Hill©The McGraw-Hill Companies, Inc., Figure Triple DES To lengthen the key and at the same time keep the new block compatible with that of the original DES. The DES cipher uses the same concept as the Caesar cipher, but the encryption/decryption algorithm is much more complex due to the sixteen 48-bit keys derived from a 56-bit key Triple DES uses three DES blocks and two 56-bit keys.

McGraw-Hill©The McGraw-Hill Companies, Inc., Operation Modes DES and triple DES are actually long substitution ciphers that operate on eight-character segments (sometimes called long characters). To encrypt and decrypt long messages (1000 characters), several modes are used. In Electronic code block (ECB) mode, we divide the long message into 64-bit blocks and encrypt each block separately. Encryption of each block is independent of other blocks in ECB mode.

McGraw-Hill©The McGraw-Hill Companies, Inc., CBC mode In cipher block chaining (CBC) mode, the encryption (or decryption) of a block depends on all previous blocks. To encrypt the second plaintext block (P 2 ), we first XOR it with the first cipher block (C 1 ) and then pass it through the encryption process. In this way, C 2 depends on C 1. A 64-bit random number, called the initialization vector (IV) is used. The IV is sent with the data so that the receiver can use it in decryption.

McGraw-Hill©The McGraw-Hill Companies, Inc., CFM Cipher feedback mode (CFM) was created for those situations in which we need to send or receive data 1 byte at a time, but still want to use DES (or triple DES). One solution is to make a 1-byte C N dependent on a 1-byte P N and another byte, which depends on 8 previous bytes itself.

McGraw-Hill©The McGraw-Hill Companies, Inc., CSM To encrypt/decrypt 1 bit at a time and at the same time be independent of the previous bits, we can use cipher stream mode (CSM). In this mode, data are XORed bit by bit with a long, one-time bit stream that is generated by an initialization vector in a looping process.

McGraw-Hill©The McGraw-Hill Companies, Inc., Public-key cryptography Two keys: a private key and a public key. The private key is kept by the receiver and the public key is for public use. Public-key that is used for encryption is different from the private key that is used for decryption. Adv: Removes the restriction of a shared symmetric key between two entities who need to communicate with each other. Each shared key is used by two parties only. The number of keys needed is reduced tremendously. Public-key algorithms are more efficient for short messages. Disadv: Complexity of the algorithm; To be effective we need large numbers Association between an entity and its public key must be verified [Certification authority].

McGraw-Hill©The McGraw-Hill Companies, Inc., Public-key cryptography

McGraw-Hill©The McGraw-Hill Companies, Inc., RSA Algorithm RSA (Rivest, Shamir, Adleman) is the most common public-key algorithm. Private key is a pair of numbers (N,d) = (119, 77). Public key is a pair of numbers (N,e) = (119, 5). Note that N is common to the private and public keys. Sender algorithm to encrypt: C=P e mod N P is plaintext, which is represented as a number; C is the number that represents the ciphertext. The two numbers e and N are components of the public key. Receiver algorithm to decrypt: P=C d mod N

McGraw-Hill©The McGraw-Hill Companies, Inc., Numbers like d and e are very large numbers (on the scale of tens of digits). Thus using trial and error method to get these numbers will take a very long time. Procedure to choose three numbers N, d, and e. Choose two large prime numbers p and q. Compute N = p * q Choose e (less than N) such that e and (p-1)(q-1) are relatively prime (having no common factor other than 1) Choose d such that (e*d) mod [(p-1)(q-1)] is equal to 1. Selecting Public and Private Keys