Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Sri Lanka Institute of Information Technology
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Chapter3 Public-Key Cryptography and Message Authentication.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Cryptography and Network Security Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown/Mod. & S. Kondakci.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Encryption Methods By: Michael A. Scott
Lecture 3: Cryptographic Tools
Network Security Sorina Persa Group 3250 Group 3250.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
ASYMMETRIC CIPHERS.
Public Key Model 8. Cryptography part 2.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
Homework Assignment 03  Problems 1.1, 1.2, 1.4  ComputerSecurity/assignments/assignment03/a ssignment03.doc.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Message Authentication  message authentication is concerned with: protecting the integrity of a message protecting the integrity of a message validating.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
1 Chapter 11: Message Authentication and Hash Functions Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
I-4 security.
Hash Functions A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value h = H(M) Principal object is.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Chapter 21 Public-Key Cryptography and Message Authentication.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 2 “Cryptographic Tools”.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Network Security David Lazăr.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Chapter 11 Message Authentication and Hash Functions.
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Lecture 23 Symmetric Encryption
Cryptographic Hash Functions Prepared by Dr. Lamiaa Elshenawy
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Cryptography and Network Security (CS435) Part Nine (Message Authentication)
Intro to Cryptography Lesson Introduction
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
1 Public Key Cryptography. 2 Public Key Cryptography Agenda: Message authentication – authentication codes and hash functions Public key encryption –
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
CS457 Introduction to Information Security Systems
Cryptographic Hash Function
Public Key Encryption and Digital Signatures
Chapter 3 - Public-Key Cryptography & Authentication
Hash Function Requirements
Presentation transcript:

Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown

Message Authentication protects against active attacks verifies received message is authentic can use conventional encryption contents have not been altered from authentic source timely and in correct sequence only sender & receiver share a key

Message Authentication Codes

Secure Hash Functions

Message Authentication Using a One-Way Hash Function

Hash Function Requirements can be applied to a block of data of any size produces a fixed-length output H(x) is relatively easy to compute for any given x one-way or pre-image resistant – infeasible to find x such that H(x) = h second pre-image or weak collision resistant – infeasible to find y ≠ x such that H(y) = H(x) collision resistant or strong collision resistance – infeasible to find any pair (x, y) such that H(x) = H(y)

Security of Hash Functions approaches to attack a secure hash function – cryptanalysis exploit logical weaknesses in the algorithm – brute-force attack strength of hash function depends solely on the length of the hash code produced by the algorithm additional secure hash function applications: – Passwords: hash of a password is stored by an operating system – intrusion detection: store H(F) for each file on a system and secure the hash values

Public-Key Encryption Structure publicly proposed by Diffie and Hellman in 1976 based on mathematical functions asymmetric uses two separate keysuses two separate keys public key and private keypublic key and private key public key is made public for others to usepublic key is made public for others to useasymmetric uses two separate keysuses two separate keys public key and private keypublic key and private key public key is made public for others to usepublic key is made public for others to use some form of protocol is needed for distribution

Public-Key Encryption

Private-Key Encryption

Requirements for Public-Key Crypto. computationally easy to create key pairs computationally easy for sender knowing public key to encrypt messages computationally easy for receiver knowing private key to decrypt ciphertext computationally infeasible for opponent to determine private key from public key computationally infeasible for opponent to otherwise recover original message useful if either key can be used for each role

Asymmetric Encryption Algorithms RSA (Rivest, Shamir, Adleman) developed in 1977 most adopted approach to public-key encryption block cipher in which the plaintext and ciphertext are between 0 and n-1 Diffie-Hellman key exchange algorithm enables two users to securely reach agreement about a shared secret limited to the exchange of the keys Digital Signature Standard (DSS) provides only a digital signature function with SHA-1 cannot be used for encryption or key exchange Elliptic curve cryptography (ECC) security like RSA, but with much smaller keys

Applications for Public-Key Cryptosystems

Digital Signatures used for authenticating both source and data integrity created by encrypting hash code with private key does not provide confidentiality – even in the case of complete encryption – message is safe from alteration but not eavesdropping

Public Key Certificates

Digital Envelopes protects a message without needing to first arrange for sender and receiver to have the same secret key equates to the same thing as a sealed envelope containing an unsigned letter

Random Numbers Uses include generation of: Uses include generation of: – keys for public-key algorithms – stream key for symmetric stream cipher – symmetric key for use as a temporary session key or in creating a digital envelope – handshaking to prevent replay attacks – session key

Randomness criteria: – uniform distribution frequency of occurrence of each of the numbers should be approximately the same – independence no one value in the sequence can be inferred from the others Unpredictability each number is statistically independent of other numbers in the sequence opponent should not be able to predict future elements of the sequence on the basis of earlier elements Random Number Requirements

Random versus Pseudorandom cryptographic applications typically use algorithms for random number generation – algorithms are deterministic and therefore produce sequences of numbers that are not statistically random pseudorandom numbers are: – sequences produced that satisfy statistical randomness tests – likely to be predictable true random number generator (TRNG): – uses a nondeterministic source to produce randomness – most operate by measuring unpredictable natural processes e.g. radiation, gas discharge, leaky capacitors – increasingly provided on modern processors

Application: Encryption of Stored Data common to encrypt transmitted data much less common for stored data there is often little protection beyond domain authentication and operating system access controls data are archived for indefinite periods even though erased, until disk sectors are reused data are recoverable approaches to encrypt stored data: use a commercially available encryption package back-end appliance library based tape encryption background laptop/PC data encryption

Summary symmetric encryption – conventional or single-key only type used prior to public-key – five parts: plaintext, encryption algorithm, secret key, ciphertext, and decryption algorithm – two attacks: cryptanalysis and brute force – most commonly used algorithms are block ciphers (DES, triple DES, AES) public-key encryption – based on mathematical functions – asymmetric – six ingredients: plaintext, encryption algorithm, public and private key, ciphertext, and decryption algorithm hash functions hash functions  message authentication creation of digital signatures digital signatures digital signatures  hash code is encrypted with private key digital envelopes digital envelopes  protects a message without needing to first arrange for sender and receiver to have the same secret key random numbers random numbers  requirements: randomness and unpredictability  validation: uniform distribution, independence  pseudorandom numbers