Dan Boneh Introduction What is cryptography? Online Cryptography Course Dan Boneh.

Slides:



Advertisements
Similar presentations
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Advertisements

COS 461 Fall 1997 Todays Lecture u intro to security in networking –confidentiality –integrity –authentication –authorization u orientation for assignment.
By Md Emran Mazumder Ottawa University Student no:
Trusted 3rd parties Basic key exchange
Course summary COS 433: Crptography -Spring 2010 Boaz Barak.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Efficient Zero-Knowledge Proof Systems Jens Groth University College London.
Intro 1 Introduction Intro 2 Good Guys and Bad Guys  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”
More on SSL/TLS. Internet security: TLS TLS is one of the more prominent internet security protocols. TLS is one of the more prominent internet security.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Introduction to Modern Cryptography, Lecture 13 Money Related Issues ($$$) and Odds and Ends.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
Computers in Society Encryption. Shameless Plug Catch the kayak club trip to Glenwood on Saturday. Fun!
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Introduction to Modern Cryptography, Lecture 7/6/07 Zero Knowledge and Applications.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Introduction to Modern Cryptography, Lecture 9 More about Digital Signatures and Identification.
Chapter 9 Cryptographic Protocol Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li.
PRIAM: PRivate Information Access Management on Outsourced Storage Service Providers Mark Shaneck Karthikeyan Mahadevan Jeff Yongdae Kim.
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Dan Boneh Basic key exchange The Diffie-Hellman protocol Online Cryptography Course Dan Boneh.
Dan Boneh Basic key exchange Public-key encryption Online Cryptography Course Dan Boneh.
Dan Boneh Introduction Course Overview Online Cryptography Course Dan Boneh.
Dan Boneh Stream ciphers The One Time Pad Online Cryptography Course Dan Boneh.
CIS 5371 Cryptography Introduction.
CRYPTOGRAPHY How does it impact cyber security and why you need to know more?
Public-Key Cryptography CS110 Fall Conventional Encryption.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Dan Boneh Block ciphers More attacks on block ciphers Online Cryptography Course Dan Boneh.
Tyepmg Pic Gvctxskvetlc April 25, The Caesar Cipher (Suetonius) “If Caesar had anything confidential to say, he wrote it in cipher, that is,
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Anonymous Authentication in Group Course Title: Network Security Faculty : Kwangjo Kim Jongseong Kim.
Dan Boneh Public Key Encryption from trapdoor permutations Is RSA a one-way function? Online Cryptography Course Dan Boneh.
Chapter 1  Introduction 1 Chapter 1: Introduction.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
Dan Boneh Public key encryption from Diffie-Hellman The ElGamal Public-key System Online Cryptography Course Dan Boneh.
Dan Boneh Basic key exchange Merkle Puzzles Online Cryptography Course Dan Boneh.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
Encryption CS110: Computer Science and the Internet.
Computer and Network Security - Message Digests, Kerberos, PKI –
Ch 13 Trustworthiness Myungchul Kim
Dan Boneh Basic key exchange Trusted 3 rd parties Online Cryptography Course Dan Boneh.
Dan Boneh Introduction Course Overview Online Cryptography Course Dan Boneh.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
A Novel Cryptography for Ad Hoc Network Security ► Pi Jian-yong; Liu Xin-song; Wu Ai; Liu Dan; ► 2006 International Conference on Communications, Circuits.
 5.1 Zero-Knowledge Proofs  5.2 Zero-Knowledge Proofs of Identity  5.3 Identity-Based Public-Key Cryptography  5.4 Oblivious Transfer  5.5 Oblivious.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
B504/I538: Introduction to Cryptography
Course summary COS 433: Crptography -Spring 2010 Boaz Barak.
Cryptographic Protocols
CRYPTOGRAPHY קריפטוגרפיה Thu 15:45-18:15.
Protocol ap1.0: Alice says “I am Alice”
Cryptographic Protocols
Lecture 10: Network Security.
Security: Integrity, Authentication, Non-repudiation
Presentation transcript:

Dan Boneh Introduction What is cryptography? Online Cryptography Course Dan Boneh

Dan Boneh Crypto core Secret key establishment: Secure communication: attacker??? k k confidentiality and integrity m1m1 m2m2 Alice Bob Talking to Alice Talking to Bob

Dan Boneh But crypto can do much more Digital signatures Anonymous communication Alice signature Alice Who did I just talk to? Bob

Dan Boneh Alice But crypto can do much more Digital signatures Anonymous communication Anonymous digital cash – Can I spend a “digital coin” without anyone knowing who I am? – How to prevent double spending? Who was that? Internet 1$ (anon. comm.)

Dan Boneh Protocols Elections Private auctions

Dan Boneh Protocols Elections Private auctions Secure multi-party computation Goal: compute f(x 1, x 2, x 3, x 4 ) “Thm:” anything the can done with trusted auth. can also be done without trusted authority

Dan Boneh Crypto magic Privately outsourcing computation Zero knowledge (proof of knowledge) Alice search query What did she search for? results I know the factors of N !! proof π ??? E[ query ] E[ results ] Alice N=p∙q Bob N

Dan Boneh A rigorous science The three steps in cryptography: Precisely specify threat model Propose a construction Prove that breaking construction under threat mode will solve an underlying hard problem

Dan Boneh End of Segment