Public Key Cryptography July 2011. Topics  Symmetric and Asymmetric Cryptography  Public Key Cryptography  Digital Signatures  Digital Certificates.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure – tell me in plain English AND THEN deep technical how PKI works Steve Lamb
Advertisements

Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Hash Functions A hash function takes data of arbitrary size and returns a value in a fixed range. If you compute the hash of the same data at different.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Digital Signatures and Hash Functions. Digital Signatures.
Public Key Cryptography & Message Authentication By Tahaei Fall 2012.
Pretty Good Privacy (PGP). How PGP works PGP uses both public-key cryptography and symmetric key cryptography, and includes a system which binds the public.
An understanding of PKI and some deployment hints BY Charles Anakweze CIS532 PKI = Public Key Infrastructure.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Lect. 11: Public Key Cryptography. 2 Contents 1.Introduction to PKC 2.Hard problems  IFP  DLP 3.Public Key Encryptions  RSA  ElGamal 4.Digital Signatures.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Techniques Instructor: Jerry Gao Ph.D. San Jose State University URL: May,
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Computer Science Public Key Management Lecture 5.
Introduction to Public Key Cryptography
Cryptography 101 Frank Hecker
Chapter 31 Network Security
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Cryptography, Authentication and Digital Signatures
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
1 Public-Key Cryptography and Message Authentication.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Lecture 2: Introduction to Cryptography
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Digital Signatures and Digital Certificates Monil Adhikari.
Private key
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Basics of Cryptography
Lecture 4 - Cryptography
NET 311 Information Security
Presentation transcript:

Public Key Cryptography July 2011

Topics  Symmetric and Asymmetric Cryptography  Public Key Cryptography  Digital Signatures  Digital Certificates

The briefcase example with shared key

Private-Key Cryptography  Traditional private/secret cryptography uses one key  Shared by both sender and receiver  If this key is disclosed, communications are compromised  Symmetric : keys used in parties are equal  No protection of sender from receiver forging a message & claiming is sent by sender

Symmetric Key Cryptography Encryption “ “ The quick brown fox jumps over the lazy dog” “ “ AxCv;5bmEseTfid3)fGsmW e#4^,sdgfMwir3:dkJeTsY8R “The quick brown fox jumps over the lazy dog” Decryption Plain-text input Plain-text output Cipher-text Same key (shared secret)

Symmetric Pros and Cons  Strength:  Simple and really very fast (order of 1000 to faster than asymmetric mechanisms)  Super-fast (and somewhat more secure) if done in hardware (3DES, Rijndael)  Weakness:  Must agree the key beforehand  Securely pass the key to the other party

Key Distribution Problem  In symmetric key cryptosystems  Over complete graph with n nodes, n C 2 = n(n-1)/2 pairs secret keys are required.  Example: n=100, 99 x 50 = 4,950 keys are required  Problem: Managing large number of keys and keeping them in a secure manner is difficult Secret keys are required between (a,b), (a,c), (a,d), (a,e), (b,c), (b,d), (b,e), (c,d), (c,e), (d,e) b a c d e

The briefcase example with unshared key The briefcase has to be sent back and forward three times, which seems pretty inefficient.

9 Desirable properties Use briefcase example to come up with a specification that are desirable for any cipher system that is to be used between two entities who do not already share a symmetric key.

Topics  Symmetric and Asymmetric Cryptography  Public Key Cryptography  Digital Signatures  Digital Certificates

Public-Key Cryptography  Probably most significant advance in the history of cryptography  Uses two keys – a public & a private key  One for encryption and another one for decryption  Knowledge of the encryption key doesn’t give knowledge of the decryption key  Asymmetric since parties are not equal  Uses number theoretic concepts to function  Complements rather than replaces private key crypto

Analogy

Public-Key Cryptography issues  Developed to address two key issues:  key distribution – how to have secure communications in general without having to trust a KDC with your key  digital signatures – how to verify a message comes intact from the claimed sender

The Two Keys  Each party has two keys Alice’s Private key Alice’s Public key Alice Bob’s Private key Bob’s Public key Charlie’s Private key Charlie’s Public key BobCharlie

Main uses of Each Key  A public-key  Public to anybody  used to encrypt messages and verify signatures  A private-key  known only to the owner  used to decrypt messages, and sign (create) signatures

How does 2 different keys work?  Just an very simple example:  Public Key = 4, Private Key = 1/4, message M = 5  Encryption:  Ciphertext C = M * Public Key  5 * 4 = 20  Decryption:  Plaintext M = C * Private Key  20 * ¼ = 5

An Example: Internet Commerce  Bob wants to use his credit card to buy some brownies from Alice over the Internet.  Alice sends her public key to Bob.  Bob uses this key to encrypt his credit-card number and sends the encrypted number to Alice.  Alice uses her private key to decrypt this message (and get Bob’s credit-card number).

Public Key Encryption Encryption “The quick brown fox jumps over the lazy dog” “Py75c%bn&*)9|fDe^bDFa Md’rkvegMs” “The quick brown fox jumps over the lazy dog” Decryption Clear-text Input Clear-text Output Cipher-text Different keys Recipient’s public key Recipient’s private key private public

Hybrid Encryption Systems  All known public key encryption algorithms are much slower than the fastest secret-key algorithms.  In a hybrid system, Alice uses Bob’s public key to send him a secret shared session key.  Alice and Bob use the session key to exchange information.

Topics  Symmetric and Asymmetric Cryptography  Public Key Cryptography  Digital Signatures  Digital Certificates

A Digital Signature  Digital data that carries the intent of a signature related to a digital document  Use to demonstrate the authenticity of a digital message or document  A valid digital signature gives a recipient reason to believe that the message was created by a known sender, and that it was not altered in transit

Sender: Creating a Digital Signature 3kJfgf*£$& Py75c%bn This is the document created by Charlotte Message or File Digital Signature Message Digest Calculate a short message digest from even a long input using a one-way message digest function (hash) Charlotte’s private key priv Generate Hash SHA, MD5 Asymmetric Encryption RSA This is the document created by Charlotte 3kJfgf*£$& Signed Document (Typically 128 bits)

Receiver: Verifying a Digital Signature RSA This is the document created by Charlotte 3kJfgf*£$& Signed Document Py75c%bn Message Digest Generate Hash Charlotte's public key (from certificate) Asymmetric Decryption pub Digital Signature Py75c%bn Equal??

Topics  Symmetric and Asymmetric Cryptography  Public Key Cryptography  Digital Signatures  Digital Certificates

25  The simplest certificate just contains:  A public key  Information about the entity that is being certified to own that public key  … and the whole is  Digitally signed by someone trusted (like your friend or a CA) 2wsR46%frd EWWrswe(*^ $G*^%#%# %DvtrsdFDfd 3%.6,7 What is a Certificate ? pub 3kJfgf*£$&4d *gd7dT Certificate This public key belongs to Charlotte Digital Signature Can be a person or a computer or a device..

26 X.509 Certificate Who is the owner, CN=Charlotte,O=CERN,C=CH The public key or info about it Who is signing, O=CERN,C=CH Serial Number X.500 Subject Extensions X.500 issuer Expiration date Public Key CA Digital Signature Certificate Info See later why expiration date is important Additional arbitrary information … of the issuer, of course

Elements of Digital Cert.  A Digital ID typically contains the following information:  Your public key, Your name and address  Expiration date of the public key, Name of the CA who issued your Digital ID

Certificate Validation  Essentially, this is just checking the digital signature  But you may have to “walk the path” of all subordinate authorities until you reach the root  Unless you explicitly trust a subordinate CA Check DS of Foobar “In BigRoot We Trust” (installed root CA certificate) Public key Certificate This public key belongs to Charlotte CERN Digital Signature Issued by: CERN Public key Certificate This public key belongs to CERN BigRoot Digital Signature` : Issued by: BigRoot Public key Certificate This public key belongs to BigRoot BigRoot Digital Signature Issued by: BigRoot Check DS of CERN

Q&A