© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Digital Signatures and Hash Functions. Digital Signatures.
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Chapter3 Public-Key Cryptography and Message Authentication.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Cryptography and Network Security Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown/Mod. & S. Kondakci.
Lecture 23 Symmetric Encryption
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Encryption Methods By: Michael A. Scott
Lecture 3: Cryptographic Tools
Network Security Sorina Persa Group 3250 Group 3250.
1 Message Authentication and Hash Functions Authentication Requirements Authentication Functions Message Authentication Codes Hash Functions Security of.
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
Homework Assignment 03  Problems 1.1, 1.2, 1.4  ComputerSecurity/assignments/assignment03/a ssignment03.doc.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
1 Chapter 11: Message Authentication and Hash Functions Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
I-4 security.
Message Authentication Requirements Disclosure Release of message contents to any person or process not possessing the appropriate cryptographic key Traffic.
Hash Functions A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value h = H(M) Principal object is.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Chapter 20 Symmetric Encryption and Message Confidentiality.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Chapter 21 Public-Key Cryptography and Message Authentication.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 2 “Cryptographic Tools”.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Lecture 23 Symmetric Encryption
Cryptography and Network Security (CS435) Part Nine (Message Authentication)
Intro to Cryptography Lesson Introduction
Cryptography Gerard Klonarides. What is cryptography? Symmetric Encryption Symmetric Encryption Asymmetric Encryption Asymmetric Encryption Other cryptography.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Hashes Lesson Introduction ●The birthday paradox and length of hash ●Secure hash function ●HMAC.
Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
1 Public Key Cryptography. 2 Public Key Cryptography Agenda: Message authentication – authentication codes and hash functions Public key encryption –
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CS457 Introduction to Information Security Systems
Cryptographic Tools cryptographic algorithms important element in security services review various types of elements symmetric encryption public-key (asymmetric)
Introduction Of System Security
Chapter 3 - Public-Key Cryptography & Authentication
Computer Security: Principles and Practice
Introduction to Cryptography
Computer Security Chapter Two
Basics Of Symmetric Encryption
Presentation transcript:

© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides taken from Dr Lawrie Brown for “Computer Security: Principles and Practice”, 1/e, by William Stallings and Lawrie Brown Faisal Karim Shaikh DEWSNet Group Dependable Embedded Wired/Wireless Networks

Computer Security 2 Cryptographic Tools  cryptographic algorithms important element in security services  review various types of elements  symmetric encryption  public-key (asymmetric) encryption  digital signatures and key management  secure hash functions  example is use to encrypt stored data

Computer Security 3 Some Basic Terminology  plaintext - original message  ciphertext - coded message  cipher - algorithm for transforming plaintext to ciphertext  key - info used in cipher known only to sender/receiver  encipher (encrypt) - converting plaintext to ciphertext  decipher (decrypt) - recovering ciphertext from plaintext  cryptography - study of encryption principles/methods  cryptanalysis (codebreaking) - study of principles/ methods of deciphering ciphertext without knowing key  cryptology - field of both cryptography and cryptanalysis

Computer Security 4 Symmetric Encryption

Computer Security 5 Attacking Symmetric Encryption  cryptanalysis  rely on nature of the algorithm  plus some knowledge of plaintext characteristics  even some sample plaintext-ciphertext pairs  exploits characteristics of algorithm to deduce specific plaintext or key  brute-force attack  try all possible keys on some ciphertext until get an intelligible translation into plaintext

Computer Security 6 Exhaustive Key Search

Computer Security 7 Symmetric Encryption Algorithms

Computer Security 8 DES and Triple-DES  Data Encryption Standard (DES, 1977) is the most widely used encryption scheme  uses 64 bit plaintext block and 56 bit key to produce a 64 bit ciphertext block  concerns about algorithm & use of 56-bit key  Triple-DES ( ANSI standard X9.17 in 1985 )  repeats basic DES algorithm three times  using either two or three unique keys  much more secure but also much slower

Computer Security 9 Advanced Encryption Standard (AES)  needed a better replacement for DES  NIST called for proposals in 1997  selected Rijndael in Nov 2001  published as FIPS 197  symmetric block cipher  uses 128 bit data & 128/192/256 bit keys  now widely available commercially

Computer Security 10 Block verses Stream Ciphers

Computer Security 11 Message Authentication  protects against active attacks  verifies received message is authentic  contents unaltered  from authentic source  timely and in correct sequence  can use conventional encryption  only sender & receiver have key needed  or separate authentication mechanisms  append authentication tag to cleartext message

Computer Security 12 Message Authentication Codes

Computer Security 13 Secure Hash Functions

Computer Security 14 Message Auth

Computer Security 15 Hash Function Requirements  applied to any size data  H produces a fixed-length output.  H(x) is relatively easy to compute for any given x  one-way property  computationally infeasible to find x such that H(x) = h  weak collision resistance  computationally infeasible to find y ≠ x such that H(y) = H(x)  strong collision resistance  computationally infeasible to find any pair (x, y) such that H(x) = H(y)

Computer Security 16 Hash Functions  two attack approaches  cryptanalysis exploit logical weakness in algexploit logical weakness in alg  brute-force attack trial many inputstrial many inputs strength proportional to size of hash code ( 2 n/2 )strength proportional to size of hash code ( 2 n/2 )  SHA most widely used hash algorithm  SHA-1 gives 160-bit hash  more recent SHA-256, SHA-384, SHA-512 provide improved size and security

Computer Security 17 Public Key Encryption Diffie and Hellman (1976)

Computer Security 18 Public Key Authentication

Computer Security 19 Public Key Requirements 1.computationally easy to create key pairs 2.computationally easy for sender knowing public key to encrypt messages 3.computationally easy for receiver knowing private key to decrypt ciphertext 4.computationally infeasible for opponent to determine private key from public key 5.computationally infeasible for opponent to otherwise recover original message 6.useful if either key can be used for each role

Computer Security 20 Public Key Algorithms  RSA (Rivest, Shamir, Adleman)  developed in 1977  only widely accepted public-key encryption alg  given tech advances need bit keys  Diffie-Hellman key exchange algorithm  only allows exchange of a secret key  Digital Signature Standard (DSS) (1991)  provides only a digital signature function with SHA-1  Elliptic curve cryptography (ECC)  new, security like RSA, but with much smaller keys

Computer Security 21 Public Key Certificates X.509 standard

Computer Security 22 Digital Envelopes

Computer Security 23 Random Numbers  random numbers have a range of uses  requirements:  randomness  based on statistical tests for uniform distribution and independence  unpredictability  successive values not related to previous  clearly true for truly random numbers  but more commonly use generator

Computer Security 24 Pseudorandom verses Random Numbers  often use algorithmic technique to create pseudorandom numbers  which satisfy statistical randomness tests  but likely to be predictable  true random number generators use a nondeterministic source  e.g. radiation, gas discharge, leaky capacitors  increasingly provided on modern processors

Computer Security 25 Practical Application: Encryption of Stored Data  common to encrypt transmitted data  much less common for stored data  which can be copied, backed up, recovered  approaches to encrypt stored data:  back-end appliance  library based tape encryption  background laptop/PC data encryption

Computer Security 26 Summary  introduced cryptographic algorithms  symmetric encryption algorithms for confidentiality  message authentication & hash functions  public-key encryption  digital signatures and key management  random numbers