Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.

Slides:



Advertisements
Similar presentations
Conventional Encryption: Algorithms
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Sri Lanka Institute of Information Technology
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Security Module – Part 1 Spring 2006 V.T. Raja, Ph.D., Oregon State University.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Cryptography, Authentication and Digital Signatures
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Network Security David Lazăr.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Public Key Encryption.
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Intro to Cryptography Lesson Introduction
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Encryption Encryption: Transforms Message so that Interceptor Cannot Read it –Plaintext (original message) Not necessarily text; Can be graphics, etc.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
6.033 Quiz3 Review Spring How can we achieve security? Authenticate agent’s identity Verify the integrity of the request Check the agent’s authorization.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Network Security  introduction  cryptography  authentication  key exchange  required reading: text section 7.1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Digital Signatures.
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
Security.
Introduction to Symmetric-key and Public-key Cryptography
Security.
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Presentation transcript:

Security

Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification

Why Cryptography General Security Goal - Confidentiality - Message Integrity - End-point Authentication - Operational security

Potentially Threats Eaves dropping Modification, insertions, deletion Masquerade Playback Man-in-a-middle-attack DoS (ie. SYN-flooding)

Cryptography - general To send messages over a network, which is unable to understand for a third part General technique: – Plain text – Encode (algorithm + key) – Cipher text (send over the network) – Decode (algorithm + key) – Plain text

Cryptography - coding Old days simple letter transformation e.g. c for an a and d for a b and so on i.e. ape -> crg To day – Symmetric key – Public-private keys

How to break encryption Force brute – Try combinations Ciphertext-only attack – try all/dictionary Known-plaintext Attack – know few word in text Chosen-plaintext Attack – know one full text

Cryptography - Symmetric Using the same key to encode and decode Which goal are fulfilled ? -Confidentiality -Authentication -Integrity -Operational security -Confidentiality – yes - Authentication - yes - Integrity - yes - Operational security - no

Cryptography - Symmetric Implementations: – DES (Data Encryption Standard) most known (round 4 min) today modified to triple DES key length 64bit (3*64 bit) – Other IDEA, RC5 to day even 128 bit (round 100trillion year)

Cryptography - Symmetric Key exchange: – Problem to exchange the key - we can not send it with a mail - then it would not be secret any longer – Using a Key Distribution Center (KDC) - I have an agreement with the KDC and with this an secret key. - So have all I communicate with.

Cryptography - Symmetric Windows use Symmetric key in an implementation called Kerberos: – All like KDC but you get grant (a key) to a resource for a certain time (all called a ticket)

Cryptography Asymmetric Using the different keys to encode and decode You always have a pair of keys a public key and a private key If you encode with a public key – you must decode with a private key If you encode with a private key – you must decode with a public key

Cryptography Asymmetric Which goal are fulfilled from A to B (B public Key) ? -Confidentiality -Authentication -Integrity -Operational security -Confidentiality – yes -Authentication - no - Integrity - no - Operational security - no

Cryptography Asymmetric Which goal are fulfilled from A to B (A private Key) ? -Confidentiality -Authentication -Integrity -Operational security -Confidentiality – no - Authentication - yes - Integrity - yes - Operational Security - no

Cryptography Asymmetric Can we fulfilled both -Confidentiality and -Authentication -Integrity ? YES – encode with A private key and then with B public key i.e. twice

Cryptography Asymmetric Implementations: – RSA – most known key length recommended 1024bit / soon becoming 2048bit – (768 bit brute force within days (2010))

Cryptography Asymmetric Key exchange: – Problem to exchange the key - public key are public to everyone - But do we believe the sender of the key – Using Certification - I believe in some Certification Authorities e.g. VeriSign, Thrust, (in DK TDC) - get the public key from one of those trusted third part companies.

Cryptography Asymmetric To fulfilled the goal you must encode 2 times (A private and B public) A more easy way is to create a Message Digest (MD) a sort of a checksum And this ‘checksum’ are encoded with A’s private key (Digital Signature). Then the whole message + the MD are encoded with B’s public key

Cryptography Asymmetric For authentication – Message Authentication Code (MAC) Both sides – shared secret (s) Send m + H(m+s) Check m+s hached == H(m+s) – Fill with Nonsens

Cryptography Mixed Using asymmetric keys to exchange a symmetric key for rest of this session. This increase the speed of encryption and decryption.