Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Public Key Encryption Algorithm
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
EEC-484/584 Computer Networks Lecture 16 Wenbing Zhao
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
EEC-484/584 Computer Networks Lecture 16 Wenbing Zhao
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Chapter 3 Encryption Algorithms & Systems (Part C)
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Security 2 Distributed Systems Lecture# 15. Overview Cryptography Symmetric Assymeteric Digital Signature Secure Digest Functions Authentication.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Lecture 24 Cryptography CPE 401 / 601 Computer Network Systems slides are modified from Jim Kurose and Keith Ross and Dave Hollinger.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
A Cryptography Tutorial Jim Xu College of Computing Georgia Tech
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Network Security Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Chapter 12 Cryptography (slides edited by Erin Chambers)
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
1 Public-Key Cryptography and Message Authentication.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Digital Signatures, Message Digest and Authentication Week-9.
無線網路安全 WEP. Requirements of Network Security Information Security Confidentiality Integrity Availability Non-repudiation Attack defense Passive Attack.
Lecture 2: Introduction to Cryptography
Section 3: Public Key, Digital Signature
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cryptography Deffie hellman. organization Foundations Symmetric key Symmetric key weaknesses Assymmetric key Deffie hellman – key exchange RSA – public.
Public Key Encryption and Digital Signatures
Presentation transcript:

Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)

2 Network Security l Secrecy  Keeping information out of the hands of unauthorized users l Nonrepudiation  Signature (sender cannot deny and receiver cannot concoct) l Authentication  Determining whom you are talking to before further actions l Integrity control  How can it be sure that a message received was really the one sent (not modified by intruders)

3 Cryptography l Cryptology = cryptography + cryptanalysis  Cryptography: devising ciphers  Crytoanalysis: breaking ciphers l Encryption and decryption  C = E k (P) P = D k (C)  D k (E k (P)) = P where P: plain text C: cipher K: key E and D are two-parameter functions

Encryption Model The encryption model (for a symmetric-key cipher).

5 Cryptography l Kerckhoff’s Principle  All algorithms must be public; only the keys are secret l Key  Secret and easily changed  Length is an issue  The longer the key, the higher the cyrptanalysis work factor

6 Cryptography l Secrecy = strong but public algorithm + long key l Analogy: combination lock l Two types of cryptography  Symmetric-key cryptography  Public-key cryptography

7 Symmetric-Key Cryptography l Secret keys  Used for both encryption and decryption  Decryption key is the same as or can be easily derived from encryption key  Problem: Must be distributed l Examples  DES (Data Encryption Standard)  AES (Advanced Encryption Standard)

8 Public-Key Cryptography l Use two different keys  Public key  Private key l Public key  Used by entire world to encrypt messages to be sent to that user l Private key  Needed by user to decrypt messages l Decryption key could not (or is hard to) be derived from encryption

9 Public-Key Cryptography l Requirements  D(E(P)) = P  It's exceedingly difficult to deduce D from E  E cannot be broken by a chosen plaintext attack

10 Public-Key Cryptography - Method l A wants to receive secret messages  2 algorithms are devised meeting requirements  Encryption algorithm and key, E A, are made public  Decryption algorithm is published but decryption key, D A, is secret l B wants to send secret message, P, to A  E A (P) is computed by B and then sent to A  D A (E A (P)) = P is performed by A

11 Public-Key Cryptography - RSA Algorithm l Named after Rivest, Shamir, and Adleman, 2002 Turing Award winners ( ions/rivest-shamir-adleman.html) ions/rivest-shamir-adleman.html l Based on number theory l Method  Choose two large primes, p and q  Compute n = p q and z = (p - 1)(q - 1)  Choose a number, d, relatively prime to z  Find an e such that (e d) mod z = 1

12 Public-Key Cryptography - RSA Algorithm l Encryption  Divide plaintext (bit string) into blocks  Each P  [0,n) (blocks of k bits, 2 k < n)  C = P e mod n l Decryption  P = C d mod n l Public key: (e, n) l Private key: (d, n)

13 RSA Algorithm - Example Let p = 3, q = 11  n = 33, z = 20 Choose d = 7  e = 3 Public key = (e, n) = (3,33) Private key = (d, n) = (7,33)

14 RSA Algorithm l As n and e are known, we could compute z and by factoring n, and d can then be computed … l Why does RSA work?  A large number is very difficult to factor  E.g., factoring a 500-digit number: years l If p and q chosen ~ then n ~ Each block could be up to 1024 bits (128 8-bit characters)

15 Digital Signatures l Secret-key signatures Random number generated by A, guard against “instant replay” Timestamp, guard against “very old message replay” BB’s “signature” A’s “signature” Big Brother K A : A’s secret key K B : B’s secret key A’s ID

16 Digital Signatures l Public-key signatures + secrecy

Public-Key Signatures Criticisms of DSS: 1. Too secret 2. Too slow 3. Too new 4. Too insecure

18 Digital Signatures l Authentication without secrecy l Message digests (MD)  Based on one-way hash function  Given P, it’s easy to compute MD(P)  Given MD(P), it’s effectively impossible to find P  Given P no one can find P’ s.t. MD(P’) = MD(P)  A change to the input of even 1 bit produces a very different output

l Public-key and MD 19 Digital Signatures Ensure P’s integrity, but not secrecy

20 Authentication l Secret-key authentication Random number generated by A, serve as a “challenge” Secret key shared by A and B Random number generated by B

21 Authentication l Public-key authentication Proposed session key