Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.

Slides:



Advertisements
Similar presentations
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
NSRC Workshop Some fundamental security concerns... Confidentiality - could someone else read my data? Integrity - has my data been changed? Authentication.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Introduction to Signcryption November 22, /11/2004 Signcryption Public Key (PK) Cryptography Discovering Public Key (PK) cryptography has made.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
03 December 2003 Public Key Infrastructure and Authentication Mark Norman DCOCE Oxford University Computing Services.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Computer Science Public Key Management Lecture 5.
Introduction to Public Key Cryptography
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
Public Key Cryptography July Topics  Symmetric and Asymmetric Cryptography  Public Key Cryptography  Digital Signatures  Digital Certificates.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Lecture 18 Page 1 CS 111 Spring 2015 Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 Operating Systems.
May 2002Patroklos Argyroudis1 A crash course in cryptography and network security Patroklos Argyroudis CITY Liberal Studies.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Cryptography, Authentication and Digital Signatures
Public-Key Cryptography CS110 Fall Conventional Encryption.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Lecture 4 Page 1 CS 136, Fall 2014 More on Cryptography CS 136 Computer Security Peter Reiher October 14, 2014.
Lecture 4 Page 1 CS 136, Fall 2012 More on Cryptography CS 136 Computer Security Peter Reiher October 9, 2012.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Lecture 2: Introduction to Cryptography
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
14-1 Last time Internet Application Security and Privacy Basics of cryptography Symmetric-key encryption.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Lecture 17 Page 1 CS 111 Fall 2015 Operating System Security CS 111 Operating Systems Peter Reiher.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Lecture 2 Page 1 CS 236, Spring 2008 More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 5 Page 1 CS 236 Online Public Key Encryption Systems The encrypter and decrypter have different keys C = E(K E,P) P = D(K D,C) Often, works the.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Encryption Encryption: Transforms Message so that Interceptor Cannot Read it –Plaintext (original message) Not necessarily text; Can be graphics, etc.
INCS 741: Cryptography Overview and Basic Concepts.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
ENGR 101 Compression and Encryption. Todays Lecture  Encryption  Symmetric Ciphers  Public Key Cryptography  Hashing.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Web Applications Security Cryptography 1
Cryptography Much of computer security is about keeping secrets
Public Key Encryption Systems
Outline Desirable characteristics of ciphers Uses of cryptography
Outline Desirable characteristics of ciphers Uses of cryptography
Security through Encryption
Introduction to Symmetric-key and Public-key Cryptography
Public Key Encryption Systems
Public Key Encryption Systems
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Outline Introduction Authentication Access control Cryptography.
Presentation transcript:

Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations

Lecture 19 Page 2 CS 111 Online Advantages of Symmetric Cryptosystems +Encryption and authentication performed in a single operation +Well-known (and trusted) ones perform much faster than asymmetric key systems +No centralized authority required Though key servers help a lot

Lecture 19 Page 3 CS 111 Online Disadvantages of Symmetric Cryptosystems –Encryption and authentication performed in a single operation Makes signature more difficult –Non-repudiation hard without servers –Key distribution can be a problem –Scaling –Especially for Internet use

Lecture 19 Page 4 CS 111 Online Some Popular Symmetric Ciphers The Data Encryption Standard – The old US encryption standard – Still fairly widely used, due to legacy – Kind of weak by modern standards The Advanced Encryption Standard – The current US encryption standard – Probably the most widely used cipher Blowfish There are many, many others

Lecture 19 Page 5 CS 111 Online Symmetric Ciphers and Brute Force Attacks If your symmetric cipher has no flaws, how can attackers crack it? Brute force – try every possible key until one works The cost of brute force attacks depends on key length – Assuming random choice of key – For N possible keys, attack must try N/2 keys, on average, before finding the right one

Lecture 19 Page 6 CS 111 Online How Long Are the Keys? DES used 56 bit keys – Brute force attacks on that require a lot of time and resources – But they are demonstrably possible – Attackers can thus crack DES, if they really care AES uses either 128 bit or 256 bit keys – Even the shorter key length is beyond the powers of brute force today – decryption attempts is still a lot, by any standard

Lecture 19 Page 7 CS 111 Online Asymmetric Cryptosystems Often called public key cryptography – Or PK, for short The encrypter and decrypter have different keys – C = E(K E,P) – P = D(K D,C) Often works the other way, too – C ’ = E(K D,P) – P = D(K E,C ’ )

Lecture 19 Page 8 CS 111 Online Using Public Key Cryptography Keys are created in pairs One key is kept secret by the owner The other is made public to the world – Hence the name If you want to send an encrypted message to someone, encrypt with his public key – Only he has private key to decrypt

Lecture 19 Page 9 CS 111 Online Authentication With Public Keys If I want to “sign” a message, encrypt it with my private key Only I know private key, so no one else could create that message Everyone knows my public key, so everyone can check my claim directly Much better than with symmetric crypto – The receiver could not have created the message – Only the sender could have

Lecture 19 Page 10 CS 111 Online PK Key Management To communicate via shared key cryptography, key must be distributed – In trusted fashion To communicate via public key cryptography, need to find out each other’s public key – “Simply publish public keys” Not really that simple, for most cases

Lecture 19 Page 11 CS 111 Online Issues With PK Key Distribution Security of public key cryptography depends on using the right public key If I am fooled into using wrong one, that key’s owner reads my message Need high assurance that a given key belongs to a particular person – Either a key distribution infrastructure – Or use of certificates Both are problematic, at high scale and in the real world

Lecture 19 Page 12 CS 111 Online The Nature of PK Algorithms Usually based on some problem in mathematics – Like factoring extremely large numbers Security less dependent on brute force More on the complexity of the underlying problem

Lecture 19 Page 13 CS 111 Online Choosing Keys for Asymmetric Ciphers For symmetric ciphers, the key can be any random number of the right size – You can’t do that for asymmetric ciphers Only some public/private key pairs “work” – Generally, finding a usable pair takes a fair amount of time – E.g., for RSA you perform operations on digit prime numbers to get keys You thus tend to use one public/private key pair for a long time – Issues of PK key distribution and typical usage also suggest long lifetimes for these keys

Lecture 19 Page 14 CS 111 Online Example Public Key Ciphers RSA – The most popular public key algorithm – Used on pretty much everyone’s computer, nowadays Elliptic curve cryptography – Not as widely used as RSA – Tends to have better performance – Not as widely used or studied

Lecture 19 Page 15 CS 111 Online Security of PK Systems Based on solving the underlying problem – E.g., for RSA, factoring large numbers In 2009, a 768 bit RSA key was successfully factored Research on integer factorization suggests keys up to 2048 bits may be insecure – In 2013, Google went from 1024 to 2048 bit keys Size will keep increasing The longer the key, the more expensive the encryption and decryption

Lecture 19 Page 16 CS 111 Online Combined Use of Symmetric and Asymmetric Cryptography Very common to use both in a single session Asymmetric cryptography essentially used to “bootstrap” symmetric crypto Use RSA (or another PK algorithm) to authenticate and establish a session key Use DES or AES with session key for the rest of the transmission

Lecture 19 Page 17 CS 111 Online For Example, AliceBob K EA K DA K EB K DB K DA K DB KSKS Alice wants to share K S only with Bob Bob wants to be sure it’s Alice’s key C=E(K S,K DB ) Only Bob can decrypt it M=E(C,K EA ) Only Alice could have created it MC=D(M,K DA ) K S =D(C,K EB ) Why is this important?

Lecture 19 Page 18 CS 111 Online Secure Hash Algorithms A method of protecting data from modification Doesn’t actually prevent modification But gives strong evidence that modification did or didn’t occur Typically used with other cryptographic techniques – Like digital signatures, a method of using cryptography to sign something

Lecture 19 Page 19 CS 111 Online Idea Behind Secure Hashes Apply a one-way cryptographic function to data in question Producing a much shorter result Save the cryptographic hash – Or, for messages, send it with the message To check for tampering, repeat the function on the data and compare to the hash value If attacker can get at the hash, often you also encrypt it