Symmetric and Asymmetric Ciphers. Symmetric Encryption  or conventional / private-key / single-key  sender and recipient share a common key  all classical.

Slides:



Advertisements
Similar presentations
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Advertisements

Cryptography and Network Security Chapter 9
Sri Lanka Institute of Information Technology
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
1 Chapter 13 – Digital Signatures & Authentication Protocols Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
Public Key Algorithms …….. RAIT M. Chatterjee.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Confidentiality using Symmetric Encryption traditionally symmetric encryption is used to provide message confidentiality consider typical scenario –workstations.
Cryptography and Network Security Chapter 9 Fourth Edition by William Stallings.
Cryptography and Network Security Chapter 11. Chapter 11 – Message Authentication and Hash Functions At cats' green on the Sunday he took the message.
Cryptography and Network Security Chapter 11 Fourth Edition by William Stallings.
Cryptography and Network Security Chapter 9. Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively.
Public Key Cryptography and the RSA Algorithm
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
Cryptography and Network Security Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown/Mod. & S. Kondakci.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Chapter 9 – Public Key Cryptography and RSA Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both.
Cryptography and Network Security Chapter 9 5th Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 2 – Classical Encryption Techniques
Introduction to Public Key Cryptography
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Prime Numbers Prime numbers only have divisors of 1 and self
Public Key Cryptography and the RSA Algorithm Cryptography and Network Security by William Stallings Lecture slides by Lawrie Brown Edited by Dick Steflik.
Cryptography and Network Security (CS435)
Message Authentication  message authentication is concerned with: protecting the integrity of a message protecting the integrity of a message validating.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 Chapter 11: Message Authentication and Hash Functions Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Data Security and Encryption (CSE348) 1. Lecture # 15 2.
Network Security Lecture 17 Presented by: Dr. Munam Ali Shah.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Fall 2002CS 395: Computer Security1 Chapter 11: Message Authentication and Hash Functions.
1 Public-Key Cryptography and Message Authentication.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 11 Message Authentication and Hash Functions.
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Public Key Cryptography and RSA.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Cryptography and Network Security (CS435) Part Nine (Message Authentication)
Cryptography and Network Security Chapter 9 Fourth Edition by William Stallings.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively as the true name and the good name, or the.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Dr. Nermin Hamza.  Attacks:  Traffic Analysis : traffic analysis occurs when an eavesdroppers observes message traffic on network. Not understand the.
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
CSCE 715: Network Systems Security
Introduction Of System Security
CSCI-235 Micro-Computer Applications
Chapter 11 – Message Authentication and Hash Functions
NET 311 Information Security
Basic of Modern Cryptography
Presentation transcript:

Symmetric and Asymmetric Ciphers

Symmetric Encryption  or conventional / private-key / single-key  sender and recipient share a common key  all classical encryption algorithms are private-key  was only type prior to invention of public- key in 1970’s  and by far most widely used

Some Basic Terminology  plaintext - original message  ciphertext - coded message  cipher - algorithm for transforming plaintext to ciphertext  key - info used in cipher known only to sender/receiver  encipher (encrypt) - converting plaintext to ciphertext  decipher (decrypt) - recovering ciphertext from plaintext  cryptography - study of encryption principles/methods  cryptanalysis (codebreaking) - study of principles/ methods of deciphering ciphertext without knowing key  cryptology - field of both cryptography and cryptanalysis

Symmetric Cipher Model

Requirements  two requirements for secure use of symmetric encryption: a strong encryption algorithm a strong encryption algorithm a secret key known only to sender / receiver a secret key known only to sender / receiver  mathematically have: Y = E K (X) X = D K (Y)  assume encryption algorithm is known  implies a secure channel to distribute key

Cryptography  characterize cryptographic system by: type of encryption operations used type of encryption operations used substitution / transposition / productsubstitution / transposition / product number of keys used number of keys used single-key or private / two-key or publicsingle-key or private / two-key or public way in which plaintext is processed way in which plaintext is processed block / streamblock / stream

Cryptanalysis  objective to recover key not just message  general approaches: cryptanalytic attack cryptanalytic attack brute-force attack brute-force attack

More Definitions  unconditional security no matter how much computer power or time is available, the cipher cannot be broken since the ciphertext provides insufficient information to uniquely determine the corresponding plaintext no matter how much computer power or time is available, the cipher cannot be broken since the ciphertext provides insufficient information to uniquely determine the corresponding plaintext  computational security given limited computing resources (eg time needed for calculations is greater than age of universe), the cipher cannot be broken given limited computing resources (eg time needed for calculations is greater than age of universe), the cipher cannot be broken

Brute Force Search  always possible to simply try every key  most basic attack, proportional to key size  assume either know / recognise plaintext Key Size (bits)Number of Alternative Keys Time required at 1 decryption/µs Time required at 10 6 decryptions/µs = 4.3  µs= 35.8 minutes2.15 milliseconds = 7.2  µs= 1142 years10.01 hours = 3.4  µs= 5.4  years5.4  years = 3.7  µs= 5.9  years5.9  years 26 characters (permutation) 26! = 4   µs= 6.4  years6.4  10 6 years

Confidentiality using Symmetric Encryption  traditionally symmetric encryption is used to provide message confidentiality

Placement of Encryption  have two major placement alternatives  link encryption encryption occurs independently on every link encryption occurs independently on every link implies we must decrypt traffic between links implies we must decrypt traffic between links requires many devices, but paired keys requires many devices, but paired keys  end-to-end encryption encryption occurs between original source and final destination encryption occurs between original source and final destination needs devices at each end with shared keys needs devices at each end with shared keys

Placement of Encryption

 when using end-to-end encryption must leave headers in clear so network can correctly route information so network can correctly route information  hence although contents protected, traffic pattern flows are not  ideally want both at once end-to-end protects data contents over entire path and provides authentication end-to-end protects data contents over entire path and provides authentication link protects traffic flows from monitoring link protects traffic flows from monitoring

Traffic Analysis  is monitoring of communications flows between parties useful both in military & commercial spheres useful both in military & commercial spheres can also be used to create a covert channel can also be used to create a covert channel  link encryption obscures header details but overall traffic volumes in networks and at end-points is still visible but overall traffic volumes in networks and at end-points is still visible  traffic padding can further obscure flows but at cost of continuous traffic but at cost of continuous traffic

Key Distribution  symmetric schemes require both parties to share a common secret key  issue is how to securely distribute this key  often secure system failure due to a break in the key distribution scheme

Key Distribution  given parties A and B have various key distribution alternatives: 1. A can select key and physically deliver to B 2. third party can select & deliver key to A & B 3. if A & B have communicated previously can use previous key to encrypt a new key 4. if A & B have secure communications with a third party C, C can relay key between A & B

Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both sender and receiver  if this key is disclosed communications are compromised  also is symmetric, parties are equal  hence does not protect sender from receiver forging a message & claiming is sent by sender

Public-Key Cryptography  probably most significant advance in the 3000 year history of cryptography  uses two keys – a public & a private key  asymmetric since parties are not equal  uses clever application of number theoretic concepts to function  complements rather than replaces private key crypto

Why Public-Key Cryptography?  developed to address two key issues: key distribution – how to have secure communications in general without having to trust a KDC with your key key distribution – how to have secure communications in general without having to trust a KDC with your key digital signatures – how to verify a message comes intact from the claimed sender digital signatures – how to verify a message comes intact from the claimed sender  public invention due to Whitfield Diffie & Martin Hellman at Stanford Uni in 1976 known earlier in classified community known earlier in classified community

Public-Key Cryptography  public-key/two-key/asymmetric cryptography involves the use of two keys: a public-key, which may be known by anybody, and can be used to encrypt messages, and verify signatures a public-key, which may be known by anybody, and can be used to encrypt messages, and verify signatures a private-key, known only to the recipient, used to decrypt messages, and sign (create) signatures a private-key, known only to the recipient, used to decrypt messages, and sign (create) signatures  is asymmetric because those who encrypt messages or verify signatures cannot decrypt messages or create signatures those who encrypt messages or verify signatures cannot decrypt messages or create signatures

Public-Key Cryptography

Public-Key Characteristics  Public-Key algorithms rely on two keys where: it is computationally infeasible to find decryption key knowing only algorithm & encryption key it is computationally infeasible to find decryption key knowing only algorithm & encryption key it is computationally easy to en/decrypt messages when the relevant (en/decryption) key is known it is computationally easy to en/decrypt messages when the relevant (en/decryption) key is known either of the two related keys can be used for encryption, with the other used for decryption (for some algorithms) either of the two related keys can be used for encryption, with the other used for decryption (for some algorithms)

Public-Key Cryptosystems

Public-Key Applications  can classify uses into 3 categories: encryption/decryption (provide secrecy) encryption/decryption (provide secrecy) digital signatures (provide authentication) digital signatures (provide authentication) key exchange (of session keys) key exchange (of session keys)  some algorithms are suitable for all uses, others are specific to one

Security of Public Key Schemes  like private key schemes brute force exhaustive search attack is always theoretically possible  but keys used are too large (>512bits)  security relies on a large enough difference in difficulty between easy (en/decrypt) and hard (cryptanalyse) problems  more generally the hard problem is known, but is made hard enough to be impractical to break  requires the use of very large numbers  hence is slow compared to private key schemes

Message Authentication  message authentication is concerned with: protecting the integrity of a message protecting the integrity of a message validating identity of originator validating identity of originator non-repudiation of origin (dispute resolution) non-repudiation of origin (dispute resolution)  will consider the security requirements  then three alternative functions used: message encryption message encryption message authentication code (MAC) message authentication code (MAC) hash function hash function

Message Encryption  message encryption by itself also provides a measure of authentication  if symmetric encryption is used then: receiver knows sender must have created it since only sender and receiver know key used receiver knows sender must have created it since only sender and receiver know key used content cannot bee altered content cannot bee altered if message has suitable structure, redundancy or a checksum to detect any changes if message has suitable structure, redundancy or a checksum to detect any changes

Message Encryption  if public-key encryption is used: encryption provides no confidence of sender encryption provides no confidence of sender since anyone potentially knows public-key since anyone potentially knows public-key however if however if sender signs message using their private-key, then encrypts with recipients public key, we have both secrecy and authenticationsender signs message using their private-key, then encrypts with recipients public key, we have both secrecy and authentication again need to recognize corrupted messages again need to recognize corrupted messages but at cost of two public-key uses on message but at cost of two public-key uses on message

Message Authentication Code (MAC)  generated by an algorithm that creates a small fixed-sized block depending on both message and some key depending on both message and some key like encryption though need not be reversible like encryption though need not be reversible  appended to message as a signature  receiver performs same computation on message and checks it matches the MAC  provides assurance that message is unaltered and comes from sender

Message Authentication Code

Message Authentication Codes  as shown the MAC provides authentication  can also use encryption for secrecy generally uses separate keys for each generally uses separate keys for each can compute MAC either before or after encryption can compute MAC either before or after encryption is generally regarded as better done before is generally regarded as better done before  why use a MAC? sometimes only authentication is needed sometimes only authentication is needed sometimes we need authentication to persist longer than the encryption (eg. archival use) sometimes we need authentication to persist longer than the encryption (eg. archival use)  note that a MAC is not a digital signature

Digital Signatures  have looked at message authentication but does not address issues of lack of trust but does not address issues of lack of trust  digital signatures provide the ability to: verify author, date & time of signature verify author, date & time of signature authenticate message contents authenticate message contents be verified by third parties to resolve disputes be verified by third parties to resolve disputes  hence include authentication function with additional capabilities

Digital Signature Properties  must depend on the message signed  must use information unique to sender to prevent both forgery and denial to prevent both forgery and denial  must be relatively easy to produce  must be relatively easy to recognize & verify  be computationally infeasible to forge with new message for existing digital signature with new message for existing digital signature with fraudulent digital signature for given message with fraudulent digital signature for given message  be practical save digital signature in storage

Direct Digital Signatures  involve only sender & receiver  assumed receiver has sender’s public-key  digital signature made by sender signing entire message or hash with private-key  can encrypt using receivers public-key  important that sign first then encrypt message & signature  security depends on sender’s private-key

Arbitrated Digital Signatures  involves use of arbiter A validates any signed message validates any signed message then dated and sent to recipient then dated and sent to recipient  requires suitable level of trust in arbiter  can be implemented with either private or public-key algorithms  arbiter may or may not see message

Authentication Protocols  used to convince parties of each others identity and to exchange session keys  may be one-way or mutual  key issues are confidentiality – to protect session keys confidentiality – to protect session keys timeliness – to prevent replay attacks timeliness – to prevent replay attacks  published protocols are often found to have flaws and need to be modified