CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.

Slides:



Advertisements
Similar presentations
Sri Lanka Institute of Information Technology
Advertisements

CMSC 414 Computer (and Network) Security Lecture 4 Jonathan Katz.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
Intro 1 Introduction Intro 2 Good Guys and Bad Guys  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Lecture 2.1: Private Key Cryptography -- I CS 436/636/736 Spring 2013 Nitesh Saxena.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
CMSC 414 Computer (and Network) Security Lecture 5 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CS470, A.SelcukIntroduction1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Computer Security CS 426 Lecture 3
A Cryptography Tutorial Jim Xu College of Computing Georgia Tech
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
CIS 5371 Cryptography Introduction.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Asymmetric-Key Cryptography Also known as public-key cryptography, performs encryption and decryption with two different algorithms. Each node announces.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Cryptography, Authentication and Digital Signatures
Network Security Section 1: Introduction to security.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
Cryptograpy By Roya Furmuly W C I H D F O P S L 7.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Overview of Cryptography & Its Applications
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CS555Spring 2012/Topic 31 Cryptography CS 555 Topic 3: One-time Pad and Perfect Secrecy.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
INCS 741: Cryptography Overview and Basic Concepts.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Modeling security 1. Models - encryption r Alice and Bob have the same key k r Alice and Bob exchange encrypted messages r Eve wants to get the plaintext.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
CMSC 414 Computer (and Network) Security Lecture 3 Jonathan Katz.
Cryptography Lecture 2.
Topic 3: Perfect Secrecy
Cryptography Lecture 9.
Cryptography Lecture 2.
Symmetric Encryption or conventional / private-key / single-key
Cryptography Lecture 23.
Presentation transcript:

CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz

Why things are not quite so bad…  In practice, we do have trust (unlike Thompson’s article)  We have made great strides in computer security over the past decades –As security improvements are made, ever more functionality is desired –People unwilling to trade off openness for security  (Arguably) many of the most significant problems are no longer technical –User education –Policy issues

Assigned readings -- discussion  “Inside the Twisted Mind of the Security Professional” –Security mindset…  “We are All Security Customers” –Cost-benefit analysis  “Information Security and Externalities” –Security as an economics problem; liability

CIA Triad [FIPS PUB 199]  Confidentiality/secrecy –Restrictions on information access and disclosure, including personal privacy  Integrity –Guarding against improper modification or destruction of information; ensuring non-repudiation and (source) authenticity  Availability –Ensuring timely and reliable access to information and resources

Other?  Improper resource usage  Entity authentication

A high-level survey of cryptography

Caveats  Everything I present will be (relatively) informal –I may simplify, but I will not say anything that is an outright lie…  Cryptography offers formal definitions and rigorous proofs of security (neither of which we will cover here) –For more details, take CMSC 456 in the Fall (or read my book)!  If you think you already know cryptography from somewhere else (CMSC 456 in the spring, CISSP, your job), you are probably mistaken

Goals of cryptography  Crypto deals primarily with three goals: –Confidentiality –Integrity (of data) –Authentication (of resources, people, systems)  Other goals also considered –E.g., non-repudiation –E-cash (e.g., double spending) –Secure distributed computation –Anonymity –…–…

Private- vs. public-key settings  There are two settings for cryptography: –Private-key / shared-key / symmetric-key / secret-key –Public-key  The private-key setting is the “classical” one (thousands of years old)  The public-key setting dates to the 1970s

Private-key cryptography  The communicating parties share some information that is random and secret –This shared information is called a key –Key is completely unknown to an attacker –Key is uniformly random  The key k must be shared in advance –We don’t discuss (for now) how they do this –You can imagine they meet on a dark street corner and Alice hands a USB device (with a key on it) to Bob

Canonical applications  Two (or more) distinct parties communicating over an insecure network –E.g., secure communication  A single party who is communicating “with itself” over time –E.g., secure storage

Alice Bob shared info K K Alice K Bob K

K K

Private-key cryptography  Two complementary goals: –Secrecy and integrity  For secrecy: –Private-key encryption  For integrity: –Message authentication codes

Attacker types  Passive eavesdropping vs. active interference  Secrecy is a concern for passive or active adversaries  Integrity is a concern for active adversaries

Private-key encryption

Functional definition  Encryption algorithm: –Takes a key and a message (plaintext), and outputs a ciphertext –c  E k (m), possibly randomized!  Decryption algorithm: –Takes a key and a ciphertext, and outputs a message (or perhaps an error) –m = D k (c)  Correctness: for all k, we have D k (E k (m)) = m  We have not yet said anything about security…

Alice Bob shared info K K Alice K Bob K c c  E K (m) m=D K (c)

Secrecy  Want secrecy against a passive eavesdropper who observed the ciphertext  This adversary does not know the key

Security through obscurity?  Always assume that the full details of crypto protocols and algorithms are public –Known as Kerckhoffs’s principle –The only secret information is the key  “Security through obscurity” is a bad idea… –True in general; even more true in the case of cryptography –Home-brewed solutions are BAD! –Standardized, widely-accepted solutions are GOOD!

Security through obscurity?  Why not?  Easier to maintain secrecy of a key than an algorithm –Reverse engineering –Social engineering –Insider attacks  Easier to change the key than the algorithm  In general setting, much easier to share an algorithm than for everyone to use their own

A classic example: shift cipher  Assume the English uppercase alphabet (no lowercase, punctuation, etc.) –View letters as numbers in {0, …, 25}  The key is a random letter of the alphabet  Encryption done by addition modulo 26  Is this secure? –Exhaustive key search –Automated determination of the key

Another example: substitution cipher  The key is a random permutation of the alphabet –Note: key space is huge!  Encryption done in the natural way  Is this secure? –Frequency analysis  A large key space is necessary, but not sufficient, for security

Another example: Vigenere cipher  More complicated version of shift cipher  Believed to be secure for over 100 years  Is it secure?

Attacking the Vigenere cipher  Let p i (for i=0, …, 25) denote the frequency of letter i in English-language text –Known that Σ p i 2 ≈  For each candidate period t, compute frequencies {q i } of letters in the sequence c 0, c t, c 2t, …  For the correct value of t, we expect Σ q i 2 ≈ –For incorrect values of t, we expect Σ q i 2 ≈ 1/26  Once we have the period, can use frequency analysis as in the case of the shift cipher