4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Sri Lanka Institute of Information Technology
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Digital Signatures and Hash Functions. Digital Signatures.
Public Key Cryptography & Message Authentication By Tahaei Fall 2012.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
EEC-484/584 Computer Networks Lecture 16 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 16 Wenbing Zhao
Chapter3 Public-Key Cryptography and Message Authentication.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
PULIC –KEY CRYPTOGRAPHY AND MESSAGE AUTHENTICATION.
Introduction to Public Key Cryptography
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Behzad Akbari Spring In the Name of the Most High.
Message Authentication  message authentication is concerned with: protecting the integrity of a message protecting the integrity of a message validating.
1 Chapter 11: Message Authentication and Hash Functions Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
I-4 security.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Network Security Lecture 17 Presented by: Dr. Munam Ali Shah.
Chapter 2: Protocol Building Blocks
Cryptography, Authentication and Digital Signatures
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Network Security David Lazăr.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
1 Public Key Cryptography. 2 Public Key Cryptography Agenda: Message authentication – authentication codes and hash functions Public key encryption –
Software Security Seminar - 1 Chapter 2. Protocol Building Blocks 발표자 : 최두호 Applied Cryptography.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Basics of Cryptography
Key Exchange References: Applied Cryptography, Bruce Schneier
Public-Key Cryptography and Message Authentication
Public-Key Cryptography and Message Authentication
Chapter 3 - Public-Key Cryptography & Authentication
Introduction to Cryptography
Presentation transcript:

4 th lecture

 Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11 (L) key = message + key = 4 (E) 16 (Q) 13 (N) 21 (V) 25 (Z) message + key (mod 26) E Q N V Z → ciphertext

 To obtain the plaintext from the ciphertext, the key is subtracted from the ciphertext using modular arithmetic. E Q N V Z ciphertext 4 (E) 16 (Q) 13 (N) 21 (V) 25 (Z) ciphertext - 23 (X) 12 (M) 2 (C) 10 (K) 11 (L) key = ciphertext - key = 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) ciphertext - key (mod 26) H E L L O → message

 Encryption  M:  K:  C: C = M (xor) K  Decryption  C:  K:  M: M = C (xor) K

 They are a fundamental building block for most of the protocols.  They are easy to compute, but hard to reverse  Given X it is easy to compute f(x), but given f(x) it is hard to compute X.  “hard” is defined as something like, it would take millions of years to compute X from f(X).

 A special type of one-way function, one with a secret trapdoor.  It is easy to compute in one direction and hard to compute in the other direction. But, if you know the secret, you can easily compute the function in the other direction.

 Message digest (MD), message integrity check (MIC), fingerprint, …  It takes a variable-length input string (pre- image) and converts it to a fixed-length output string (hash value).  It is easy to compute a hash value from pre- image, but it is hard to generate a pre-image that hashes to a particular value.

 A good one-way hash function is collision-free.  Collision-free means that, it is hard to find two pre-images that generate the same hash value.  A single bit change in the pre-image changes on the average half of the bits in the hash value.  Application: File fingerprinting.  The two most common hash functions are:  Message Digest 5 (MD5): produce 120-b digest.  Secure Hash Algorithm 1 (SHA-1): produces 160-b.

 MAC is a one-way hash function with the addition of a secret key.  Someone with the key can verify the hash value. One-way hash function Pre-image Key Hash value

Requirements - must be able to verify that: 1. Message came from apparent source or author. 2. Contents have not been altered. 3. Sometimes, it was sent at a certain time or sequence. Protection against active attacks.

 Authentication Using Conventional Encryption ◦ Only the sender and receiver should share a key  Authentication without Message Encryption ◦ An authentication tag is generated and appended to each message  Message Authentication Code ◦ Calculate the MAC as a function of the message and the key. MAC = F(K, M)

Using One-way HASH function

 Introduced by Diffie and Hellman.  Two different keys are used (public - private).  It is computationally hard to deduce the private key from the public key.  It is based on the trap-door one-way functions.  A network of users can communicate together using the public-key cryptosystem.

 Three categories: ◦ Encryption/decryption : The sender encrypts a message with the recipient’s public key. ◦ Digital signature : The sender ”signs” a message with its private key. ◦ Key echange : Two sides cooperate to exhange a session key.

1. Computationally easy for a party B to generate a pair (public key KU b, private key KR b ) 2. Easy for sender to generate 3. Easy for the receiver to decrypt ciphertect using private key: ciphertext:

4. Computationally infeasible to determine private key (KR b ) knowing public key (KU b ) 5. Computationally infeasible to recover message M, knowing KU b and ciphertext C 6. Either of the two keys can be used for encryption, with the other used for decryption:

 Public-key algorithms are slow.  Public-key cryptosystems are vulnerable to chosen-plaintext attacks: ◦ If C=E(P), and P is one plaintext out of a set of n possible plaintexts, then a cryptanalyst only has to encrypt all n possible plaintexts and compare the results with C. It is used to distribute session keys which are used with symmetric algorithms to secure messages. “This is called a hybrid cryptosystem”

 A hybrid cryptosystem can be constructed using any two separate cryptosystems:  a key encapsulation scheme, which is a public-key cryptosystem, and  a data encapsulation scheme, which is a symmetric-key cryptosystem.

To encrypt a message addressed to Alice in a hybrid cryptosystem, Bob does the following:  Obtains Alice's public key.  Generates a fresh symmetric key for the data encapsulation scheme.  Encrypts the message under the data encapsulation scheme, using the symmetric key just generated.

 Encrypt the symmetric key under the key encapsulation scheme, using Alice's public key.  Send both of these encryptions to Alice. To decrypt this hybrid ciphertext, Alice does the following:  uses her private key to decrypt the symmetric key contained in the key encapsulation segment.  uses this symmetric key to decrypt the message contained in the data encapsulation segment.

 RSA and Diffie-Hellman  RSA - Ron Rives, Adi Shamir and Len Adleman at MIT, in ◦ RSA is a block cipher ◦ The most widely implemented  Diffie-Hellman ◦ Echange a secret key securely

 Characteristics of signatures: ◦ The signature is authentic. ◦ The signature is unforgeable. ◦ The signature is not reusable. ◦ The signed document is unalterable. ◦ The signature can not be repudiated.

 There are some problems if signatures is used in computer environment (digital signature): ◦ Computer files are easy to copy. ◦ It is easy to cut and paste a valid signature from one document to another. ◦ Computer files are easy to modify after they are signed.

 Alice sends a message to Bob that includes both the plaintext “P” and an encrypted version of P, “C” using her private key. This encrypted version is her digital signature.  Bob receives the message “C” and decrypts it using her public key.  Bob compares the decrypted message and the plaintext message.

 Bob can authenticate that the message came from Alice because he decrypted it using Alice’s public key.

 if Alice and Bob are strangers who have never communicated to each other before, then the digital signature is useless for authentication. it cannot be used to authenticate the identity of the sender. In this case, a trusted third party “arbitrator” is required to authenticate the identity of the transacting parties