Modern Cryptographic Topics

Slides:



Advertisements
Similar presentations
Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
Advertisements

CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
7. Asymmetric encryption-
CS426Fall 2010/Lecture 351 Computer Security CS 426 Lecture 35 Commitment & Zero Knowledge Proofs.
Public Key Algorithms …….. RAIT M. Chatterjee.
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
Elliptic Curve Cryptography (ECC) Mustafa Demirhan Bhaskar Anepu Ajit Kunjal.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Public Key Cryptography
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Public Key Algorithms 4/17/2017 M. Chatterjee.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Lecture 24 Cryptography CPE 401 / 601 Computer Network Systems slides are modified from Jim Kurose and Keith Ross and Dave Hollinger.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Diffie-Hellman Key Exchange
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
Codes, Ciphers, and Cryptography-RSA Encryption
Lecture 6: Public Key Cryptography
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
Topic 22: Digital Schemes (2)
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Midterm Review Cryptography & Network Security
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Introduction to Modern Cryptography Sharif University Spring 2015 Data and Network Security Lab Sharif University of Technology Department of Computer.
1 Simple and Unbreakable: The Mathematics of Internet Security Dr. Monica Nevins Department of Mathematics and Statistics University of Ottawa University.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Security and Cryptography: basic aspects Ortal Arazi College of Engineering Dept. of Electrical & Computer Engineering The University of Tennessee.
Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012.
CSE 331: Introduction to Networks and Security Fall 2001 Instructor: Carl A. Gunter Encrypted Knock Knock.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Software Security Seminar - 1 Chapter 4. Intermediate Protocols 발표자 : 이장원 Applied Cryptography.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Cryptography CS Lecture 19 Prof. Amit Sahai.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Bit Commitment, Fair Coin Flips, and One-Way Accumulators Matt Ashoff 11/9/2004 Cryptographic Protocols.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Problem Set 1: Cryptography.
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
PART VII Security.
Presentation transcript:

Modern Cryptographic Topics Dimitri DeFigueiredo defigueiredo@ucdavis.edu University of California, Davis Department of Computer Science

Overview Security Cryptography Computer Security Network Security

Historical Background Encryption Alice Bob Encrypt Decrypt M C M’ K Kerkhoffs’ Principle 1883

Time Line 300 – Caesar Cipher 1883 – Kerkhoffs “La Cryptographie Militaire” 1939 – Enigma 1975 – DES 1976 – Diffie-Hellman Asymmetric Encryption 1978 – RSA 1984 – Goldwasser Micali Provable Security

Modern Cryptology Cryptography and Cryptanalysis Goals: Encryption Authentication others (secret sharing, commitments, ZK)

Using a One-way function. Motivation How do we flip a coin over the phone? Using a One-way function. x f(x) Easy Hard Do they exist?

Asymmetric Encryption Diffie-Hellman 1976 Alice Bob Encrypt Decrypt M C M’ Bob’s Public key Bob’s Private Key

The man-in-the-middle attack Playing chess: man in the middle Karpov Kasparov

The Attack Model What does the adversary do? What can the adversary do? Computationally bounded/unbounded Passive/Active Has side information? Give the adversary as much power as possible.

Raw RSA Encryption Setup: Choose 2 large primes: p, q Calculate n = p  q Randomly choose e ( e not divisible by (n) ) Calculate: d such that: d  e  1 mod (n) Public key = (n,e) Private key = (n,d)

Raw RSA Encryption Setup: Choose 2 large primes: 7, 17 Calculate n = 7  17 = 119 (n) = (p -1)(q -1) = 6  16 = 96 Randomly choose e = 5 ( 5 is not divisible by 96 ) Calculate: d such that: d  e  1 mod (n) d = 77 (because 77  5 = 385 = 4  96 + 1) Public key = (119, 5) Private key = (119, 77)

Cd mod n = (Me)d mod n = M1 mod n Raw RSA Encryption Encryption: C = Me mod n Decryption M = Cd mod n because Cd mod n = (Me)d mod n = M1 mod n

Raw RSA Encryption Example: Public key = (119, 5) Private key = (119, 77) (M must be smaller than n) M = 19, Encryption: C = Me mod n = 195 mod 119 = 66 Decryption M = Cd mod n = 6677 mod 119 = 19

Commitment schemes Back to fair coin flipping. Draft protocol: 1. A chooses random ba 2. B chooses random bb 3. AB: commitment( ba ) 4. BA: bb 5. A : opens commitment. 6. Both A and B calculate (ba  bb)

Commitment Schemes Using RSA: Choose random bit of either 0 or 1. Encrypt random value with public key. C = Eku(M) Send ciphertext. To open commitment decrypt.

Fair Coin Flipping Draft Protocol: assumes underlying PKI RSA can be used as commitment randomness needed!

Provable Security Precise definitions. Reduction based. Builds adversaries using black box paradigm. Example: If adversary can cheat when flipping coin than we can use it to break RSA.

Zero Knowledge Proofs Cut-and-choose paradigm. V P