Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Digital Signatures and Hash Functions. Digital Signatures.
Cryptographic Security Presented by: Josh Baker October 9 th, CS5204 – Operating Systems.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Cryptography Basic (cont)
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Public Encryption: RSA
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
SCSC 455 Computer Security
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
PULIC –KEY CRYPTOGRAPHY AND MESSAGE AUTHENTICATION.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
Networks Management and Security Lecture 3.
IS 302: Information Security and Trust Week 5: Integrity 2012.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
Chapter 21 Public-Key Cryptography and Message Authentication.
Darci Miyashiro Math 480 April 29, 2013
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
×Key Distribution : Negotiation ×Key Management : N*(N-1)/2.
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Chapter 2 Advanced Cryptography (Part C)
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Class 4 Asymmetric Cryptography and Trusting Internal Components CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Information Security CS 526
Elliptic Curve Cryptography
Potential vulnerabilities of IPsec-based VPN
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Chapter 3 Public-Key Cryptography and Message Authentication.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical.
BCIS 4630 Fundamentals of IT Security
Lecture 9 Overview. RSA Invented by Cocks (GCHQ), independently, by Rivest, Shamir and Adleman (MIT) Two keys e and d used for Encryption and Decryption.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
1 Public Key Cryptography. 2 Public Key Cryptography Agenda: Message authentication – authentication codes and hash functions Public key encryption –
Cryptography Deffie hellman. organization Foundations Symmetric key Symmetric key weaknesses Assymmetric key Deffie hellman – key exchange RSA – public.
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Asymmetric-Key Cryptography
Computer Communication & Networks
Privacy & Security.
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Cryptographic Algorithms
Public Key Encryption and Digital Signatures
LAB 3: Digital Signature
Presentation transcript:

Cryptography Chapter 7 Part 3 Pages 812 to 833

Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation Scalability – N(N-1)/2 secret keys Secure key distribution – Secure courier?

Diffie-Hellman Algorithm First asymmetric Subject to man-in-the-middle attack – Figure 7-20 on page 814

RSA 1978 MIT – Ron Rivest, Adi Shamir, Leonard Adleman De facto asymmetric standard RSA works – Pages 816-7

RSA Security = difficulty in factor large numbers into a product of primes One-way function – Multiplying two primes is easy. Factoring is hard. If someone figures out an efficient way of factoring, RSA would be broken Key exchange protocol for AES

ECC Elliptic Curve Cryptosystem Discete Logarithms of Elliptic Curves Figure 7-21 on page 819 More efficient than RSA Limited processing, storage, power supply and bandwidth devices such as cellular telephones

Hash Algorithms MD-5 – 128-bits – Ron Rivest – Subject to collisions SHA-1 – 160-bits – NSA, NIST

Hash Algorithms SHA-2 – SHA-256, SHA-384, SHA-512 SHA-3 – NIST draft

Message Authentication Code MAC – Figure 7-22a on page 822 – Man-in-the-middle attack – Integrity – Can detect only unintentional modification

HMAC Hash MAC – Figure 7-22b on page 822 – Integrity and data origin authentication CBC-MAC – Figure 7-23 on page 824

Collision Two message produce the same hash value Birthday attack – Same birthday as you > 50%? 253 – Two people with same birthday > 50%? 23 2^(n/2) – SHA-1 (160-bits) 2^80

Digital Signatures Figure 7-24 on page 830 Provides authentication, non-repudiations, and integrity