COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

IS 302: Information Security and Trust Week 4: Asymmetric Encryption
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
CSE331: Introduction to Networks and Security Lecture 19 Fall 2002.
Public Key Encryption Algorithm
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Lecture 5 Overview Does DES Work? Differential Cryptanalysis Idea – Use two plaintext that barely differ – Study the difference in the corresponding.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 12 Cryptography (slides edited by Erin Chambers)
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
The RSA Algorithm Rocky K. C. Chang, March
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Problems with symmetric (private-key) encryption 1) secure distribution of keys 2) large number of keys Solution to both problems: Public-key (asymmetric)
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Midterm Review Cryptography & Network Security
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Strength of Cryptographic Systems Dr. C F Chong, Dr. K P Chow Department of Computer Science and Information Systems The University of Hong Kong.
Darci Miyashiro Math 480 April 29, 2013
1 Public-Key Cryptography and Message Authentication.
Computer and Network Security Rabie A. Ramadan Lecture 6.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Lecture 8 Overview. Analysis of Algorithms Algorithms – Time Complexity – Space Complexity An algorithm whose time complexity is bounded by a polynomial.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Lecture 2 Page 1 CS 236, Spring 2008 More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
DES: Data Encryption Standard
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Encryption Encryption: Transforms Message so that Interceptor Cannot Read it –Plaintext (original message) Not necessarily text; Can be graphics, etc.
RSA Cryptosystem Great Theoretical Ideas In Computer Science S. Rudich V. Adamchik CS Spring 2006 Lecture 8Feb. 09, 2006Carnegie Mellon University.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Public Key Cryptography
CS480 Cryptography and Information Security
Cryptography Much of computer security is about keeping secrets
Public Key Encryption Systems
Public Key Encryption and Digital Signatures
Outline Desirable characteristics of ciphers Uses of cryptography
Outline Desirable characteristics of ciphers Uses of cryptography
Lecture 3: Symmetric Key Encryption
Security through Encryption
Appendix 5: Cryptography p
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
Public Key Encryption Systems
Presentation transcript:

COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)

Secret Key Systems ● A message M, encrypted with key K is denoted as [M] K. ● Decryption is done with the same key and denoted: [[M] K ] K = M. ● The basic disadvantage to these systems is a problem of combinatorics.

Public Key Systems ● A message M, from A to B is encrypted with B's public key and decrypted with B's private key. – Anyone and everyone can know B's public key. ● The encrypted message is denoted: [M] KBpub. ● The decryption is denoted: [[M] KBpub ] KBpriv = M. ● What the advantages and disadvantages?

Can Provide Authentication ● Reverse the use of the keys (encrypt with private and decrypt with public) and you can now authenticate who sent the message. ● [[M] KBpriv ] KBpub = M – If B is the only person who holds the key Kbpriv then only B could have been the person to have encrypted M.

Increasing Confiedentiality ● A message from A to B could be encrypted as: [[M] KApriv ] KBpub = M ● Decryption: [[M] KBpriv ] KApub = M ● Where: [[[[M] KApriv ] KBpub ] KBpriv ] KApub = M ● Wouldn't such a system be neat... ● (Not all asymmetric key cryptosystems have the propery: [[M] KBpriv ] KBpub = M

Rivest-Shamir-Adelman (MIT 1977) ● Based on mathematical number theory. ● Relies on the underlying Number Theory of difficulty of determining multiplicative factors (prime numbers). ● Large numbers are extremely difficult to factor. ● Will this always be true? (probably not) – Moore's law (possibly) – Quantum / non-deterministic computing (probably)

RSA Basic property ● Given two (related) keys, e and d the basics of the RSA cryptosystem is: – P = E(e, D(d, P)) = D(d, E(e, P)) ● That is to say that if we encrypt with e we can decrypt with d and if we encrypt with d we can decrypt with e. ● Math: and ● Because the exponentiation of P is performed mod n it is difficult to factor to recover plaintext

RSA details – Select two large prime numbers p and q about 100 digits in length – Compute n = pq and psi=(p-1)(q-1) – Choose an integer E between 3 and psi which has no common factors with psi – Select an integer D, such that DE differs from 1 by a multiple of psi – Make E and n public but keep p, q, D and psi private.

Some Problems ● Compromised keys can be used for masquerading and disclosure attacks ● Key distribution can be complex ● Not scalable in large systems ● Many secret (symmetric) key systems are weak compared to PKI (Public Key Infrastructure) approaches.

DES Overview – Early 1970s (1972 died, 1974, 1976 adopted) – Targeted for public cryptography – Efficient and unbreakable – Easy to understand – Publishable – Availability – Economical – Exportable

DES (IBM's lucifer) ● Combination of – Substitution – Transposition ● 16 cycles of each ● Processes plain text in blocks of 64 bits (56data bits plus 8 checking bits) ● Uses only standard arithmetic and logic – (RSA uses 500 and 1000 bit arithmetic operations.)

Unbreakable?? ● Since 1976 (biven Moore's law) computers have increased in speed 2 18 fold. (262,144 times) ● DES 56-bit is no longer considered secure. ● Solutions? – Use keys longer than 56bits? – Well... no. The DES algorithm is fixed at 56 bits. The nature of the algorithm requires it.

Double DES ● Use two keys k1 and k2 and perform the encryption E(k 2,E(k 1,P)) ● Should be doubly strong just as two locks are harder to pick than one right? ● Wrong. Because of the nature of the DES algorithm the work required to crack the encryption increases from 2 56 to just ● Not worth the effort.

Triple DES (3DES) ● A simple trick solves the problem... ● C = E(k 1,D(k 2,E(k 1,P)))

Differential Cryptanalysis ● Biham and Shamir, 1990 ● A method that investigates the change in cryptographic strength when a change is made to the encryption algorithm – Almost any change made to the DES algorithm weakens it. – Is DES optimal then? Possibly but the point is moot...

Breaking DES ● 1997: 3,500 machines where used to infer a DES key. It required four months to do so. ● 1998: special hardware (DES cracker) was construced at a cost of $100,000 and could find a DES key in just four days. ● So its still rather secure because the resources to break it are still rather expensive. But it is certainly on the verge of being obsolete. ● 3DES is still pretty good bits effectively.

Future... ● AES: Rijndael