COMP 424 Computer Security Lecture 09 & 10. Protocol ● An orderly sequence of steps agreed upon by two or more parties in order to accomplish a task ●

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Hash Functions A hash function takes data of arbitrary size and returns a value in a fixed range. If you compute the hash of the same data at different.
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Digital Signatures and applications Math 7290CryptographySu07.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
1 Chapter 13 – Digital Signatures & Authentication Protocols Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
Public Key Algorithms …….. RAIT M. Chatterjee.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Homework #4 Solutions Brian A. LaMacchia Portions © , Brian A. LaMacchia. This material is provided without.
UCB Security Jean Walrand EECS. UCB Outline Threats Cryptography Basic Mechanisms Secret Key Public Key Hashing Security Systems Integrity Key Management.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Key Establishment Techniques: Key Distribution and Key Agreement
Diffie-Hellman Key Exchange
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Bob can sign a message using a digital signature generation algorithm
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Key Management Celia Li Computer Science and Engineering York University.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices (Part B)
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
CIS 325: Data Communications1 Chapter Seventeen Network Security.
Computer and Network Security - Message Digests, Kerberos, PKI –
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Ch 13 Trustworthiness Myungchul Kim
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Cyber Attacks and Cryptography Overview
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Cryptography and Network Security Chapter 13
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Advanced Computer Networks
Protocol Analysis.
Computer Communication & Networks
Presented by: Dr. Munam Ali Shah
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
CDK: Chapter 7 TvS: Chapter 9
Secure Diffie-Hellman Algorithm
Presentation transcript:

COMP 424 Computer Security Lecture 09 & 10

Protocol ● An orderly sequence of steps agreed upon by two or more parties in order to accomplish a task ● Characteristics of a good protocol – Established in advance – All parties agree on it – Easy to understand – Complete: covers all that needs to be covered. – Secure: Does not permit actions that should not be allowed.

Key Management Protocols ● Key Exchange ● Done with or without a neutral third party ● Key distribution – Uses a centralized key distributor (Veri$ign) ● Key Escrow – Trusted agency holds copies of keys

Diffie-Hellman ● (does not require a third party 1) A and B exchange two numbers p and g. 2)Each chooses a 512-bit number, s1 and s2, and keeps it secret 3)Each raises g to its secret number mod p. (g s1 mod p) 4)They exchange these values and raise them to their secret numbers (g s1 mod p) s2. 5)They now have the same secret key with only one exchange.

Bucket brigade attack ● In intruder X can cause problems – A sends g KA mod p to B, but it is intercepted by X who sends g KX mod p to B. – B sends g KB mod p to A, but it is intercepted by X who sends g KX mod p to A. – X now shares a secret key with both A and B who are unaware of X – X now intercepts messages between A and B before passing them on (or not, or modifying them...)

Authentication with Digital Signatures ● A and B can use digital signatures to expose X. – A produces a hash, or fingerprint, of the message and encrypts it with A's private key. – B decrypts it with A's public key and can recompute the same hash on the message. – If it decrypts and has the same hash then ● It must have been written by A ● It could not have been changed since being written.

Properties of digital signatures ● Properties of Digital Signatures – Unforgeable – Authentic – Can't be modified once sent – Not reusable – Prevent repudiation

Key Distribution Protocols ● Key Distribution Center ● “Session” keys or long-term secret keys ● Session keys are for one session use only. ● Can use secret key (DH) or public key (RSA) protocols ● Can use authentication ● Kerberos

Key Escrow ● Encryption keys are escrowed to trustworthy agencies ● Requirements for a key escrow protocol – Encrypting source must be identified – The key is not identified – Key retrievable under k of n protocol

Clipper Encryption Protocol ● Strong public backlash – Loss of privacy from potential government intrusion – Unreleased algorithm – For Clipper k = n = 2 – Skipjack algorithm uses an 80-bit key so is considered safe for at least 36 years.

Elections ● Necessary to have untraceable (anonymous), but ligitimate communications ● Requirement for elections systems – Only authorized users – Each user can only vote once – Votes are private and secret ● Protocol uses public key encryption system