Public / Private Key Example Dan Fleck CS 469: Security Engineering Coming up: Today 11.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
Network Security: Lab#2 J. H. Wang Apr. 28, 2011.
Digital Signatures and Hash Functions. Digital Signatures.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
CS 105 – Introduction to the World Wide Web  HTTP Request*  Domain Name Translation  Routing  HTTP Response*  Privacy and Cryptography  Adapted.
Tony BrettOUCS Course Code ZAB 9 February Security – Encryption and Digital Signatures Tony Brett Oxford University Computing Services February.
Electronic mail security -- Pretty Good Privacy.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Information Security. Information Security Requirements Confidentiality: Protection from disclosure to unauthorised persons Access control: Unauthorised.
Homework #5 Solutions Brian A. LaMacchia Portions © , Brian A. LaMacchia. This material is provided without.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Encryption Methods By: Michael A. Scott
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
MT311 Java Application Development and Programming Languages Li Tak Sing ( 李德成 )
Chapter 5 Digital Signatures MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Bob can sign a message using a digital signature generation algorithm
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
Electronic Mail Security
Enhancing Security with S/MIME Chuck Connell,
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
Chapter 15: Electronic Mail Security
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption / Security Victor Norman IS333 / CS332 Spring 2014.
Lecture 8 Overview. Secure Hash Algorithm (SHA) SHA SHA SHA – SHA-224, SHA-256, SHA-384, SHA-512 SHA-1 A message composed of b bits.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Security PGP IT352 | Network Security |Najwa AlGhamdi 1.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Network Security: Lab#2 J. H. Wang Oct. 9, Objectives To learn to use message digests –MD5 To learn to use secure hash functions –SHA-1, SHA-2 To.
ECE Prof. John A. Copeland fax Office: GCATT Bldg.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
2013Prof. Reuven Aviv, Mail Security1 Pretty Good Privacy (PGP) Prof. Reuven Aviv Dept. of Computer Science Tel Hai Academic College.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Digital Signatures Assignment
Introduction Used for communication to verify
Practical work with PKI
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Presentation transcript:

Public / Private Key Example Dan Fleck CS 469: Security Engineering Coming up: Today 11

Today Hands-on exploring OpenSSL Install OpenSSL Generate a Public / Private keypair Send a “confidential” message to someone else in class Send an “authenticated” message to someone else in class Coming up: Install OpenSSL 22

Install OpenSSL Windows Users: Mac OSX: Use MacPorts or Brew to install Linux: Use your package manager if you don’t already have it Coming up: Generating a Public/Private KeyPair 33

Generating a Public/Private KeyPair Generates the keypair into a PEM formatted file openssl genrsa -out fleck.pem 1024 Get the public key out: openssl rsa –in fleck.pem –pubout > fleck.pub You can see your private key if interested by: openssl rsa -in fleck.pem Coming up: Encrypt a file with your public key 44

Encrypt a file with your public key Encrypt dan.txt into an encrypted file: dan.enc: openssl rsautl -encrypt -pubin -inkey mykey.pub -in dan.txt -out dan.enc Now this file can be read only with the correct PRIVATE key. openssl rsautl -decrypt -inkey mykey.pem -in enc.txt -out plan.txt Did this preserve confidentiality or authenticity of the file? Coming up: Sign a file with your private key 55

Sign a file with your private key Sign the file: openssl rsautl -sign -inkey mykey.pem -in dan.txt -out dan.sig Now anyone with your public key can verify that it was signed: openssl rsautl -verify -inkey mykey.pub -pubin -in dan.sig In reality we hash the file and only sign the hash: openssl dgst -sha256 dan.txt > hash What are the remaining steps to send it? What are the user’s step to verify the authenticity of the message? Coming up: Sending a signed file 66

Sending a signed file Send the original plaintext file Send the signature Send the signature algorithm (sha256 in our case) Send your public key (typically this isn’t ed, it’s posted into a public location) (e.g. ) Receiver verification of the file Retrieve the hash from the signature file (openssl –verify…) Compute the hash yourself on the original file (openssl dgst …) Ensure the two are the same Coming up: Lessons 77

Lessons Public / Private key pairs can be used for signing any type of file for authenticity They can also be used for privacy through encryption End of presentation 88