Week 2 - Friday.  What did we talk about last time?  Biometrics  Tokens  Started access control.

Slides:



Advertisements
Similar presentations
Cryptography encryption authentication digital signatures
Advertisements

Computer Science 101 Data Encryption And Computer Networks.
Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Lecture 2.1: Private Key Cryptography -- I CS 436/636/736 Spring 2013 Nitesh Saxena.
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Lecture 23 Symmetric Encryption
Lecture 1 Overview.
Public Key Algorithms 4/17/2017 M. Chatterjee.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Encryption Methods By: Michael A. Scott
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Cryptography Week-6.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
Week 1 - Wednesday.  What did we talk about last time?  Course overview  Terminology  Threats  Vulnerabilities  Attacks  Controls  CIA.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Week 7 - Wednesday.  What did we talk about last time?  Targeted malicious code  Controls against program threats  Memory protection.
Cryptography, Authentication and Digital Signatures
Cryptography By, Anthony Lonigro & Valentine Mbah.
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Symmetric-Key Cryptography
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
1 Public-Key Cryptography and Message Authentication.
Week 4 - Wednesday.  What did we talk about last time?  RSA algorithm.
Encryption.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Traditional Symmetric-Key Ciphers
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Lecture 23 Symmetric Encryption
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Week 2 - Wednesday.  What did we talk about last time?  Authentication  Challenge-response  Passwords.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Basics of Cryptography
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
PART VII Security.
Operating Systems Concepts
Presentation transcript:

Week 2 - Friday

 What did we talk about last time?  Biometrics  Tokens  Started access control

 Create a directory that lists all the objects a given user can access and their associated rights:  Examples: read, write, execute, own  The own write gives the user the ability to grant others rights to that object  Problems:  Directories can become large  How is access revoked?  What if two files in different locations in the system have the same name?

 Listing all the objects a user can access can take up too much space  An alternative is to list all the users that have rights for a specific object  Most objects only have a few legal users  Wild cards can make the situation easier  Read access can be granted to everyone

 Both directories and access control lists are equivalent  Different implementations are used for different kinds of efficiency  We can also imagine a matrix that holds all subjects and all objects  Although it is far too inefficient for most systems to be implemented this way, security researchers sometimes use this model for theoretical purposes  Can you determine if some sequence of operations could leak read access to your file?  Nope, it’s impossible!

Objects Subjectsfile 1file 2process 1process 2 process 1 read, write, own read read, write, execute, own write process 2appendread, ownread read, write, execute, own

 A few possible rights:  Read  Write  Execute  Own  Anything else that is useful?  Some rights allow users to change the rights of others

 What would the access control matrix look like for the Canvas gradebook system?

 Unix has users, groups, and processes  A user has a unique UID  A group has a unique GID  A process has a unique PID  Each user can belong to many groups  Access is controlled on:  Files  Directories

 Reading  Writing  Executing  Ownership is also important

 Reading  Execution allows moving through the directory  Writing and executing are needed to create and delete files in a directory  There is also a “sticky bit” for directories  If the sticky bit is set, only the directory owner can rename, move, or delete files owned by other people

drwxr-xr-x  First character:directory or not  Next three characters: owner permissions  Next three characters: group permissions  Next three characters: other permissions

 We can change permissions using the Linux command chmod  Examples:  chmod a+r wombat.txt  chmod g+rw combat.txt  chmod 664 ramjet.txt  Whoa! 664? What’s that?  Would it help if I pointed out that 664 can be written ?

 Role-based access control makes an effort to abstract away from specific subjects  The idea is that you should have access based on your role  Examples:  Secretaries have access to mailboxes  Department heads have access to performance reports  Provosts have access to salaries

 A role is a collection of job functions  Each role is authorized to perform one or more transactions  The active role of a subject is the role that s is currently performing  The authorized roles of a subject make up the set of roles that the subject is authorized to assume

 "Secret writing"  The art of encoding a message so that its meaning is hidden  Cryptanalysis is breaking those codes

 Encryption is the process of taking a message and encoding it  Decryption is the process of decoding the code back into a message  A plaintext is a message before encryption  A ciphertext is the message in encrypted form  A key is an extra piece of information used in the encryption process

 A plaintext is M (sometimes P)  A ciphertext is C  The encryption function E(x) takes M and converts it into C  E(M) = C  The decryption function D(x) takes C and converts it into M  D(C) = M  We sometimes specify encryption and decryption functions E k (x) and D k (x) specific to a key k

 Cryptography is supposed to prevent people from reading certain messages  Thus, we measure a cryptosystem based on its resistance to an adversary or attacker  Kinds of attacks:  Ciphertext only: Attacker only has access to an encrypted message, with a goal of decrypting it  Known plaintext: Attacker has access to a plaintext and its matching ciphertext, with a goal of discovering the key  Chosen plaintext: Attacker may ask to encrypt any plaintext, with a goal of discovering the key  Others, less common

 A sender S wants to send a message to a recipient R  If S gives the message to T who gives it to R, T is a transmission medium  If an outsider O wants to access the message (to read, change, or destroy it), we call O an interceptor or intruder  The fear is that O will cause one of the four security failures we discussed earlier:  Blocking the message  Intercepting the message  Modifying the message  Fabricating a false message

 The previous slide gives the book’s terminology  Rather than use letters, a system popularized by Ron Rivest is to use Alice and Bob as the two parties communicating  Carl or another “C” name can be used if three people are involved  Trent is a trusted third party  Eve is used for an evil user who often eavesdrops  Mallory is used for a malicious user who is usually trying to modify messages

 The algorithms for encryption often rely on a secret piece of information, called a key  We can notate the use of a specific key in either of the two following ways:  C = E K (M)  C = E(K, M)  In symmetric (or private key) encryption, the encryption key and the decryption key are the same  In asymmetric (or public key) encryption, the encryption key and the decryption key are different

 A cryptanalyst is someone who is trying to break the cryptography and discover the plaintext or the key  A cryptanalyst could:  Break a single message  Find patterns in the encryption that allow future messages to be decrypted  Discover information in the messages without fully decrypting them  Discover the key  Find weaknesses in the implementation of the encryption  Find weaknesses in the encryption that may or may not be able to lead to breaks in the future

 There are two kinds of security for encryption schemes  Unconditionally secure ▪ No matter how much time or energy an attacker has, it is impossible to determine the plaintext  Computationally secure ▪ The cost of breaking the cipher exceeds the value of the encrypted information ▪ The time required to break the cipher exceeds the useful lifetime of the information  We focus on computationally secure, because there is only one practical system that is unconditionally secure  "I want them to remain secret for as long as men are capable of evil" -Avi from Cryptonomicon

 Modulo operator takes the remainder  Two numbers are said to be congruent modulo n if they have the same remainder when divided by n  For example, 39  3 (mod 12)  Addition, subtraction, and multiplication:  [(a mod n) + (b mod n)] mod n = (a + b) mod n  [(a mod n) – (b mod n)] mod n = (a – b) mod n  [(a mod n) x (b mod n)] mod n = (a x b) mod n

 We can’t actually divide  Instead, we have to find the multiplicative inverse  The multiplicative inverse of x exists if and only if x is relatively prime to n  13 ∙ 5  65  1 (mod 16)  So, 13 and 5 are multiplicative inverses mod 16  But, 0, 2, 4, 6, 8, 10, and 12 do not have multiplicative inverses mod 16

 Shift ciphers  Substitution ciphers  One-time pads  Ryan Schubert presents

 Read Sections 2.3 and 12.1  Work on Project 1  Class is canceled on Friday, March 11  The company EC Key is sponsoring a contest to come up with novel uses for their BlueTooth door access technology  Interested? Come to the meeting today at 3:30pm in Hoover 110  Teams will be formed from CS, engineering, and business students  Ask me for more information!  Also, there's a field trip to Cargas Systems in Lancaster next Friday