Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
Public Key Cryptography & Message Authentication By Tahaei Fall 2012.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Cryptography1 CPSC 3730 Cryptography Chapter 13 Digital Signature Standard (DSS)
Chapter3 Public-Key Cryptography and Message Authentication.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Lecture 3: Cryptographic Tools
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
ASYMMETRIC CIPHERS.
Introduction to Public Key Cryptography
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Behzad Akbari Spring In the Name of the Most High.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Prime Numbers Prime numbers only have divisors of 1 and self
Problems with symmetric (private-key) encryption 1) secure distribution of keys 2) large number of keys Solution to both problems: Public-key (asymmetric)
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
James Higdon, Sameer Sherwani
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
453 Network Security Section 3b: Message Authentication and Public-Key Cryptography Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology -
Chapter 21 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 2 “Cryptographic Tools”.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
CSCE 815 Network Security Lecture 8 SHA Operation and Kerberos.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
IT 221: Introduction to Information Security Principles Lecture 4: Public-Key Cryptography For Educational Purposes Only Revised: September 15, 2002.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Elliptic Curve Cryptography
Cryptography and Network Security
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Cryptography Gerard Klonarides. What is cryptography? Symmetric Encryption Symmetric Encryption Asymmetric Encryption Asymmetric Encryption Other cryptography.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Digital Signature Standard (DSS) US Govt approved signature scheme designed by NIST & NSA in early 90's published as FIPS-186 in 1991 revised in 1993,
Lecture 14 Public Key Cryptography and RSA. Summary principles of public-key cryptography principles of public-key cryptography RSA algorithm, implementation,
CST 312 Pablo Breuer.  First published public-key algorithm  A number of commercial products employ this key exchange technique  Purpose is to enable.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
CS457 Introduction to Information Security Systems
B. R. Chandavarkar CSE Dept., NITK Surathkal
Public-Key Cryptography and RSA
Public-Key Cryptography and Message Authentication
NET 311 Information Security
Introduction to Cryptography
Diffie-Hellman Key Exchange
Digital Signature Standard (DSS)
Presentation transcript:

Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical functions rather than on simple operations on bit patternsBased on mathematical functions rather than on simple operations on bit patterns Is asymmetric, involving the use of two separate keysIs asymmetric, involving the use of two separate keys Public-key encryption is more secure from cryptanalysis than conventional encryption Public-key encryption is a general-purpose technique that has made conventional encryption obsolete There is a feeling that key distribution is trivial when using public-key encryption, compared to the rather cumbersome handshaking involved with key distribution centers for conventional encryption Misconceptions:

Applications for public-key cryptosystems Public-key systems are characterized by the use of a cryptographic type of algorithm with two keys, one held private and one available publiclyPublic-key systems are characterized by the use of a cryptographic type of algorithm with two keys, one held private and one available publicly Depending on the application, the sender uses either the sender’s private key, the receiver’s public key, or both to perform some type of cryptographic functionDepending on the application, the sender uses either the sender’s private key, the receiver’s public key, or both to perform some type of cryptographic function The use of public-key cryptosystems can be classified into three categories: Encryption/decryption The sender encrypts a message with the recipient’s public key Digital signature The sender “signs” a message with its private key Key exchange Two sides cooperate to exchange a session key

Table 3.2 applications for public-key cryptosystems

Diffie-Hellman Key Exchange First published public-key algorithmFirst published public-key algorithm A number of commercial products employ this key exchange techniqueA number of commercial products employ this key exchange technique Purpose of the algorithm is to enable two users to exchange a secret key securely that then can be used for subsequent encryption of messagesPurpose of the algorithm is to enable two users to exchange a secret key securely that then can be used for subsequent encryption of messages The algorithm itself is limited to the exchange of the keysThe algorithm itself is limited to the exchange of the keys Depends for its effectiveness on the difficulty of computing discrete logarithmsDepends for its effectiveness on the difficulty of computing discrete logarithms

Digital Signature standard (DSS) FIPS PUB 186FIPS PUB 186 Makes use of the SHA-1 and presents a new digital signature technique, the Digital Signature Algorithm (DSA)Makes use of the SHA-1 and presents a new digital signature technique, the Digital Signature Algorithm (DSA) Originally proposed in 1991 and revised in 1993 and again in 1996Originally proposed in 1991 and revised in 1993 and again in 1996 Uses an algorithm that is designed to provide only the digital signature functionUses an algorithm that is designed to provide only the digital signature function Unlike RSA, it cannot be used for encryption or key exchangeUnlike RSA, it cannot be used for encryption or key exchange

Elliptic-curve cryptology (ECC) Technique is based on the use of a mathematical construct known as the elliptic curveTechnique is based on the use of a mathematical construct known as the elliptic curve Principal attraction of ECC compared to RSA is that it appears to offer equal security for a far smaller bit size, thereby reducing processing overheadPrincipal attraction of ECC compared to RSA is that it appears to offer equal security for a far smaller bit size, thereby reducing processing overhead The confidence level in ECC is not yet as high as that in RSAThe confidence level in ECC is not yet as high as that in RSA

Summary Approaches to message authenticationApproaches to message authentication Authentication using conventional encryptionAuthentication using conventional encryption Message authentication without message encryptionMessage authentication without message encryption Secure hash functionsSecure hash functions Hash function requirementsHash function requirements Security of hash functionsSecurity of hash functions Simple hash functionsSimple hash functions The SHA secure hash function SHA-3The SHA secure hash function SHA-3 Digital signaturesDigital signatures Message authentication codesMessage authentication codes HMAC MACs based on block ciphers Public-key cryptography principlesPublic-key cryptography principles Public-key encryption structure Applications for public-key cryptosystems Requirements for public-key cryptography Public-key cryptography algorithmsPublic-key cryptography algorithms The RSA public-key encryption algorithm Diffie-Hellman key exchange Other public-key cryptography algorithms