Presentation is loading. Please wait.

Presentation is loading. Please wait.

Facilities for Secure Communication The Internet is insecure The Internet is a shared collection of networks. Unfortunately, that makes it insecure An.

Similar presentations


Presentation on theme: "Facilities for Secure Communication The Internet is insecure The Internet is a shared collection of networks. Unfortunately, that makes it insecure An."— Presentation transcript:

1

2 Facilities for Secure Communication

3 The Internet is insecure The Internet is a shared collection of networks. Unfortunately, that makes it insecure An example: Cable modems use TV wiring to deliver high-speed Internet services to customers Groups of customers share the same bandwidth  anybody in the group can eavesdrop to any body else’s communication

4 Issues in Internet Security Privacy: messages should be read only by the sender and the intended destination; Ex1. If you send your credit card number, you would like to know that only the receiver can read the message. Ex2. If you send digital merchandise, like an e- ticket, you would like that only the party that paid for it could use it. Authenticity: be sure who the communicating party is: Ex1. Who is the sender of an e-mail? Ex2. Is this web page really set up by Columbia?

5 Issues in Internet security (cont.) Data integrity: a message should arrive at the destination exactly as it was sent Ex: one can steal merchandise simply by changing the delivery address Solution: encryption

6 Encryption methods Have a code for each symbol; The communicating parties share the code Ex: p stands for w, o for a, and t for r. What does pot stand for? Widely used starting with ancient Rome Problem: easy to break if computers are used to break the code.

7 Secret key cryptography Secret key: Based on the previous idea, but uses sophisticated mathematical procedures to encrypted and to decrypt; If M is a message, and K is a secret key then: M=decrypt(K,encrypt(M)) Advantage: encrypt, decrypt are (relatively) efficient functions

8 Secret Key Cryptography (cont.) Alice Bob @1!3 & Spring arrived!! @1!3 & Spring arrived !!

9 Problems with secret key cryptography Deployment: all communicating parties have to know the key. How can they take hold of it? Obviously, not by sending an message via the Internet. Large number of keys: a dedicated key is needed for each set of communicating parties; Cannot be used for signing: when receiving an encrypted message one cannot be sure who is the sender---might be anybody who knows the secret key

10 A Breakthrough: Public Key Cryptography Discovered in the ’70s by Diffie and Hellman A person (principal) has two keys: A private key, that he keeps secret A public key, that anybody may know Property: a message encrypted with one of the keys can be decrypted with the other;

11 Encrypting with public/private keys To achieve privacy: If A wants to send a message to B that only B can read, A encrypts the message with B’s public key: A sends M’=encrypt(pub B,M) B: decrypt(priv B,M’) To prove authenticity (signing): If A wants to send to B a message and wants to prove that it is authentic: A encrypts the message with its private key: A sends M’=encrypt(priv A,M) B decrypts the message with A’s public key: B recovers M=decrypt(pub A,M’) How about data integrity?

12 Public Key Cryptography (cont.) Sending an authentic message. Alice Bob @1!3 & Spring arrived !! @1!3 & Spring arrived!! secretpublic

13 Public Key Cryptography (cont.) Sending a confidential message Alice #1$% secretpublic #1$% Indeed! Alice’s public key

14 Public key cryptography Advantages: Provide for privacy, authenticity and integrity May be used to distribute secret keys; The price to pay: Encryption and decryption takes considerably longer to perform than for secret key cryptography.

15 But… No method (public or secret cryptography) guarantees absolute security: If a third party uses enough computers, enough time it will be able to break the code; However, the time required to break the code is (believed to be) sufficiently long as to make the network reasonably secure.


Download ppt "Facilities for Secure Communication The Internet is insecure The Internet is a shared collection of networks. Unfortunately, that makes it insecure An."

Similar presentations


Ads by Google