Presentation is loading. Please wait.

Presentation is loading. Please wait.

Textbook  Cryptography and Network Security: Principles and Practice (second/third edition) by William Stalling  密码学与网络安全:原理与实践(第 3 版) -- 刘玉珍 等译 电子工业出版社.

Similar presentations


Presentation on theme: "Textbook  Cryptography and Network Security: Principles and Practice (second/third edition) by William Stalling  密码学与网络安全:原理与实践(第 3 版) -- 刘玉珍 等译 电子工业出版社."— Presentation transcript:

1 Textbook  Cryptography and Network Security: Principles and Practice (second/third edition) by William Stalling  密码学与网络安全:原理与实践(第 3 版) -- 刘玉珍 等译 电子工业出版社

2 Arrangement of this course 18 Weeks: 1th~18th Week Once a week Wednesday 8:00-9:40 D-202

3 Introduction to information security Dr. Shengli Liu Email: liu-sl@cs.sjtu.edu.cn Tel: 62932135-3(O) Cryptography and Information Security Lab. http://sec.sjtu.edu.cn Dept. of Computer Science and Engineering Shanghai Jiao Tong University

4 Why Security?  Explosive growth in  Computer systems  Interconnections of computer systems via network  Dependence of both organizations and individuals on  Information stored in computer systems  Communications between these systems  computer use requires automated tools to protect files and other stored information and to protect systems from network-based attacks  Need  To protect data and resources from disclosure  To guarantee the authenticity of data and messages

5 Objective  Principles of Cryptography  Secret key cryptosystem  Public key cryptosystem/Digital signature systems  ……  Practice of Cryptography  Kerboros—application-level authentication service  X.509-- Directory Authentication Service  PGP--Electronic mail security  ……

6 What is Security? “If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter, that's not security. That is obscurity. If I take a letter and lock it in a safe, and then give you the safe along with the design specifications of the safe and a hundred identical safes with their combinations so that you and the world's best safecrackers can study the locking mechanism—and you still can't open the safe and read the letter--that 's security. ” ---Bruce Schneier

7 Information Security  Information Security requirements have changed in recent times.  Traditionally provided by physical and administrative mechanisms  Now we use computer to store data and network for communications  Computer use requires automated tools to protect files and other stored information  Use of networks and communications links requires measures to protect data during transmission

8 Information Security  Computer Security - generic name for the collection of tools designed to protect data and to thwart hackers  Network Security - measures to protect data during their transmission

9 Security Attack (Security Threat)  Attack: any action that compromises the security of information owned by an organization;  Information security: how to prevent attacks, and to detect attacks on information-based systems;

10 Attack

11 Security Mechanism  A mechanism that is designed to detect, prevent, or recover from a security attack;  No single mechanism that will support all functions required;  However one particular element underlies many of the security mechanisms in use: cryptographic techniques;  Hence, our focus is cryptographic techniques.

12 Security Service  Service is something that enhances the security of the data processing systems and the information transfers of an organization;  Service intends to counter security attacks;  Service makes use of one or more security mechanisms to provide the service;  Service replicates functions normally associated with physical documents. eg. have signatures, dates; need protection from disclosure, tampering, or destruction; be notarized or witnessed; be recorded or licensed;

13 Security Services  [Data Confidentiality] - protection of data from unauthorized disclosure  [Authentication] - assurance that the communicating entity is the one claimed  [Data Integrity] - assurance that data received is as sent by an authorized entity  [Non-Repudiation] - protection against denial by one of the parties in a communication  [Access Control] - prevention of the unauthorized use of a resource

14 Security Mechanisms Cryptagraphic techniques.  Block cipher  Stream cipher  Public key algorithms  Digital signature algorithms  MAC codes  Hash functions

15 Security Attacks  passive attacks  Eavesdropping on, or monitoring of, transmissions to obtain message contents  Monitor traffic flows  active attacks Modification of data stream to  Masquerade of one entity as some other;  Replay previous messages;  Modify messages in transit;  Denial of service;

16 Model for Network Security

17 What to be done?  Design a suitable algorithm for the security transformation;  Generate the secret information (keys) used by the algorithm;  Develop methods to distribute and share the secret information;  Specify a protocol enabling the principals to use the transformation and secret information for a security service.

18 Model for Network Access Security

19  Select appropriate gatekeeper functions to identify users  Implement security controls to ensure only authorized users access designated information or resources  Trusted computer systems can be used to implement this model

20 Summery  We have considered the following stuff.  Computer security, network security  Definitions of security services, mechanisms, attacks  Models for network (access) security

21 A Cipher System: to provide confidentiality Alice Bob Eve (attacker, opponent, adversary, eavesdropper, intruder)

22 K KK Five elements in a cipher systems { M, C, K, E K, D K }  Plaintext (cleartext) M: the message to be sent to the receiver. Plaintext space M : the set of possible values of plaintext.  Ciphertext C: an encrypted message. Ciphertext space C :the set of possible values of ciphertext. K K  Key K: the secret information involves encryption and decryption. Key space K : the set of possible values of key. K  Encryption (encipher): the process of disguising a message in such way as to hide its substance. C =E K (M) K  Decryption (decipher): The process of turning ciphertext back into plaintext. M=D K (C)

23 Cryptology  Cryptography: the art and science of keeping messages secure;  Cryptanalysis /codebreaking: the art and science of breaking ciphertext.

24 Other services  [Authentication]  [Authentication] The receiver of a message to ascertain its origin. An intruder should not be able to masquerade as someone else;  [Integrity]  [Integrity] The receiver of a message to verify that it has not been modified in transit. An intruder should not be able to substitute a false message for a legitimate one.  [Non-repudiation]  [Non-repudiation] A sender should not be able to falsely deny later that he sent a message.

25 Algorithms and keys  Cryptographic algorithm: the mathematical functions used to provide security services with cryptographic techniques.  If the system relies on the secrecy of the algorithm. Each group must have their own unique algorithm.  No group can use off-the-shelf hardware or software product, or an eavesdropper can buy the same product and learn the algorithm.  The group must design and implement the algorithm on their own.  When a group uses an algorithm for communication security, any member's leaving leads to switch to a new algorithm.  If any member accidentally reveals the algorithm, the group must switch to a new algorithm.

26 Kerckhoffs’ principle  The security of a cipher system depends on the secrecy of the key, instead of the secrecy of the algorithm.

27 Symmetric cryptosystem  also called conventional cryptosystem, secret key cryptosystem, symmetric cryptosystem single-key cryptosystem - encryption key and decryption key are the same, or the decryption key can be derived from the encryption key.  The sender and receiver must agree on a key before their secret communication.  The security of the system relies on the secrecy of the key. Divulging the key means that anyone could encrypt and decrypt messages.  Two kinds of ciphers: stream cipher and block cipher.

28 Asymmetric cryptosystem also called Public-key cryptosystem.  Decryption key is different from encryption key;  Decryption key cannot be derived from the encryption key within any reasonable amount of time; public key  The encryption key is public, hence is called public key; private key  The decryption key is private, hence is called private key;

29 Attack/Cryptanalysis  Cryptanalysis is the science of recovering the plaintext of a message without access to the key;  Attacker, opponent, enemy, adversary, eavesdropper  There are several general types of cryptanalytic attacks.  Brute force attack: simply by trying every possible key one by one and checking the resulting plaintext is meaningful.  Cipher-only attack: Given C 1 =E K (M 1 ), C 2 =E K (M 2 ),..., C i =E K (M i ), Deduce either M 1, M 2,…, M i, K, or an algorithm to infer M i+1 from C i+1 =E K (M i+1 ).

30  Known-plaintext attack: Given M 1, C 1 =E K (M 1 ), M 2, C 2 =E K (M 2 ),..., C i =E K (M i ), Deduce: either K or an algorithm to infer M i+1 from C i+1 =E K (M i+1 ),  Chosen-plaintext attack Given M 1, C 1 =E K (M 1 ), M 2, C 2 =E K (M 2 ),..., M i, C i =E K (M i ), where the attacker gets to choose M 1, M 2, …, M i, Deduce: either K or an algorithm to infer M i+1 from C i+1 =E K (M i+1 ).  Chosen-ciphertext attack

31 Security  Unconditional security: no matter how much ciphertext an attacker has, there is not enough information to recover the plaintext.  Computational security: the system cannot be broken with available resources.


Download ppt "Textbook  Cryptography and Network Security: Principles and Practice (second/third edition) by William Stalling  密码学与网络安全:原理与实践(第 3 版) -- 刘玉珍 等译 电子工业出版社."

Similar presentations


Ads by Google