Protecting Information Assets - Week 12 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets
|
|
- Clementine Alexander
- 7 years ago
- Views:
Transcription
1 Protecting Information Assets - Week 12 - Cryptography, Public Key Encryption and Digital Signatures
2 MIS5206 Week 12 Cryptography, Public Key Encryption and Digital Signatures Team Presentations Team 3 Team 4 Test Taking Tip Quiz
3 Cryptography, Public Key Encryption and Digital Signatures Cryptography allows people to carry over the confidence found in the physical world to the electronic world It allows people to do business electronically without worries of deceit and deception Every day hundreds of thousands of people interact electronically, whether it is through , e-commerce, ATM machines or cellular phones using Cryptography
4 Cryptography Method of transmitting and storing data in a form that only those it is intended for can read and process An effective way of protecting sensitive information as it is transmitted through untrusted network communication paths or stored on media Goal: Hide information from unauthorized individuals Complements physical and logical access controls
5 Cryptanalysis The study of methods to break cryptosystems Often targeted at obtaining a key Attacks may be passive or active 5 Although the actual word "cryptanalysis" is relatively recent (it was coined by William Friedman in 1920), methods for breaking codes and ciphers are much older. The first known recorded explanation of cryptanalysis was given by 9th-century Arabian polymath, Al-Kindi (also known as "Alkindus" in Europe), in A Manuscript on Deciphering Cryptographic Messages. This treatise includes a description of the method of frequency analysis
6 Cryptanalysis Kerckhoff s Principle The only secrecy involved with a cryptosystem should be the key Cryptosystem Strength How hard is it to determine the secret associated with the system? 6
7 Terminology Plaintext is the readable version of a message Ciphertext is the unreadable results after an encryption process is applied to the plaintext Cryptosystem includes all the necessary components for encryption and decryption Algorithms Keys Software Protocols Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
8 Cipher = encryption algorithm 2 main attributes combined in a cypher 1. Confusion: usually carried out through substitution 2. Diffusion: Usually carried out through transposition Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
9 Example: Substitution cipher or algorithm A mono-alphabetic substitution cipher SECURITY <=> HVXFIRGB Poly-alphabetic substitution cipher Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
10 Services of cryptosystems Repudiation the sender denying he sent the message Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
11 One-Time Pad a perfect encryption scheme Uses a binary mathematical function called exclusive OR, abbreviated as XOR One-Time Pad Requirements Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
12 Dichotomies is cryptography Symmetric versus Asymmetric Stream versus block Synchronous versus Asynchronous 1-Way functions versus 2-Way functions
13 Symmetric versus asymmetric algorithms Symmetric cryptography Use a copied pair of symmetric (identical) secret keys The sender and the receive use the same key for encryption and decryption functions Asymmetric cryptography Also know as public key cryptography Use different ( asymmetric ) keys for encryption and decryption One is called the private key and the other is the public key
14 Symmetric cryptography Two types: Stream and Block Ciphers Stream Ciphers treat the message a stream of bits and performs mathematical functions on each bit individually Block Ciphers divide a message into blocks of bits and transforms the blocks one at a time Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
15 Symmetric Stream Ciphers Easy to implement in hardware Used in cell phones and Voice Over Internet Protocol Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
16 Symmetric versus asymmetric algorithms Symmetric cryptography Use a copied pair of symmetric (identical) secret keys The sender and the receive use the same key for encryption and decryption functions Asymmetric cryptography Also know as public key cryptography Use different ( asymmetric ) keys for encryption and decryption One is called the private key and the other is the public key
17 Asymmetric cryptography Public and Private keys are mathematically related Public keys are generated from private key Private keys cannot be derived from the associated public key (if it falls into the wrong hands) Public key can be known by everyone Private key must be known and used only by the owner Asymmetric cryptography is computational intensive and much slower than symmetric cryptography Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
18 Asymmetric cryptography Do not get confused and think the public key is only for encryption and private key is only for decryption! Each key type can be use used to encrypt and decrypt If data is encrypted with a private key it cannot be decrypted with the same private key (but it can be decrypted with the related public key) If data is encrypted with a public key it cannot be decrypted with the same public key (but it can be decrypted with the related private key)
19 Asymmetric cryptography If Jill encrypts data with her private key, the receiver (Bill) must have a copy of Jill s public key to decrypt it By decrypting the message with Jill s public key Bill can be sure the message really came from Jill A message can be decrypted with a public key only if the message was encrypted with the corresponding private key This provides authentication because Jill is only the only one who is supposed to have her private key If Bill (the receiver) wants to make sure Jill is the only one who can read his reply, he will encrypt the response with her public key Only Jill will be able to decrypt the message, because she is the only one who has the necessary private key
20 Asymmetric cryptography Why would Bill the receiver choose to encrypt his reply to Jill with his private key instead of using Jill s public key? Authentication Bill wants Jill to know that the message came from him and no one else If he encrypted the data with Jill s public key, it does not provide authenticity because anyone can get Jill s public key If he uses his private key to encrypt the data, then Jill can be sure the message came from him and no one else Symmetric keys do not provide authenticity because the same key is used on both ends (using one of the secret keys does not ensure the message originated from a specific individual
21 Asymmetric cryptography If confidentiality is the most important security service, the sender would encrypt the file with the receiver s public key This is called a secure message format because it can only be decrypted by the person with the corresponding private key If authentication is most important, the sender would encrypt the data with his private key This provides assurance to the receiver that the only person who could have encrypted the data is the individual in possession of the private key If the sender encrypted the data with receivers public key, authentication is not provided because the public key is available to anyone Encrypting data with the senders private key is called an open message format because anyone with a copy of the corresponding public key can decrypt the message Confidentiality is not assured
22 Hybrid Encryption (a.k.a. digital envelope ) Symmetric and asymmetric and algorithms are often used together Public key cryptography s asymmetric algorithm is used to create public and private keys for secure automated key distribution Symmetric algorithm is used to create secret keys for rapid encryption/decryption of bulk data Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
23 Hybrid Encryption Symmetric algorithm uses a secret key to encrypt the block message and the asymmetric key encrypts the secret key for transmission (SSL/TLS uses hybrid) Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
24 Quick review 1. If a symmetric key is encrypted with a receiver s public key, what security service is provided?
25 Quick review 1. If a symmetric key is encrypted with a receiver s public key, what security service is provided? Confidentiality: only the receiver s private key can be used to decrypt the symmetric key, and only the receiver should have access to this private key
26 Quick review 2. If data is encrypted with the sender s private key, what security services is provided?
27 Quick review 2. If data is encrypted with the sender s private key, what security services are provided? Authenticity of the sender and nonrepudiation. If the receiver can decrypt the encrypted data with the sender s public key, then sender knows the data was encrypted with the sender s private key
28 Quick review 3. Why do we encrypt the message with the symmetric key?
29 Quick review 3. Why do we encrypt the message with the symmetric key? Because the asymmetric key algorithm is too slow
30 What is the difference between Public Key Cryptography Versus Public Key Infrastructure
31 Session keys Single-use symmetric keys used to encrypt messages between two users in an individual communication session This is how secure web client applications communicate with server-side services Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
32 Encryption Algorithms Symmetric Advanced Encryption Standard (AES) Data Encryption Standard (DES) Triple-DES (3DES) International Data Encryption Algorithm (IDEA) Blowfish RC4, RC5, and RC6 Asymmetric Rivest-Shamir-Adleman (RSS) Elliptic curve cryptosystem (ECC) Diffie-Hellman El Gamal Digital Signature Algorithm (DSA)
33 One-way Hash Assures message integrity A function that takes a variable-length string (i.e. message) and produces a fixedlength value called a hash value Does not use keys 1. Sender puts message through hashing function 2. Message digest generated 3. Message digest appended to the message 4. Sender sends message to receiver 5. Receiver puts message through hashing function 6. Receiver generates message digest value 7. Receiver compares the two message digests values. If they are the same, the message has not been altered Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
34 Digital Signature A hash value encrypted with the sender s private key The act of signing means encrypting the message s hash value with the private key Creating a digital signature for a message Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
35 Message Authentication Codes Small block of data generated with a secret key and appended to a message HMAC (RFC 2104) Uses hash instead of cipher for speed Used in SSL/TLS and IPSec 35
36 Cryptographic algorithms and their functions Harris, S. and Maymi, F. (2016) All-In-One CISSP Exam Guide, McGraw Hill Education
37 Reasons to Use Cryptography Reason Confidentiality The message can be encrypted How achieved Integrity The message can be hashed and/or digitally signed Authentication The message can be digitally signed Nonrepudiation The message can be digitally signed 37
38 More cryptography terms TERM Plaintext Ciphertext Key Keyspace Initialization Vector DEFINITION A message in its natural format readable by an attacker Message altered to be unreadable by anyone except the intended recipients Sequence that controls the operation and behavior of the cryptographic algorithm Total number of possible values of keys in a crypto algorithm Random values used with stream ciphers to ensure no patterns are created during encryption 38
39 Public Key Infrastructure Not the same as public key encryption algorithm All components needed to enable secure communication Policies and Procedures Keys and Algorithms Software and Data Formats Assures identity to users Provides key management features 39
40 PKI Components Digital Certificates Contains identity and verification info Certificate Authorities (CA) Trusted entity that issues certificates Registration Authorities (RA) Verifies identity for certificate requests Certificate Revocation List (CRL) 40
41 PKI Cross Certification Organizations are setting up their own internal PKIs Without a higher level CA, the organizations need a way for two root CAs to trust each other PKI cross certification allows process to establish a trust relationship between CAs Allows each CA to validate certificates issued by the other CA Used in large organizations or business partnerships 41
42 Encryption Management Key Distribution Center (KDC) Uses master keys to issue session keys Example: Kerberos ANSI X Used by financial institutions Hierarchical set of keys Higher levels used to distribute lower ANSI X , Financial Institution Key Management (Wholesale), is a voluntary standard that utilizes the Data Encryption Standard (DES) to provide key management solutions for a variety of operational environments.
43 Cryptanalysis Attacks Man-in-the-Middle attack Hacker intercepts traffic grabs two others public keys and replaces it with his/her own public key and uses his/her own private key to decrypt and monitors the traffic between the others 43
44 Cryptanalysis Attacks Brute force Trying all key values in the keyspace Frequency Analysis Guess values based on frequency of occurrence Dictionary Attack Find plaintext based on common words Replay Attack Repeating previous known values Factoring Attacks Find keys through prime factorization Known Plaintext Format or content of plaintext available 44
45 Cryptanalysis Attacks Chosen Plaintext Attack can encrypt chosen plaintext Chosen Ciphertext Decrypt known ciphertext to discover key Differential Power Analysis Side Channel Attack Identify algorithm and key length 45
46 Cryptanalysis Attacks Social Engineering Humans are the weakest link Random Number Generator (RNG) Attack Predict initialization vector used by an algorithm Temporary Files May contain plaintext 46 Early versions of Netscape's Secure Socket Layer (SSL) encryption protocol used pseudo-random quantities derived from a pseudorandom number generator (PRNG) seeded with three variable values: the time of day, the process ID, and the parent process ID. These quantities are often relatively predictable, and so have little entropy and are less than random, and so that version of SSL was found to be insecure as a result.
47 Birthday Attack Collisions Two messages with the same hash value Based on the birthday paradox Hash algorithms should be resistant to this attack 47 The birthday paradox, also known as the birthday problem, states that in a random group of 23 people, there is about a 50 percent chance that two people have the same birthday.
48 Is the Birthday Attack Real? There are multiple reasons why this seems like a paradox. One is that when in a room with 22 other people, if a person compares his or her birthday with the birthdays of the other people it would make for only 22 comparisons only 22 chances for people to share the same birthday. 48 When all 23 birthdays are compared against each other, it makes for much more than 22 comparisons. How much more? Well, the first person has 22 comparisons to make, but the second person was already compared to the first person, so there are only 21 comparisons to make. The third person then has 20 comparisons, the fourth person has 19 and so on. If you add up all possible comparisons ( ) the sum is 253 comparisons, or combinations. Consequently, each group of 23 people involves 253 comparisons, or 253 chances for matching birthdays.
49 Practical Cryptanalysis DES Cracker: A DES key search machine contains 1,536 chips Cost: $250,000 could search 88 billion keys per second won RSA Laboratory s DES Challenge II-2 by successfully finding a DES key in 56 hours 49
50 Security Protocols Privacy Enhanced (PEM) Pretty Good Privacy (PGP) Based on a decentralized trust model (alternative to Public Key Infrastructure PKI which relies on CAs) Each user generates a key pair S/MIME Requires public key infrastructure Supported by most clients 50
51 Network Security Link Encryption Encrypt traffic headers + data Transparent to users End-to-End Encryption Encrypts application layer data only Network devices need not be aware 51
52 Network Security SSL/TLS Supports mutual authentication Secures a number of popular network services IPSec Security extensions for TCP/IP protocols Supports encryption and authentication Used for VPNs 52
53 Test Taking Tip When one of the answer choices is all of the above and at least two statements are unquestionably true then choose all of the above. If 2 answers are true, then the additional effort required to certify the answer is not the best use of your time Moving quickly through questions you can easily answer saves time for questions that require additional scrutiny 53
54 Quiz 54
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
More informationChapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
More informationCRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
More informationChapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
More informationChapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
More informationContent Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
More informationCryptography & Network Security
Cryptography & Network Security Lecture 1: Introduction & Overview 2002. 3. 27 chlim@sejong.ac.kr Common Terms(1) Cryptography: The study of mathematical techniques related to aspects of information security
More informationCIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
More informationDr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
More informationEXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
More informationPart I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
More informationSecurity. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
More informationOverview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
More informationLecture 9 - Network Security TDTS41-2006 (ht1)
Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA Schuba@IDA.LiU.SE Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,
More informationCS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: dstinson@uwaterloo.ca my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
More informationNetwork Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
More informationSecure Sockets Layer
SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated
More information159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
More informationOverview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
More informationOverview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
More informationExpert Reference Series of White Papers. Fundamentals of the PKI Infrastructure
Expert Reference Series of White Papers Fundamentals of the PKI Infrastructure 1-800-COURSES www.globalknowledge.com Fundamentals of the PKI Infrastructure Boris Gigovic, Global Knowledge Instructor, CEI,
More informationNetwork Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
More informationComputer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
More informationCryptography & Digital Signatures
Cryptography & Digital Signatures CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration Prof. Sloan s Slides, 2007, 2008 Robert H.
More informationSavitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
More informationCryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography
More informationMessage Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
More informationClient Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
More informationCSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
More informationELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
More informationLecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
More informationNetwork Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
More informationAuthentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
More informationCSCI-E46: Applied Network Security. Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING 2016 1
CSCI-E46: Applied Network Security Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING 2016 1 Welcome to CSCI-E46 Classroom & Schedule 53 Church Street L01 Wednesdays,
More information12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
More information7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
More informationCryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.
Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public
More informationAC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014
Q.2a. Define Virus. What are the four phases of Viruses? In addition, list out the types of Viruses. A virus is a piece of software that can infect other programs by modifying them; the modification includes
More informationHomework 2. A 4*4 image with 16 pixels Borders unaltered. Color of B2 = Average color of (B1,A2,B3,C2) A1 A2 A3 A4 B1 B2 B3 B4 C1 C2 C3 C4 D1 D2 D3 D4
Homework 2 A 4*4 image with 16 pixels Borders unaltered A1 A2 A3 A4 B1 B2 B3 B4 C1 C2 C3 C4 D1 D2 D3 D4 Color of B2 = Average color of (B1,A2,B3,C2) Swap function Example: (swap_buggy.py) >>> a = 1...
More informationCryptography and Network Security Chapter 12
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 12 Message Authentication Codes At cats' green on the Sunday he
More informationChapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
More informationIntroduction to Cryptography
Introduction to Cryptography Part 3: real world applications Jean-Sébastien Coron January 2007 Public-key encryption BOB ALICE Insecure M E C C D channel M Alice s public-key Alice s private-key Authentication
More informationCS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement
More informationVALLIAMMAI ENGINEERING COLLEGE
VALLIAMMAI ENGINEERING COLLEGE (A member of SRM Institution) SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year and Semester : I / II Section : 1 Subject Code : NE7202
More informationChapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
More informationHow To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
More informationSafeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST
Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods
More informationChapter 14. Key management and Distribution. Symmetric Key Distribution Using Symmetric Encryption
Chapter 14. Key management and Distribution Symmetric Key Distribution Using Symmetric Encryption For symmetric encryption to work, the two parties to an exchange must share the same key, and that key
More informationCRYPTOG NETWORK SECURITY
CRYPTOG NETWORK SECURITY PRINCIPLES AND PRACTICES FOURTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458 'jkfetmhki^^rij^jibwfcmf «MMr""'-^.;
More informationThe Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore hongjun@i2r.a-star.edu.sg Abstract. In this report, we point out a serious security flaw in Microsoft
More informationNetwork Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
More informationModule 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
More informationEvaluation of the RC4 Algorithm for Data Encryption
Evaluation of the RC4 Algorithm for Data Encryption Allam Mousa (1) and Ahmad Hamad (2) (1) Electrical Engineering Department An-Najah University, Nablus, Palestine (2) Systems Engineer PalTel Company,
More informationEncryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1
Encryption, Data Integrity, Digital Certificates, and SSL Developed by Jerry Scott 2002 SSL Primer-1-1 Ideas Behind Encryption When information is transmitted across intranets or the Internet, others can
More informationCryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
More informationCryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.
Cryptography: Motivation Many areas have sensitive information, e.g. Data Structures and Algorithms Cryptography Goodrich & Tamassia Sections 3.1.3 & 3.1.4 Introduction Simple Methods Asymmetric methods:
More informationCommon Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/
Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting shayz@comsecglobal.com Copyright 2006 - The OWASP
More informationFinal Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
More informationKy Vu DeVry University, Atlanta Georgia College of Arts & Science
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security
More informationTable of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
More information7! Cryptographic Techniques! A Brief Introduction
7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures
More informationCS 392/681 - Computer Security
CS 392/681 - Computer Security Module 3 Key Exchange Algorithms Nasir Memon Polytechnic University Course Issues HW 3 assigned. Any lab or course issues? Midterm in three weeks. 8/30/04 Module 3 - Key
More informationCUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631
Cunsheng DING, HKUST Lecture 08: Key Management for One-key Ciphers Topics of this Lecture 1. The generation and distribution of secret keys. 2. A key distribution protocol with a key distribution center.
More informationVoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan
VoIP Security Seminar: Cryptography and Security Michael Muncan Overview Introduction Secure SIP/RTP Zfone Skype Conclusion 1 Introduction (1) Internet changed to a mass media in the middle of the 1990s
More informationChapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols
Network Security Chapter 8 Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Communication Security Authentication Protocols Email Security Web Security
More informationMessage authentication and. digital signatures
Message authentication and " Message authentication digital signatures verify that the message is from the right sender, and not modified (incl message sequence) " Digital signatures in addition, non!repudiation
More informationInformation Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 vedatcoskun@isikun.edu.tr www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
More informationChapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
More informationCryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
More information1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
More informationINTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 1: Introduction Ion Petre Department of IT, Åbo Akademi University January 10, 2012 1 Motto Unfortunately, the technical
More informationNetwork Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
More informationCyber Security Branch. Security+ Review Course. Version 4.1
Cyber Security Branch Security+ Review Course Version 4.1 Overview The skills and knowledge measured by the CompTIA Security+ examination were derived and validated through input from a committee and over
More informationSymmetric Key cryptosystem
SFWR C03: Computer Networks and Computer Security Mar 8-11 200 Lecturer: Kartik Krishnan Lectures 22-2 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single
More informationOFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
More informationProperties of Secure Network Communication
Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,
More informationCrypTool. www.cryptool.de www.cryptool.com www.cryptool.org. Claudia Eckert / Thorsten Clausius Bernd Esslinger / Jörg Schneider / Henrik Koy
CrypTool A free software program for creating awareness of IT security issues for learning about and obtaining experience of cryptography for demonstrating encryption algorithms and analysis procedures
More informationCS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email
CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure
More informationSecure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
More informationNetwork Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
More informationAs enterprises conduct more and more
Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside
More informationLecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
More informationArchived NIST Technical Series Publication
Archived NIST Technical Series Publication The attached publication has been archived (withdrawn), and is provided solely for historical purposes. It may have been superseded by another publication (indicated
More informationIs your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
More informationPublic Key Cryptography in Practice. c Eli Biham - May 3, 2005 372 Public Key Cryptography in Practice (13)
Public Key Cryptography in Practice c Eli Biham - May 3, 2005 372 Public Key Cryptography in Practice (13) How Cryptography is Used in Applications The main drawback of public key cryptography is the inherent
More informationPGP Encryption Software
PGP Encryption Software Shuhan Wang Technology, Communication and Transport Degree Programme in Information Technology 2014 Abstract of Thesis Technology, Communication and Transport Degree Programme in
More informationSSL A discussion of the Secure Socket Layer
www.harmonysecurity.com info@harmonysecurity.com SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
More informationNetwork Security: Cryptography CS/SS G513 S.K. Sahay
Network Security: Cryptography CS/SS G513 S.K. Sahay BITS-Pilani, K.K. Birla Goa Campus, Goa S.K. Sahay Network Security: Cryptography 1 Introduction Network security: measure to protect data/information
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt 1 Lecture 11: Network Security Reference: Chapter 8 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice
More informationLecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management
More informationCommon security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon
1 Common security requirements Basic security tools Secret-key cryptography Public-key cryptography Example Online shopping with Amazon 2 Alice credit card # is xxxx Internet What could the hacker possibly
More informationNetwork Security. Network Security. Security in Computer Networks
Network Security Network Security introduction cryptography authentication key exchange Reading: Tannenbaum, section 7.1 Ross/Kurose, Ch 7 (which is incomplete) Intruder may eavesdrop remove, modify, and/or
More informationResearch Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
More informationCryptography and Key Management Basics
Cryptography and Key Management Basics Erik Zenner Technical University Denmark (DTU) Institute for Mathematics e.zenner@mat.dtu.dk DTU, Oct. 23, 2007 Erik Zenner (DTU-MAT) Cryptography and Key Management
More informationNetwork Security (2) CPSC 441 Department of Computer Science University of Calgary
Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate
More informationPublic Key Cryptography Overview
Ch.20 Public-Key Cryptography and Message Authentication I will talk about it later in this class Final: Wen (5/13) 1630-1830 HOLM 248» give you a sample exam» Mostly similar to homeworks» no electronic
More informationSoftware Engineering 4C03 Research Project. An Overview of Secure Transmission on the World Wide Web. Sean MacDonald 0043306
Software Engineering 4C03 Research Project An Overview of Secure Transmission on the World Wide Web Sean MacDonald 0043306 Tuesday April 5, 2005 Introduction Software Engineering 4C03 Research Project
More informationAuthentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
More informationComputer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
More information