Cryptography and Network Security

Similar documents
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Cryptography and Network Security

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Information Security

Network Security. HIT Shimrit Tzur-David

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Cryptography & Network Security

Content Teaching Academy at James Madison University

CS 758: Cryptography / Network Security

CRYPTOGRAPHY IN NETWORK SECURITY

Chapter 10. Network Security

SECURITY IN NETWORKS

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

IT Networks & Security CERT Luncheon Series: Cryptography

NETWORK ADMINISTRATION AND SECURITY

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK

How To Understand And Understand The History Of Cryptography

Symmetric Key cryptosystem

Chapter 7: Network security

Network Security Technology Network Management

TELE 301 Network Management. Lecture 18: Network Security

CPSC 467b: Cryptography and Computer Security

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

An Introduction to Cryptography and Digital Signatures

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Cryptography & Digital Signatures

CSE/EE 461 Lecture 23

7! Cryptographic Techniques! A Brief Introduction

Lukasz Pater CMMS Administrator and Developer

Lecture 9 - Network Security TDTS (ht1)

Cryptography and Network Security

Chapter 8. Network Security

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Overview. SSL Cryptography Overview CHAPTER 1

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Cryptography and Network Security

Properties of Secure Network Communication

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Client Server Registration Protocol

CRYPTOG NETWORK SECURITY

As enterprises conduct more and more

Lecture 9: Application of Cryptography

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

What is network security?

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Chap. 1: Introduction

EXAM questions for the course TTM Information Security May Part 1

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Computer and Network Security. Alberto Marchetti Spaccamela

The Misuse of RC4 in Microsoft Word and Excel

CSCE 465 Computer & Network Security

Message Authentication Codes

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Security and Authentication Primer

AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014

COSC 472 Network Security

Is your data safe out there? -A white Paper on Online Security

Application Layer (1)

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

CIS433/533 - Computer and Network Security Cryptography

Chapter 7 Transport-Level Security

Insight Guide. Encryption: A Guide

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Security Sensor Network. Biswajit panja

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

Compter Networks Chapter 9: Network Security

Application Layer (1)

Error oracle attacks and CBC encryption. Chris Mitchell ISG, RHUL

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Cryptography and Security

Module 7 Security CS655! 7-1!

CSCI-E46: Applied Network Security. Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures


FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

How To Encrypt With A 64 Bit Block Cipher

Transcription:

Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 1: Introduction Ion Petre Department of IT, Åbo Akademi University January 10, 2012 1

Motto Unfortunately, the technical wizardry enabling remote collaborations is founded on broadcasting everything as sequences of zeros and ones that one's dog wouldn't recognize. What is to distinguish a digital dollar when it is as easily reproducible as the spoken word? How do we converse privately when every syllable is bounced on a satellite and smeared over an entire continent? How should a bank know that it really is Bill Gates requesting from his laptop in Fiji a transfer of $10,000,000,000 to another bank? Fortunately, the magical mathematics of cryptography can help. Cryptography provides techniques for keeping information secret, for determining that information has not been tampered with, and for determining who authored pieces of information. Ronald Rivest Foreword to Handbook of Applied Cryptography January 10, 2012 2

Why do we need cryptography? Computers are used by millions of people for many purposes Banking Shopping Tax returns Protesting Military Student records Privacy is a crucial issue in many of these applications Security is to make sure that nosy people cannot read or secretly modify messages intended for other recipients January 10, 2012 3

Security issues The world before computers was in some ways much simpler Signing, legalizing a paper would authenticate it Photocopying easily detected Erasing, inserting, modifying words on a paper document easily detectable Secure transmission of a document: seal it and use a reasonable mail carrier (hoping the mail train does not get robbed) One can recognize each other s face, voice, hand signature, etc. Electronic world: the ability to copy and alter information has changed dramatically No difference between an original file and copies of it Removing a word from a file or inserting others is undetectable Adding a signature to the end of a file/email: one can impersonate it add it to other files as well, modify it, etc. Electronic traffic can be (and is!) monitored, altered, often without noticing How to authenticate the person electronically communicating with you January 10, 2012 4

Possible adversaries Student: to have fun snooping on other people s email Cracker: to test out someone s security system, to steal data Businessman: to discover a competitor s strategic marketing plan Ex-employee: to get revenge for being fired Accountant: to embezzle money from a company Stockbroker: to deny a promise made to a customer by email Convict: to steal credit card numbers for sale Spy: to learn an enemy s military or industrial secrets Terrorist: to steal germ warfare secrets Point to make: making a network or a communication secure involves more than just keeping it free of programming errors It involves outsmarting often intelligent, dedicated and often well-funded adversaries January 10, 2012 5

Security issues: some practical situations A sends a file to B: E intercepts it and reads it How to send a file that looks gibberish to all but the intended receiver? A send a file to B: E intercepts it, modifies it, and then forwards it to B How to make sure that the document has been received in exactly the form it has been sent E sends a file to B pretending it is from A How to make sure your communication partner is really who (s)he claims to be A sends a message to B: E is able to delay the message for a while How to detect old messages A sends a message to B. Later A (or B) denies having sent (received) the message How to deal with electronic contracts E learns which user accesses which information although the information itself remains secure E prevents communication between A and B: B will reject any message from A because they look unauthentic January 10, 2012 6

Classes of network security problems Secrecy (or confidentiality) Keep the information out of the hands of unauthorized users, even if it has to travel over insecure links Authentication Determine whom you are talking to before revealing sensitive information Non-repudiation (or signatures) Prove that the order was to buy X litres of alcohol at the price before the taxes fell down and not the price after. Prove also that the order indeed existed Data integrity (or message authentication) Make sure that the message received was exactly the message you sent (not necessarily interested here in the confidentiality of the document) January 10, 2012 7

Basic situation in cryptography January 10, 2012 8

Basic situation in cryptography A(lice) sends a message (or file) to B(ob) through an open channel (say, Internet), where E(vil, nemy) tries to read or change the message A will encrypt the plaintext using a key transforming it into a unreadable cryptotext This operation must be computationally easy B also has a key (say, the same key) and decrypts the cryptotext to get the plaintext This operation must be computationally easy E tries to cryptanalyze: deduce the plaintext (and the key) knowing only the cryptotext This operation should be computationally difficult We will use cryptography to cover both the design of secure systems and their cryptanalysis cryptology is also used sometimes Do not think in terms of good guys do cryptography and bad guys do cryptanalysis January 10, 2012 9

Cryptography some types of systems Depending on the type of operations in the encryption/decryption Based on substitutions: elements in the plaintext are replaced by other elements Based on transpositions: elements in the plaintext are re-arranged Number of keys used Symmetric systems (also known as single-key, secret-key, or conventional systems) Asymmetric systems (also known as two-key, public-key, or unconventional systems) The way the plaintext is processed Block ciphers: plaintext split into blocks processed separately Stream ciphers: plaintext processed continuously January 10, 2012 10

Cryptanalysis types of attacks Fundamental rule: one must always assume that the attacker knows the methods for encryption and decryption; he is only looking for the keys Creating a new cryptographic method is a very complex process involving many people difficult to keep it confidential Bonus for publishing the methods: people will try to break it for you (for free!) Passive attack: the attacker only monitors the traffic attacking the confidentiality of the data Active attack: the adversary attempts to alter the transmission attacking data integrity, confidentiality, and authentication. Cryptanalysis: rely on the details of the encryption algorithm plus perhaps some knowledge about the general characteristics of the plaintext sometimes the plaintext is known and the key is being looked for Brute-force attack: try every possible key on the ciphertext until an intelligible translation into a plaintext is obtained January 10, 2012 11

Key Size (bits) Number of Alternative Keys Time required at 1 decryption/µs 32 2 32 = 4.3 10 9 2 31 µs = 35.8 minutes Time required at 10 6 decryptions/µs 2.15 milliseconds 56 2 56 = 7.2 10 16 2 55 µs = 1142 years 10.01 hours 128 2 128 = 3.4 10 38 2 127 µs = 5.4 10 24 years 168 2 168 = 3.7 10 50 2 167 µs = 5.9 10 36 years 26 characters (permutation) 26! = 4 10 26 2 10 26 µs = 6.4 10 12 years 5.4 10 18 years 5.9 10 30 years 6.4 10 6 years Source: W.Stallings Cryptography and network security, 5 th edition, 2011 (Table 2.2). January 10, 2012 12

Attacks on encryption schemes Type of attack Ciphertext only Known plaintext Known to cryptanalyst Encryption algorithm Ciphertext Encryption algorithm One or more pairs plaintext-ciphertext Chosen plaintext Chosen ciphertext Encryption algorithm One or more pairs plaintext-ciphertext, with the plaintext chosen by the attacker Encryption algorithm Several pairs plaintext-ciphertext, ciphertext chosen by the attacker January 10, 2012 13

Attacks on protocols Known-key attack: obtain some previous keys and use the information to get the new ones Replay: the adversary records a communication session and replays the entire session or portions of it at a later time Impersonation: adversary assume the identity of a legitimate user Dictionary: the attacker has a list of probable passwords, hashes them and compares with the entries in the list of true encrypted passwords hoping to get a match January 10, 2012 14

How secure is secure? Evaluating the security of a system is a crucial and most difficult task Unconditionally secure system If the ciphertext does not contain enough information to determine uniquely the corresponding ciphertext: any plaintext may be mapped into that ciphertext with a suitable key Consequently, the attacker cannot find the plaintext regardless of how much time and computational power he has because the information is not there! Bad news: only one known system has this property: one-time pad Complexity-theoretic security Consider a model of computation (e.g., Turing machine) and adversaries modeled as having polynomial computational power Consider the weakest possible assumptions and the strongest possible attacker and do worst-case or at least average-case analysis January 10, 2012 15

How secure is secure? Provable security Prove that breaking the system is equivalent with solving a supposedly difficult (math) problem (e.g., from Number Theory) Computationally secure The (perceived) cost of breaking the system exceeds the value of the encrypted information The (perceived) time required to break the system exceeds the useful lifetime of the information January 10, 2012 16

How large is large? Reference Order of magnitude Seconds in a year 3 x 10 7 Age of our solar system (years) 6 x 10 9 Seconds since creation of solar system 2 x 10 17 Clock cycles per year, 3 GHz computer 9.6 x 10 16 Binary strings of length 64 2 64 1.8 x 10 19 Binary strings of length 128 2 128 3.4 x 10 38 Binary strings of length 256 2 256 1.2 x 10 77 Number of 75-digit prime numbers 5.2 x 10 72 Electrons in the universe 8.37 x 10 77 Adapted from Handbook of Applied Cryptography (A.Menezes, P.van Oorschot, S.Vanstone), 1996 January 10, 2012 17

Overview of the course I. CRYPTOGRAPHY Secret-key cryptography Classical encryption techniques DES, AES, RC5, RC4 Public-key cryptography RSA Key management II. AUTHENTICATION MAC Hashes and message digests Digital signatures Kerberos III. NETWORK SECURITY Email security IP security Web security (SSL, secure electronic transactions) Firewalls Wireless security IV. OTHER ISSUES Viruses Digital cash Secret sharing schemes Zero-knowledge techniques January 10, 2012 18

About the course The goal of this course is to present the basic ideas and concepts of cryptography and network security Huge amount of interesting/useful/challenging issues skipped This should be thought of as an Introduction to course We will go occasionally into considerations of more advanced math (finite fields, modular arithmetic, number theory) No surprise here: the whole idea of cryptography is centered around difficult problems that cannot be solved unless a trap-door (key) is known No assumptions made on the math background all notions will be introduced whenever needed No need to be taken aback by the math part January 10, 2012 19

Administrative details Webpage: http://users.abo.fi/ipetre/crypto/ Email address: ion.petre@abo.fi Exam: 30 points for maximum mark, 15 to pass Not necessarily interested in the full details of the algorithms/protocols Rather on the structure of an algorithm/protocol, the rationale behind that structure Breaking or designing simple systems (simple enough for paper and pencil only) Ideas, notions, etc. Course book: W. Stallings Cryptography and network security Other useful books: C.Kaufman, R.Perlamn, M.Speciner Network security. Private communication in a public world W.Trappe, L.Washington Introduction to cryptography with coding theory See the course website for more suggested reading January 10, 2012 20

Challenges No exercises Optional assignments offering a number of points If one collects sufficiently many points, (s)he may skip exam Protocol announce the challenge at the end of a lecture allow for a couple of days before the data is published on the course website award the points to the first N correct answers received in the lecturer s inbox (email only!) before a deadline January 10, 2012 21