Advanced Topics in Cryptography and Network Security



Similar documents
Lecture 1: Introduction. CS 6903: Modern Cryptography Spring Nitesh Saxena Polytechnic University

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

CS 758: Cryptography / Network Security

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

CSCE 465 Computer & Network Security

Overview of Public-Key Cryptography

CPSC 467b: Cryptography and Computer Security

SFWR ENG 4C03 - Computer Networks & Computer Security

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CSE/EE 461 Lecture 23

How To Protect Your Data From Attack

CS558. Network Security. Boston University, Computer Science. Midterm Spring 2014.

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Schnorr Signcryption. Combining public key encryption with Schnorr digital signature. Laura Savu, University of Bucharest, Romania

Lecture 3: One-Way Encryption, RSA Example

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Cryptography and Network Security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Introduction. Digital Signature

Symmetric Crypto MAC. Pierre-Alain Fouque

Cryptography and Network Security: Summary

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

CS 161 Computer Security Spring 2010 Paxson/Wagner MT2

An Introduction to Cryptography and Digital Signatures

Chapter 37. Secure Networks

Cryptography & Network Security

Principles of Network Security

Content Teaching Academy at James Madison University

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Message Authentication Codes

Chapter 7: Network security

Elements of Applied Cryptography Public key encryption

The Mathematics of the RSA Public-Key Cryptosystem

Network Security Protocols

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Chapter 3. Network Domain Security

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

Chapter 10. Network Security

Keywords- Cloud Computing, Android Platform, Encryption, Decryption, NTRU, RSA, DES, throughput.

CSci 530 Midterm Exam. Fall 2012

Computer and Network Security. Alberto Marchetti Spaccamela

First Semester Examinations 2011/12 INTERNET PRINCIPLES

TELE 301 Network Management. Lecture 18: Network Security

An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood

CRYPTOGRAPHY IN NETWORK SECURITY

Savitribai Phule Pune University

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Network Security. HIT Shimrit Tzur-David

Cryptographic Hash Functions Message Authentication Digital Signatures

Talk announcement please consider attending!

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Software Tool for Implementing RSA Algorithm


Module 1: e- Learning

Chapter 6 CDMA/802.11i

Information Security

VoteID 2011 Internet Voting System with Cast as Intended Verification

Public Key Cryptography Overview

What is network security?

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

SECURITY IN NETWORKS

CIS 5371 Cryptography. 8. Encryption --

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

CS 494/594 Computer and Network Security

Overview of Symmetric Encryption

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Lecture 6 - Cryptography

Authenticated encryption

CS Computer Security Third topic: Crypto Support Sys

Ch.9 Cryptography. The Graduate Center, CUNY.! CSc Theoretical Computer Science Konstantinos Vamvourellis

Authentication and Encryption: How to order them? Motivation

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Introduction to Cryptography

Network Security Technology Network Management

CS155. Cryptography Overview

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

Introduction To Security and Privacy Einführung in die IT-Sicherheit I

Symmetric Key cryptosystem

The application of prime numbers to RSA encryption

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

CSCI 4541/6541: NETWORK SECURITY

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

Public Key Cryptography and RSA. Review: Number Theory Basics

Introduction to Computer Security

Transcription:

Advanced Topics in Cryptography and Network Security Breno de Medeiros Department of Computer Science Florida State University Advanced Topics in Cryptography and Network Security p.1

Class Reference Sheet Intructor s webpage: http://www.cs.fsu.edu/ breno Course webpage: http://www.cs.fsu.edu/ breno/cis-6930/advanced.html Textbook: Modern Cryptography: Theory and Practice, by Wenbo Mao Office hours: Tuesdays and Wednesdays, 3:00 5:00pm, at LOVE 269, or by appointment. Phone: 645-2356 Electronic mail: breno [at] cs department domain name Breno de Medeiros, Florida State University :: Adv. Top. Crypt. Netw. Sec. p.2

Course goal To prepare you for research in the applied cryptography and network security areas. This requires that you acquire a number of different skills: How you will be evaluated: Learn how to define/understand security notions; Midterm/ presentations/ class participation / essay Understand the structure of a security proof; Midterm/ presentations/ class participation / essay Familiarize yourself with foundational works; presentations/ essay Know how to organize and write a paper or technical report. presentations/ essay Breno de Medeiros, Florida State University :: Adv. Top. Crypt. Netw. Sec. p.3

Evaluation Grade formula: 0.2M + 0.15C + 0.25P + 0.4E, where M is the midterm grade, C is your class participation grade, P is the grade on presentations, and E is the grade of your essay. What constitutes classroom participation? Attendance Questions asked in class, via e-mail, during office hours Participation in classroom discussions The rationale of classroom participation grade is that research requires being able to communicate with colleagues and exchange ideas. Presentations: A paper reading list will be provided, and each paper will be assigned two students, a presenter and a moderator. The presenter prepares a 45-minute Breno de Medeiros, slideflorida presentation State University :: Adv. Top. including Crypt. Netw. Sec. p.4

Course contents Randomized complexity classes One-way functions and complexity-based security Security notions of signature schemes, public key encryption schemes, message authentication codes and symmetric encryption modes Provably secure constructions of the above primitives Analysis of security protocols using formal methods: formal specification, and state-system exploration. Breno de Medeiros, Florida State University :: Adv. Top. Crypt. Netw. Sec. p.5

Motivation for the use of complexity-theoretical notions in security Breno de Medeiros Department of Computer Science Florida State University Breno de Medeiros, Florida State University :: Adv. Top. Crypt. Netw. Sec. p.6

Example: encryption A typical application of cryptography in network security is to enable two parties to communicate confidentially over a (non-physically secured) communication means, such as radio waves, the Internet, etc. Traditionally, this is achieved via encryption. Alice uses encryption to transform intelligible messages M (plaintext) into obscured messages C (ciphertext). Bob uses the inverse operation (decryption) to recover M from C. Security requirement: Eavesdropper cannot figure out which message M was sent from Alice to Bob, even if it can capture the ciphertext C during transmission. Question: How to formalize such a requirement so that it may be (mathematically, formally) proven to hold (or not to hold)? Breno de Medeiros, Florida State University :: Adv. Top. Crypt. Netw. Sec. p.7

Example: Key agreement To communicate efficiently using encryption, Alice and Bob must have agreed on a secret value that only they know. This can be achieved using communication through a physically secure channel to exchange a common secret directly; or, Alice and Bob can exchange some messages through public channels and extract from these a common secret value that remains secret from eavesdroppers. In either case, we would like to be able to make evaluations such as: The key agreement protocol is secure/insecure. Breno de Medeiros, Florida State University :: Adv. Top. Crypt. Netw. Sec. p.8

From Security to Complexity Theory In order to formalize this, we need to understand notions such as Efficient Computability: For e.g., an encryption scheme must be usable; Computational Infeasibility: E.g., an eavesdropper should not be able to figure out the contents of encrypted messages. These are notions from complexity theory. Breno de Medeiros, Florida State University :: Adv. Top. Crypt. Netw. Sec. p.9