7! Cryptographic Techniques! A Brief Introduction



Similar documents
CRYPTOGRAPHY IN NETWORK SECURITY

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Symmetric Key cryptosystem

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Lukasz Pater CMMS Administrator and Developer

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

CSCE 465 Computer & Network Security

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

The Mathematics of the RSA Public-Key Cryptosystem

Overview of Public-Key Cryptography

An Introduction to Cryptography as Applied to the Smart Grid

SECURITY IN NETWORKS

Public Key Cryptography Overview

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

CS 758: Cryptography / Network Security

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Cryptography and Network Security Chapter 9

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Public Key (asymmetric) Cryptography

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Lecture 9 - Network Security TDTS (ht1)

EXAM questions for the course TTM Information Security May Part 1

CIS433/533 - Computer and Network Security Cryptography

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

Computer Security: Principles and Practice

Cryptography & Digital Signatures

Lecture 6 - Cryptography

IT Networks & Security CERT Luncheon Series: Cryptography

Network Security. Omer Rana

Table of Contents. Bibliografische Informationen digitalisiert durch

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

How To Know If A Message Is From A Person Or A Machine

Network Security Technology Network Management

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Network Security. Chapter 2 Basics 2.2 Public Key Cryptography. Public Key Cryptography. Public Key Cryptography

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Lecture 9: Application of Cryptography

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Network Security. HIT Shimrit Tzur-David

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

How To Encrypt Data With Encryption

Introduction to Computer Security

The science of encryption: prime numbers and mod n arithmetic

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Notes on Network Security Prof. Hemant K. Soni

CSCI-E46: Applied Network Security. Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING

Cryptography and Network Security

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Chapter 8. Network Security

Savitribai Phule Pune University

Chapter 7: Network security

Public Key Cryptography and RSA. Review: Number Theory Basics

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Public Key Cryptography of Digital Signatures

CSE/EE 461 Lecture 23

Elements of Applied Cryptography Public key encryption

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)

Security in Computer Networks

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Introduction to Cryptography

Security and Authentication Primer

Properties of Secure Network Communication

EXAM questions for the course TTM Information Security June Part 1

Cryptography and Network Security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

What is network security?

CS155. Cryptography Overview

How To Understand And Understand The History Of Cryptography

Chapter 10. Network Security

Software Tool for Implementing RSA Algorithm

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay

Module: Applied Cryptography. Professor Patrick McDaniel Fall CSE543 - Introduction to Computer and Network Security

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK

Overview. SSL Cryptography Overview CHAPTER 1

Network Security. Outline of the Tutorial

Digital Signatures. Meka N.L.Sneha. Indiana State University. October 2015

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Evaluation of the RC4 Algorithm for Data Encryption

Secure File Transfer Using USB

Cryptography and Network Security

A Novel Approach to combine Public-key encryption with Symmetric-key encryption

Application Layer (1)

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Cryptography & Network Security

Public Key Cryptography. c Eli Biham - March 30, Public Key Cryptography

Transcription:

7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures Literature:!! Bruce Schneier: Applied Cryptography, 2nd ed., John Wiley 1995!!! Klaus Schmeh: Krypografie, 5. Auflage, dpunkt 2013 1

Purpose of Cryptographic Techniques To protect the content of communication between two parties! Protection against various kinds of attacks! Preserving confidentiality and integrity of a message! Computer-equivalent to packaging and sealing! To establish the identity of communication partners (authentication)! Computer-equivalent to hand-written signature! Nonrepudiation (Zurechenbarkeit): Avoiding false denial of the fact that someone has sent a message!! Applications for networked multimedia:! Encrypted content in DRM, decryption only for authorized users! Packaging keys and right specifications in DRM! Identifying business partners for payment procedures! Protecting electronic forms of money! Protecting important personal data 2

Encryption and Decryption Plaintext Encryption Ciphertext Decryption Original! Plaintext A sender (often called Alice) wants to send a message to a receiver (often called Bob), in a way that an eavesdropper (often called Eve) cannot read the message.! Plaintext message (binary data) M" Ciphertext C" Encryption E:" E(M) = C" Decryption D:" D(C) = M" such that D(E(M)) = M" Encryption/Decryption should not rely on keeping the algorithms secret.! Kerckhoffs principle 3

Encryption and Decryption Keys Key Key Plaintext Encryption Ciphertext Decryption Original! Plaintext Encryption E:" E(K 1, M) = C" Decryption D:" D(K 2, C) = M" such that D(K 2, E(K 1, M)) = M" Special case: Identical keys for encryption and decryption (symmetry) 4

Attack Terminology Ciphertext-only attack! Recover the plaintext or the keys based only on the ciphertext! Known-plaintext attack:! Deduce the keys from given plaintext and corresponding ciphertext! Chosen-plaintext attack:! Attacker (cryptanalyst) can obtain the encoding result on an arbitrary plaintext! Chosen-ciphertext attack:! Attacker (cryptanalyst) can obtain the decoding result on an arbitrary ciphertext!! Brute-force attack! Trying out all possible keys! Breakability depends on available computing power 5

7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures Literature:!! Bruce Schneier: Applied Cryptography, 2nd ed., John Wiley 1995!!! Klaus Schmeh: Krypografie, 5. Auflage, dpunkt 2013 6

Symmetric Cryptographic Algorithms Encryption and decryption using the same key! Alternatively: One key can be computed from the other! Stream algorithms or stream ciphers:" Operate bit-by-bit (or byte-by-byte)! Block algorithms or block ciphers:" Operate on larger groups of bits (blocks)! Block size should not be too large - typical 64 bits Firefox encryption details message 7

Data Encryption Standard DES 64 bit input Initial permutation Round 1 Symmetric block cipher (64 bit blocks)! Adopted by U.S. government in 1977, based on IBMs Lucifer algorithm! Designed for hardware realization! Key length: 56 bits! Each of the 16 rounds : Round 16 32-bit swap Final permutation 64 bit output L(i) L(i+1) R(i) L(i) XOR f(r(i), K(i)) R(i+1) Encoding and decoding algorithms identical f does a number of permutations and substitutions 8

DES Example for an Aging Standard Brute force attack to DES: 2 56 permutations to be tried! 56 bit keys considered unbreakable in 1977! Specialized hardware can test DES keys very fast! Rumours persist that the NSA (US National Security Agency) can break 56- bit DES in a few minutes time! 1997: DES Challenge!» After 4 months, a DES-encrypted message could be decrypted! 2000: DES Challenge III won by distributed.net in 22 hours!» Specialized supercomputer + CPU time from 100.000 PCs in the Internet!» Key test rate 240 billion keys/second! Practical workaround: Triple DES! Obstacle for unbreakable codes:! U.S. government apparently wants to be able to break the standard encryptions! Strong cryptographic products are considered weapon technology by the U.S. government! 9

Advanced Encryption Standard AES U.S. National Institute of Standards and Technology (NIST)! 1997: Call for proposals for an unclassified, publicly disclosed symmetric encryption algorithm, key sizes 128, 192, and 256 bits! 15 submissions, 5 candidates selected (MARS, RC6, Rijndael, Serpent, Twofish)! 2000: Rijndael declared to be official AES! Rijndael (Joan Daelen, Vincent Rijmen, Belgium):! Between 10 and 14 rounds, depending on key and block length! Operations in each round:!» XOR!» Byte substitution!» Row shift (in a grid representation)!» Mixing of columns based on polynomial (in a grid representation)!! Other common alternative symmetric algorithms: RC4, RC6 ((Ronald) Rivest Cipher) 10

7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures Literature:!! Bruce Schneier: Applied Cryptography, 2nd ed., John Wiley 1995!!! Klaus Schmeh: Krypografie, 5. Auflage, dpunkt 2013 11

Asymmetric or Public Key Encryption Main problem of symmetric cryptography: How to obtain the shared, secret key?! Off-line transportation! Key distribution architectures, e.g. Kerberos! Public-key cryptography: Whitfield Diffie, Martin Hellman 1976! Each person gets a private (secret) key and a public key! Public-Key Cryptosystem:! Encryption with public key:! PK(M) = C" Decryption with secret key:! SK(C) = M"!!!! such that! SK(PK(M)) = M" By publicly revealing PK, user does not reveal an easy way to compute SK.! Mathematical background: Trapdoor one-way function! e.g. prime factorization of large numbers 12

Example Public Key -----BEGIN PGP PUBLIC KEY BLOCK-----! Version: GnuPG v1.4.1 (Darwin)!! mqgibeijhz4rbadcslcc9cx1zcfkcui3gjbqikbyptsgd71hgorg9q13zwxlrgvt! 0thGybaC0ftSYoAlqPmsWqBGAPXtNYB8igHaqq+qfbO99HVK5lQTptR58zbqPZ7S! wpvzdmx7/tujvkc9pwswncfjluwh0hqy7ahsr86ccfocfkyfn4eafocjqwcg+bb8! Ry/JlqbASmXz/bzOidfexVUD/3qxIzTse//r0p28bKfeyVFcleov5Z1diMTwNywm! K+56wqZLeE70va3g55t1Haed2t9OJ6rC6Hlik1tMWl1kfiW85NSj0Lb1Yz8LMs8C! k7fgswbbbryj7wjdmex1vpbjvkq1gezgn9uph8/idwtedlbm9n49adrxaydyr6w5! VZ12A/95DKFTOgE6VNiriEJ3c+LHGE8CQ0J8OL1UYyWL+iZdXvvUyKmu0JMSjxfA! J+05FR3BYpOKWtrgEZT/djPEjy4zsWi1vKZ7jgq7yb1dltPfy5rMNUnyk9PzGq78! 6DQRzcb/GbLy+ocZyldhympfBIFAjMFQoIgZiYuFaPFhvmHRprQnSGVpbnJpY2gg! SHVzc21hbm4gPGh1c3NtYW5uQGlmaS5sbXUuZGU+iF4EExECAB4FAkIjHZ4CGwMG! CwkIBwMCAxUCAwMWAgECHgECF4AACgkQ4NBNTLlLJwWhewCfQmn5tkFKbggyyT2G! l4vaxurmqfwan16avv0vzjt64tsp1pq36kabqmymuqenbeijhaeqbachr51/r2jf! QU128JBC6tlQaaREmqk6Zp49puu60tieSj3F6h+hrjn37sA0eltIuQJqjGJQjn90! RKEBoSHUliKITF+9v2n1t8UMf7VNQIbTvzO9X1ac/SqWYewllXlvRiFfTPwOhgD8! BEQ/yoiwbt6yCWbF8jNoDTipECgxFuyQfwADBQP/fNo9Hhl87uek8nTidbL0Di0D! +hezeoa9rp/7rt+y5330xjv+sph2sxflqc95tj7vnjei8lvjiwtu8tdu3pm/x/xv! s+0y/nsqc9hglydznemgqhpdemb1vddp60/flkkqkrpvtiqg12nrbshlow/nyfpe! LHlH11ZALHtcLhYfB2uISQQYEQIACQUCQiMdoQIbDAAKCRDg0E1MuUsnBc3JAJ93! PayXxyXeBxtb40dxy32DHHtTVgCgrD/Kyc8D14xcbo6Sn18VXKCAqm0=! =klxh! -----END PGP PUBLIC KEY BLOCK----- 13

RSA: Mathematics Ronald Rivest, Adi Shamir, Leonard Adleman 1978 (MIT)! Creating a public/secret key pair:! Choose two large primes p and q and compute the modulus n = pq" Randomly choose a number e < n, relatively prime to φ = (p 1)(q 1) (Eulers totient function)!» (n, e) is the public encryption key! Compute d as inverse of e (modulo φ): i.e. such that (ed 1) mod φ! Encryption:!» (n, d) is the secret decryption key! C = M e mod n" Decryption:! M = C d mod n"! For an example, see e.g. http://www.di-mgt.com.au/rsa_alg.html 14

RSA: Mathematics Example Creating a public/secret key pair:! Choose two (large) primes p and q and compute the modulus n = pq"» p = 11, q = 13, n = 143 (in practice much larger!)" Randomly choose a number e < n, relatively prime to φ = (p 1)(q 1) = 120"» E.g. e = 23 (in practice, Fermat primes are used, e.g. 3, 17 and 65537)"» (143, 23) is the public encryption key! Compute d such that (ed 1) mod φ, i.e. (ed 1) = k φ, i.e. (23 d 1) = k 120"» Apply extended Euclidian algorithm: d = 47, k = 9"» (143, 47) is the secret decryption key! Encryption:! C = M e mod n, e.g. C = 7 23 mod 143 = 2 (Modular arithmetic)" Decryption:! M = C d mod n, e.g. M = 2 47 mod 143 = 7 15

RSA: Pragmatics Key size is variable, typical 1024 bits! RSA relies on exponentiation which is computing-intensive! DES is at least 100 times as fast as RSA in software and 1000 to 10000 times as fast in hardware! Security of RSA is conjectured to rely on factorization of large numbers into primes! Hybrid usage of symmetric and asymmetric cryptosystems (enveloping)" Choose a symmetric key (e.g. for AES)! Encode the symmetric key with an asymmetric cryptosystem (e.g. RSA) to transmit the shared (symmetric) key to the communication partner! Combination of advantages:!» Use asymmetric system for keeping the secrets locally!» Use symmetric system for mass-data encoding! RSA is part of many Internet protocols for secure interaction, e.g. S/MIME, SSL, TLS, IPsec,... 16

7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures Literature:!! Bruce Schneier: Applied Cryptography, 2nd ed., John Wiley 1995!!! Klaus Schmeh: Krypografie, 5. Auflage, dpunkt 2013 17

Digital Signature with Asymmetric Cryptosystems Message authentication (digital signature):! To establish trust that a message actually originates from a certain sender! Must involve full message body, i.e. similar to message encryption! Some asymmetric cryptosystems allow to use inverse encryption for a digital signature, e.g. RSA! For such cryptosystems, the inverse equation holds: PK(SK(M)) = M" Encryption with own secret key! Verification possible by anybody knowing the public key! Example: Alice wants to send a message M to Bob ensuring the message s integrity and that it is from her! S = M d mod n" Alice sends M and S to Bob! Bob verifies:! M = S e mod n" (n, d) is Alice s secret key Equivalent to decryption algorithm! (n, e) is Alice s public key Equivalent to encryption algorithm! Other digital signature standards exist, e.g. DSS/DSA (Digital Signature Standard/Algorithm by NIST) 18

Message Digesting or Hashing Sometimes not encryption, but integrity of message is the goal! Simpler algorithms similar to symmetric encryption! Hash (or digesting) function for messages! Computes short code from long message! Difficult to invert (i.e. to obtain message from code)! Collision-resistant (i.e. unlikely to find two messages with same hash code)!! Examples of message digesting algorithms:! MD5 (Ron Rivest) (128 bit code)! Secure Hash Algorithm SHA (NIST) (160 bit code)!! Combination of message digest and signing the digest:! Faster way of authenticating a message 19

7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures Literature:!! Bruce Schneier: Applied Cryptography, 2nd ed., John Wiley 1995!!! Klaus Schmeh: Krypografie, 5. Auflage, dpunkt 2013 20

Public Key Infrastructure Weak point in public-key cryptosystems! Association public key / real identity! Establishing trust in public keys:! Trusted Third Party (TTP)!» e.g. governmental organisation, financial institution! TTP issues a message (certificate) that contains!» User identity!» Public key!» Validity period!» Issuer (TTP identity)! TTP signs certificate!» This can be achieved by using the own public key! Firefox certificate settings Identity Certificate Signa-! PK ture» All participants know the signatures (public keys) of TTP, i.e. can trust that the certificates actually come from the issuing TTP 21

Certification Authorities A TTP issuing certificates is a Certification Authority (CA)! CAs are organized in a hierarchy, signature of root CA universally known CA1 PK CA1 Sig Root Root CA CA2 PK CA2 Sig Root CA 1 CA 2 Alice Alice PK Alice Sig CA1 Bob PK Bob Sig CA2 Bob The certificates for the public key can be transferred with the message (or put on a website etc.)! E.g. message from Alice to Bob: CA1 PK CA1 Sig Root Alice PK Alice Sig CA1 Message... 22

Digital Signatures and PKI The chain of trust in a PKI can be reduced to the single fact! Everybody knows the public key PK Root of the Root CA! Root CA signs CAx certificates using its secret key SK Root! Everybody can verify the certificates using PK Root! CAx signs certificates using its secret key SK CAx! Everybody can verify the certificate as soon as he has PK CAx!... which he can obtain from a Root-signed certificate CA1 PK CA1 Sig Root Alice PK Alice Sig CA1 Message... Google certificate chain shown by Firefox 23

Web of Trust No central certification authority; mutual certification! Users can define individual level of trust in the owner of a key! Well-known implementations: PGP and GPG Picture: Wikipedia 24