Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras



Similar documents
CSE 5392 Sensor Network Security

Computer and Network Security. Alberto Marchetti Spaccamela

Content Teaching Academy at James Madison University

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Advanced Topics in Cryptography and Network Security

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Client Server Registration Protocol

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring Nitesh Saxena Polytechnic University

Cryptography & Network Security

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

CPSC 467b: Cryptography and Computer Security

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

CS 758: Cryptography / Network Security

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

SE 4472a / ECE 9064a: Information Security

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

Information Security Course Specifications

Message Authentication Codes

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

IT Networks & Security CERT Luncheon Series: Cryptography

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

CSCI-E46: Applied Network Security. Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING

NEW HORIZON COLLEGE OF ENGINEERING, BANGALORE CLOUD COMPUTING ASSIGNMENT Explain any six benefits of Software as Service in Cloud computing?

Chapter 8. Network Security

Cryptography and Network Security

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

An Introduction to Cryptography as Applied to the Smart Grid

Cryptography & Digital Signatures

Certificate in Cyber Security

Software Tool for Implementing RSA Algorithm

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

CSCE 465 Computer & Network Security

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Computer Security: Principles and Practice

CRYPTOGRAPHY IN NETWORK SECURITY

NETWORK ADMINISTRATION AND SECURITY

Network Security. HIT Shimrit Tzur-David

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Overview of Public-Key Cryptography

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Lecture 6 - Cryptography

A SOFTWARE COMPARISON OF RSA AND ECC

Lecture 9 - Network Security TDTS (ht1)

EDA385 Embedded Systems Design. Advanced Course

Cryptography and Key Management Basics

Modeling and verification of security protocols

Network Security Course Specifications

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

CS Computer Security Third topic: Crypto Support Sys

Cryptography and Network Security Chapter 12

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015

Chapter 7: Network security

7! Cryptographic Techniques! A Brief Introduction

CSE/EE 461 Lecture 23

Lecture 9: Application of Cryptography

Module 1: e- Learning

CIS433/533 - Computer and Network Security Cryptography

Overview. SSL Cryptography Overview CHAPTER 1

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

SECURITY IN NETWORKS

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Compter Networks Chapter 9: Network Security

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

Chapter 10. Network Security

Cryptography and Network Security Chapter 9

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Network Security Technology Network Management

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

CPSC 467: Cryptography and Computer Security

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

NXP & Security Innovation Encryption for ARM MCUs

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

HW/Lab 1: Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am)

Introduction to Encryption

CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University

Chapter 23. Database Security. Security Issues. Database Security

Cryptographic Hash Functions Message Authentication Digital Signatures

How To Understand And Understand The History Of Cryptography

Application Layer (1)

Table of Contents. Bibliografische Informationen digitalisiert durch

Information Security

Sandeep Mahapatra Department of Computer Science and Engineering PEC, University of Technology

Transcription:

Cryptography & Network Security Introduction Chester Rebeiro IIT Madras

The Connected World 2

Information Storage 3

Increased Security Breaches 81% more in 2015 http://www.pwc.co.uk/assets/pdf/2015-isbs-executive-summary-02.pdf 4

Security Threats (why difficult to prevent?) Networks / Communication links Hardware System Software (Operating Systems / Hypervisor) Applications Attackers need to target the weakest link in the chain Peripherals 5

Security Studies (Research) (an ocean) Networks / Communication links Network Security Hardware Hardware Security System Software System Security (Operating Systems / Hypervisor) OS Security Applications Cloud Security Web Security Cryptography DBMS Security Peripherals Embedded Security 6

Cryptography A crucial component in all security systems Fundamental component to achieve Confidentiality Allows only authorized users access to data 7

Cryptography (its use) A crucial component in all security systems Fundamental component to achieve Confidentiality Data Integrity Cryptography can be used to ensure that only authorized users can make modifications (for instance to a bank account number) 8

Cryptography (its use) A crucial component in all security systems Fundamental component to achieve Confidentiality Data Integrity Authentication Cryptography helps prove identities 9

Cryptography (its use) A crucial component in all security systems Fundamental component to achieve Confidentiality Data Integrity Authentication Non-repudiation I did not send that The sender of a message cannot claim that she did not send it 10

Scheme for Confidentiality Alice message Attack at Dawn!! untrusted communication link Bob Problem : Alice wants to send a message to Bob (and only to Bob) through an untrusted communication link Mallory 11

Encryption K E K D Alice untrusted communication link E #%AR3Xf34^$ message encryption (ciphertext) Attack at Dawn!! D decryption Bob Attack at Dawn!! Secrets Only Alice knows the encryption key K E Only Bob knows the decryption key K D Mallory Only sees ciphertext. cannot get the plaintext message because she does not know the keys 12

Encryption Algorithms K E K D Alice untrusted communication link E D #%AR3Xf34($ encryption (ciphertext) decryption Bob Attack at Dawn!! Should be easy to computefor Alice / Bob (who know the key) Should be difficult to compute for Mallory (who does not know the key) What is difficult? Ideal case : Prove that the probability of Mallory determining the encryption / decryption key is no better than a random guess Computationally : Show that it is difficult for Mallory to determine the keys even if she has massive computational power 13

Algorithmic Attacks Can Mallory use tricks to break the algorithm E There by reducing the difficulty of getting the key. 14

Encryption Keys K E K D Alice untrusted communication link E D #%AR3Xf34($ encryption (ciphertext) decryption Bob Attack at Dawn!! How are keys managed How does Alice & Bob select the keys? Need algorithms for key exchange 15

Ciphers Symmetric Algorithms Encryption and Decryption use the same key i.e. K E = K D Examples: Block Ciphers : DES, AES, PRESENT, etc. Stream Ciphers : A5, Grain, etc. Asymmetric Algorithms Encryption and Decryption keys are different K E K D Examples: RSA ECC 16

Cipher Implementations Cryptography is always an overhead!! For security, the algorithms need to be computation intensive. Often require large numbers, complex mathematical operations. Design Challenges: Performance, Size, Power. Algorithms to achieve this 17

Encryption Devices K E K D Alice untrusted communication link E #%AR3Xf34($ message encryption (ciphertext) Attack at Dawn!! D decryption Bob Attack at Dawn!! Side Channels Eg. Power consumption / radiation of device, execution time, etc. Mallory Gets information about the keys by monitoring Side channels of the device 18

Side Channel Analysis 00111 Alice E message encryption Attack at Dawn!! Radiation from Device Secret information 0 0 1 1 1 19

Ciphers Design Challenges Tradeoffs between Security, Speed, Side-Channel Attacks We want crypto algorithms to be fast and small For security, the algorithms are computationally intensive. Typically use large numbers, complex operations Need to protect against side channel attacks.

Cryptography Study Mathematics + Engineering Mathematics Electrical Engg. cryptography Physics Computer Sc. 21

Some Hot Research Trends efficient implementations cryptanalysis privacy enhancing security post-quantum cryptography light weight cryptography Leakage resilient cryptography side channel analysis cloud security homomorphic encryption 22

The Plan Ahead How are ciphers designed? Ideal security vs Computational security Block ciphers / Stream ciphers Asymmetric key ciphers Trade offs between security and implementation Attacks Algorithmic / Side Channel Analysis Applications How are they used to achieve confidentiality, integrity, authentication, non-repudiation Case Studies Network security aspects, Bitcoins 23

Course Structure Classical Cryptography Shannon s Theory Block Ciphers DES, AES, their implementations and their attacks Stream Ciphers Digital Signatures and Authentication Hash functions Public key ciphers RSA, implementations, and attacks Side channel analysis Network Security aspects Case Studies : Bitcoins 24

Expected Learning Outcomes What you would learn by the end of the course Distinguish between cipher algorithms - Where to use what algorithm? Evaluate ciphers and their implementations for security - Mathematical cryptanalysis of some algorithms - Side channel based attacks on cipher implementations Apply algorithms to solve security problems in networks and real-world systems 25

Books / References Textbooks (STINSON)''Cryptography: Theory and Practice", Third Edition, by Douglas R. Stinson, C Press, Taylor and Francis Group References (STALLINGS) ''Cryptography and Network Security: Principles and Practices'', Sixth Edition, by William Stallings (HANDBOOK)''Handbook of Applied Cryptography'', Fifth Printing, by Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, C Press (HARDSEC)''Hardware Security : Design, Threats, and Safeguards", by Debdeep Mukhopadhyay and Rajat Subhra Chakraborty, C Press, Taylor and Francis Group 26

Grading Quiz 1 : 20% Quiz 2 : 20% End semester : 40% Assignments : 20% Surprise tests / Tutorials / Programming assignments / minute papers / Google groups / etc. Self Study vs Attending Classes Same tutorials / assignments / quizzes / etc. Grading policy is different 27

Course Webpages For slides / syllabus / schedule etc. http://www.cse.iitm.ac.in/~chester/courses/16e_cns/index.html For discussions / announcements / submissions CSE Moodle Google Groups (cnsiitm_2016) 28

Logistics CS26 Time: Tuesdays : 11:00-11:50 AM Wednesdays : 10:00-10:50 AM Thursdays : 8:00-8:50 AM Fridays : 2:00 2:50 PM 29