Computer Security: Principles and Practice



Similar documents
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Public Key Cryptography Overview

Cryptography and Network Security Chapter 10

Cryptography and Network Security

Cryptography and Network Security Chapter 11

Digital Signature. Raj Jain. Washington University in St. Louis

Authentication requirement Authentication function MAC Hash function Security of

An Introduction to Cryptography as Applied to the Smart Grid

Public Key (asymmetric) Cryptography

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

CSCE 465 Computer & Network Security

Notes on Network Security Prof. Hemant K. Soni

Lecture 9: Application of Cryptography

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Overview of Public-Key Cryptography

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

CRYPTOGRAPHY IN NETWORK SECURITY

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Network Security. Chapter 2 Basics 2.2 Public Key Cryptography. Public Key Cryptography. Public Key Cryptography

Cryptography and Network Security Chapter 9

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

SECURITY IN NETWORKS

Cryptography and Network Security Chapter 12

Cryptographic Hash Functions Message Authentication Digital Signatures

Public Key Cryptography and RSA. Review: Number Theory Basics

CSCI-E46: Applied Network Security. Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING

EXAM questions for the course TTM Information Security June Part 1

7! Cryptographic Techniques! A Brief Introduction

Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem

IT Networks & Security CERT Luncheon Series: Cryptography

Introduction to Cryptography CS 355

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Cryptography and Network Security Digital Signature

EXAM questions for the course TTM Information Security May Part 1

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

The Mathematics of the RSA Public-Key Cryptosystem

Public Key Cryptography. c Eli Biham - March 30, Public Key Cryptography

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Digital Signatures. Meka N.L.Sneha. Indiana State University. October 2015

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Digital Signatures. (Note that authentication of sender is also achieved by MACs.) Scan your handwritten signature and append it to the document?

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms

National Security Agency Perspective on Key Management

Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis

SFWR ENG 4C03 - Computer Networks & Computer Security

2. Cryptography 2.4 Digital Signatures

Table of Contents. Bibliografische Informationen digitalisiert durch

A Survey of the Elliptic Curve Integrated Encryption Scheme

Center for Internet Security. INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO

Crittografia e sicurezza delle reti. Digital signatures- DSA

A Factoring and Discrete Logarithm based Cryptosystem

Message Authentication

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

CS 758: Cryptography / Network Security

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

A Novel Approach to combine Public-key encryption with Symmetric-key encryption

Public Key Cryptography of Digital Signatures

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Cryptography Lecture 8. Digital signatures, hash functions

Chapter 7: Network security

Practice Questions. CS161 Computer Security, Fall 2008

Lecture 6 - Cryptography

A SOFTWARE COMPARISON OF RSA AND ECC

Authentication, digital signatures, PRNG

Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths

Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor

Discrete logarithms within computer and network security Prof Bill Buchanan, Edinburgh Napier

Introduction to Computer Security

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

RSA BSAFE. Crypto-C Micro Edition for MFP SW Platform (psos) Security Policy. Version , October 22, 2012

The Misuse of RC4 in Microsoft Word and Excel

Secure Sockets Layer

HASH CODE BASED SECURITY IN CLOUD COMPUTING

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

Message Authentication Codes. Lecture Outline

Symmetric Key cryptosystem

Elements of Applied Cryptography Public key encryption

Network Security. Omer Rana

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

DIGITAL SIGNATURES 1/1

Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection

Application of Digital Signature for Securing Communication Using RSA Scheme based on MD5

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Security and Authentication Primer

Lukasz Pater CMMS Administrator and Developer

1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Digital Signature For Text File

Chapter 7 Transport-Level Security

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Transcription:

Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown

Public-Key Cryptography and Message Authentication now look at technical detail concerning: secure hash functions and HMAC RSA & Diffie-Hellman Public-Key Algorithms

Simple Hash Functions a one-way or secure hash function used in message authentication, digital signatures all hash functions process input a block at a time in an iterative fashion one of simplest hash functions is the bit- by-bit bit exclusive-or (XOR) of each block C i = b i1 b i2... b im effective data integrity check on random data less effective on more predictable data virtually useless for data security

SHA Secure Hash Functions SHA originally developed by NIST/NSA in 1993 was revised in 1995 as SHA-1 US standard for use with DSA signature scheme standard is FIPS 180-1 1 1995, also Internet RFC3174 produces 160-bit hash values NIST issued revised FIPS 180-2 2 in 2002 adds 3 additional versions of SHA SHA-256, SHA-384, SHA-512 with 256/384/512-bit hash values same basic structure as SHA-1 1 but greater security NIST intend to phase out SHA-1 1 use

SHA-512 Structure

SHA-512 Round

Other Secure Hash Functions most based on iterated hash function design if compression function is collision resistant so is resultant iterated hash function MD5 (RFC1321) was a widely used hash developed by Ron Rivest produces 128-bit hash, now too small also have cryptanalytic concerns Whirlpool (NESSIE endorsed hash) developed by Vincent Rijmen & Paulo Barreto compression function is AES derived W block cipher produces 512-bit hash

HMAC interest a MAC using a cryptographic hash due to speed and code availability must incorporate key into use of hash alg HMAC (RFC2104) widely supported used in IPsec,, TLS & SET HMAC treats hash as black box HMAC proven secure if embedded hash function has reasonable cryptographic strength

HMAC Structure

Security of HMAC security based on underlying hash strength have prob given time and no msg-mac MAC s either attacker computes output even with random secret IV brute force key O(2 n ), or use birthday attack or attacker finds collisions in hash function even when IV is random and secret ie.. find M and M' ' such that H(M) ) = H(M') birthday attack O( 2 n/2 ) MD5 secure in HMAC since only observe

RSA Public-Key Encryption by Rivest,, Shamir & Adleman of MIT in 1977 best known & widely used public-key alg uses exponentiation of integers modulo a prime encrypt: C = M e mod n decrypt: M = C d mod n = (M( e ) d mod n = M both sender and receiver know values of n and e only receiver knows value of d public-key encryption algorithm with public key PU = {e,{ n} } & private key PR = {d,{ n}.

RSA Algorithm

RSA Example

brute force Attacks on RSA trying all possible private keys use larger key, but then slower mathematical attacks (factoring n) see improving algorithms (QS, GNFS, SNFS) currently 1024-2048 2048-bit keys seem secure timing attacks (on implementation) use - constant time, random delays, blinding chosen ciphertext attacks (on RSA props)

Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts note: now know that Williamson (UK CESG) secretly proposed the concept in 1970 practical method to exchange a secret key used in a number of commercial products security relies on difficulty of computing discrete logarithms

Diffie- Hellman Algorithm

have Diffie-Hellman Example prime number q = 353 primitive root α = 3 A and B each compute their public keys A computes Y A = 3 97 mod 353 = 40 B computes Y B = 3 233 mod 353 = 248 then exchange and compute secret key: for A: K = (Y( B ) XA mod 353 = 248 97 mod 353 = 160 for B: K = (Y( A ) XB mod 353 = 40 233 mod 353 = 160 attacker must solve: 3 a mod 353 = 40 which is hard desired answer is 97, then compute key as B does

Key Exchange Protocols

Man-in in-the-middle Attack attack is: 1. Darth generates private keys X D1 & X D2, and their public keys Y D1 & Y D2 2. Alice transmits Y A to Bob 3. Darth intercepts Y A and transmits Y D1 to Bob. Darth also calculates K2 4. Bob receives Y D1 and calculates K1 5. Bob transmits X A to Alice 6. Darth intercepts X A and transmits Y D2 to Alice. Darth calculates K1 7. Alice receives Y D2 and calculates K2 all subsequent communications compromised

Other Public-Key Algorithms Digital Signature Standard (DSS) FIPS PUB 186 from 1991, revised 1993 & 96 uses SHA-1 1 in a new digital signature alg cannot be used for encryption elliptic curve cryptography (ECC) equal security for smaller bit size than RSA seen in standards such as IEEE P1363 still very new, but promising based on a mathematical construct known as the elliptic curve (difficult to explain)

Summary discussed technical detail concerning: secure hash functions and HMAC RSA & Diffie-Hellman Public-Key Algorithms