IT Networks & Security CERT Luncheon Series: Cryptography



Similar documents
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

EXAM questions for the course TTM Information Security May Part 1

Chapter 8. Network Security

Chapter 10. Network Security

Lecture 9 - Network Security TDTS (ht1)

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Table of Contents. Bibliografische Informationen digitalisiert durch

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Cryptography & Digital Signatures

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Authentication requirement Authentication function MAC Hash function Security of

Homework 2. A 4*4 image with 16 pixels Borders unaltered. Color of B2 = Average color of (B1,A2,B3,C2) A1 A2 A3 A4 B1 B2 B3 B4 C1 C2 C3 C4 D1 D2 D3 D4

CRYPTOGRAPHY IN NETWORK SECURITY

Cryptography & Network Security

Cyber Security Branch. Security+ Review Course. Version 4.1

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

VALLIAMMAI ENGINEERING COLLEGE

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Message authentication and. digital signatures

Savitribai Phule Pune University

An Introduction to Cryptography as Applied to the Smart Grid

Computer Security: Principles and Practice

7! Cryptographic Techniques! A Brief Introduction

Introduction to Cryptography

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

CRYPTOG NETWORK SECURITY

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Cryptography and network security CNET4523

Secure Sockets Layer

Cryptography and Network Security Chapter 15

About the Tutorial. Audience. Prerequisites. Disclaimer & Copyright. Cryptography

NETWORK ADMINISTRATION AND SECURITY

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Lecture 9: Application of Cryptography

CS 758: Cryptography / Network Security

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

Overview. SSL Cryptography Overview CHAPTER 1

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

How To Encrypt Data With Encryption

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure

Chapter 6 Electronic Mail Security

CrypTool Claudia Eckert / Thorsten Clausius Bernd Esslinger / Jörg Schneider / Henrik Koy

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

CSCI-E46: Applied Network Security. Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Cryptography and Network Security Chapter 12

Communication Systems SSL

Application Layer (1)

Message Authentication Codes

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

CSE/EE 461 Lecture 23

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Network Security Essentials Chapter 7

How To Understand And Understand The History Of Cryptography

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Network Security Protocols

Chapter 17. Transport-Level Security

Electronic Mail Security. Security. is one of the most widely used and regarded network services currently message contents are not secure

Secure Network Communications FIPS Non Proprietary Security Policy

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Message Authentication

Cryptography and Key Management Basics

Domain 3: Cryptography

Chapter 7: Network security

Application Layer (1)

A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Cryptography and Network Security Digital Signature

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Network Security - ISA 656 Introduction to Cryptography

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

CRYPTOGRAPHY AND NETWORK SECURITY

Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson

Content Teaching Academy at James Madison University

VoIP Security. Seminar: Cryptography and Security Michael Muncan

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

SSL Firewalls

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

CSCE 465 Computer & Network Security

Wireless Mobile Internet Security. 2nd Edition

EXAM questions for the course TTM Information Security June Part 1

Network Security Technology Network Management

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

Network Security. Modes of Operation. Steven M. Bellovin February 3,

What is network security?

Transcription:

IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1

Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI Concepts Attacks on Cryptosystems 2

Introduction Hidden writing Increasingly used to protect information Can ensure confidentiality Integrity and Authenticity too 3

History The Manual Era Dates back to at least 2000 B.C. Pen and Paper Cryptography Examples Scytale Atbash Caesar Vigenère 4

History The Mechanical Era Invention of cipher machines Examples Confederate Army s Cipher Disk Japanese Red and Purple Machines German Enigma 5

History The Modern Era Computers! Examples Lucifer Rijndael RSA ElGamal 6

Speak Like a Crypto Geek Plaintext A message in its natural format readable by an attacker Ciphertext Message altered to be unreadable by anyone except the intended recipients Key Sequence that controls the operation and behavior of the cryptographic algorithm Keyspace Total number of possible values of keys in a crypto algorithm 7

Speak Like a Crypto Geek (2) Initialization Vector Random values used with ciphers to ensure no patterns are created during encryption Cryptosystem The combination of algorithm, key, and key management functions used to perform cryptographic operations 8

Cryptosystem Services Confidentiality Integrity Authenticity Nonrepudiation Access Control 9

Types of Cryptography Stream-based Ciphers One at a time, please Mixes plaintext with key stream Good for real-time services Block Ciphers Amusement Park Ride Substitution and transposition 10

Encryption Systems Substitution Cipher Convert one letter to another Cryptoquip Transposition Cipher Change position of letter in text Word Jumble Monoalphabetic Cipher Caesar 11

Polyalphabetic Cipher Vigenère Modular Mathematics Running Key Cipher Encryption Systems One-time Pads Randomly generated keys 12

Steganography Hiding a message within another medium, such as an image No key is required Example Modify color map of JPEG image 13

Cryptographic Methods Symmetric Same key for encryption and decryption Key distribution problem Asymmetric Mathematically related key pairs for encryption and decryption Public and private keys 14

Cryptographic Methods Hybrid Combines strengths of both methods Asymmetric distributes symmetric key» Also known as a session key Symmetric provides bulk encryption Example:» SSL negotiates a hybrid method 15

Confusion Attributes of Strong Encryption Change key values each round Performed through substitution Complicates plaintext/key relationship Diffusion Change location of plaintext in ciphertext Done through transposition 16

Symmetric Algorithms DES Modes: ECB, CBC, CFB, OFB, CM 3DES AES IDEA Blowfish 17

Symmetric Algorithms RC4 RC5 CAST SAFER Twofish 18

Asymmetric Algorithms Diffie-Hellman RSA El Gamal Elliptic Curve Cryptography (ECC) 19

Hashing Algorithms MD5 Computes 128-bit hash value Widely used for file integrity checking SHA-1 Computes 160-bit hash value NIST approved message digest algorithm 20

Hashing Algorithms HAVAL Computes between 128 and 256 bit hash Between 3 and 5 rounds RIPEMD-160 Developed in Europe published in 1996 Patent-free 21

Birthday Attack Collisions Two messages with the same hash value Based on the birthday paradox Hash algorithms should be resistant to this attack 22

Message Authentication Codes Small block of data generated with a secret key and appended to a message HMAC (RFC 2104) Uses hash instead of cipher for speed Used in SSL/TLS and IPSec 23

Digital Signatures Hash of message encrypted with private key Digital Signature Standard (DSS) DSA/RSA/ECD-SA plus SHA DSS provides Sender authentication Verification of message integrity Nonrepudiation 24

Encryption Management Key Distribution Center (KDC) Uses master keys to issue session keys Example: Kerberos ANSI X9.17 Used by financial institutions Hierarchical set of keys Higher levels used to distribute lower 25

Public Key Infrastructure All components needed to enable secure communication Policies and Procedures Keys and Algorithms Software and Data Formats Assures identity to users Provides key management features 26

PKI Components Digital Certificates Contains identity and verification info Certificate Authorities Trusted entity that issues certificates Registration Authorities Verifies identity for certificate requests Certificate Revocation List (CRL) 27

PKI Cross Certification Process to establish a trust relationship between CAs Allows each CA to validate certificates issued by the other CA Used in large organizations or business partnerships 28

Cryptanalysis The study of methods to break cryptosystems Often targeted at obtaining a key Attacks may be passive or active 29

Cryptanalysis Kerckhoff s Principle The only secrecy involved with a cryptosystem should be the key Cryptosystem Strength How hard is it to determine the secret associated with the system? 30

Cryptanalysis Attacks Brute force Trying all key values in the keyspace Frequency Analysis Guess values based on frequency of occurrence Dictionary Attack Find plaintext based on common words 31

Cryptanalysis Attacks Replay Attack Repeating previous known values Factoring Attacks Find keys through prime factorization Ciphertext-Only Known Plaintext Format or content of plaintext available 32

Cryptanalysis Attacks Chosen Plaintext Attack can encrypt chosen plaintext Chosen Ciphertext Decrypt known ciphertext to discover key Differential Power Analysis Side Channel Attack Identify algorithm and key length 33

Cryptanalysis Attacks Social Engineering Humans are the weakest link RNG Attack Predict IV used by an algorithm Temporary Files May contain plaintext 34

E-mail Security Protocols Privacy Enhanced Email (PEM) Pretty Good Privacy (PGP) Based on a distributed trust model Each user generates a key pair S/MIME Requires public key infrastructure Supported by most e-mail clients 35

Network Security Link Encryption Encrypt traffic headers + data Transparent to users End-to-End Encryption Encrypts application layer data only Network devices need not be aware 36

Network Security SSL/TLS Supports mutual authentication Secures a number of popular network services IPSec Security extensions for TCP/IP protocols Supports encryption and authentication Used for VPNs 37

Questions? 38