Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)



Similar documents
Secret File Sharing Techniques using AES algorithm. C. Navya Latha Garima Agarwal Anila Kumar GVN

Properties of Secure Network Communication

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Omer Rana

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

CSE/EE 461 Lecture 23

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

How To Encrypt With A 64 Bit Block Cipher

Network Security Technology Network Management

SeChat: An AES Encrypted Chat

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Symmetric Key cryptosystem

SECURITY IN NETWORKS

Cryptography and Network Security

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Message Authentication

ELECTRONIC COMMERCE WORKED EXAMPLES

Network Security: Secret Key Cryptography

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

7! Cryptographic Techniques! A Brief Introduction


Principles of Network Security

CS 758: Cryptography / Network Security

Chapter 7: Network security

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

CSCE 465 Computer & Network Security

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Kerberos. Login via Password. Keys in Kerberos

Developing and Investigation of a New Technique Combining Message Authentication and Encryption

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

How To Understand And Understand The History Of Cryptography

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

Introduction. Where Is The Threat? Encryption Methods for Protecting Data. BOSaNOVA, Inc. Phone: Web:

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Application Layer (1)

Security in Distributed Systems. Network Security

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

SSL Firewalls

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Keywords Web Service, security, DES, cryptography.

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

4.2: Kerberos Kerberos V4 Kerberos V5. Chapter 5: Security Concepts for Networks. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Digital Signature For Text File

CRYPTOGRAPHY IN NETWORK SECURITY

What is network security?

Overview of Symmetric Encryption

Fundamentals of Computer Security

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Cryptography and Network Security Chapter 3

Advanced Cryptography

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Lecture 9 - Network Security TDTS (ht1)

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Authentication requirement Authentication function MAC Hash function Security of

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Cryptography Lecture 8. Digital signatures, hash functions

Chapter 8. Network Security

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Lukasz Pater CMMS Administrator and Developer

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

Network Security. HIT Shimrit Tzur-David

Message Authentication Codes

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

Public Key Cryptography Overview

Cryptographic Hash Functions Message Authentication Digital Signatures

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Security in Computer Networks

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

CSci 530 Midterm Exam. Fall 2012

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique

1 Data Encryption Algorithm

Lecture 9: Application of Cryptography

Cipher Techniques on Networks. Amit Konar Math and CS, UMSL

Design and Implementation of Asymmetric Cryptography Using AES Algorithm

Evaluation of the RC4 Algorithm for Data Encryption

Chapter 10. Network Security

The Advanced Encryption Standard (AES)

Design of a Secure File transfer System Using Hybrid Encryption Techniques

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

CS Computer Security Third topic: Crypto Support Sys

Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography

Cyber Security Workshop Encryption Reference Manual

Understanding digital certificates

AES Cipher Modes with EFM32

CIS433/533 - Computer and Network Security Cryptography

CrypTool Claudia Eckert / Thorsten Clausius Bernd Esslinger / Jörg Schneider / Henrik Koy

Transcription:

Network Security Security Crytographic algorithms Security Services Secret key (DES) Public key (RSA) Message digest (MD5) privacy authenticity Message integrity

Secret Key Encryption Plain text Plain text Encrypt using secret key Decrypt using secret key

Public Key Encryption Each participant has a secret key (private key) The key is not stored Publish on the web (for instance) To send a message Encrypt with public key To decrypt, decrypt using a private key

Message Digest Encryption Map a potentially large message into a small fixed length number Compute checksum for message Given cryptographic checksum Difficult to figure out the message

DES (secret key encryption) Block cipher (operates on a fixed block of bits) Encrypts a 64-bit of plain text using a 64-bit key Only 56 bits used Last bit of every byte is a parity bit Three phases in DES 64-bits in each block are permuted

DES (secret key encryption) Sixteen rounds of an identical operation are applied to the resulting data and key The inverse of the original operation is applied to the result During each round split 64-bit into two 32-bit blocks 64-bit L I ( 32-bit) R I (32-bit)

DES (secret key encryption) Choose 48-bit from 56-bit key L i-1 R i-1 F K i L i-1 = R i-1 L I + RI = L i-1 + F(R i-1,k i ) R I

DES (secret key encryption) Define F, generate K i Initially the permuted 56-bit key is divided into two blocks of 28-bit Ignore every 8 th bit in original key Each half is rotated 1/2 bits depending upon the round A table is used to define the rotation of the 28- bit

DES (secret key encryption) DES compression permutation 48-bit key is permuted and then used in the current round as key Function F combines 48-bit key (K i ) with the right half of data after round i-1 (R i-1 ) Expand R from 32-bit to 48-bit Divide R into 4-bit chunks Expand each chunk into 6-bit

DES (secret key encryption) 1-bit from left, 1-bit from right 1 st and last bit use circular shift they get from each other Divide 48-bit into 6-bit chunks XOR expanded R Finally pass 6-bit through substitution box to get 4-bit from 6-bit

DES (Decryption) Algorithm works exactly the same as that of encryption Apply keys in reverse K 16, K 15, K 14,, K 1 Encryption of large messages Cipher block chaining

Cipher Block Chaining B1 B2 Initialising vector + + DES DES Cipher 1 Cipher 2

Public Key Encryption (RSA) Choose two large prime numbers p and q (typically greater than 10 100 Choose n = p q z = (p-1) (q-1) Choose a number d relatively prime to z z and d are coprimes GCD (z,d) = 1 Find e s.t. e d = 1 mod z

Public Key Encryption (RSA) Compute these parameters in advance Divide plaintext into blocks s.t. each plaintext is 0 P < n i.e group bits such that (if k-bits) 2 k < n To encrypt P, compute c = P e (mod n) To decrypt C, compute P = c d (mod n)

Public Key Encryption (RSA) To encrypt e, n required (public key) To decrypt c, n required (private key) Analogy Suitcase with a press lock that is unlocked Anybody can put stuff inside and lock the suitcase But suitcase can ONLY be opened by the key

Message Digest Initial Digiest (128 bit) Message Padded 512 512 512 Transform Transform Transform Message Digest

Message Digest Modern day: Operates on 32-bit quantities Current digest (d 0, d 1, d 2, d 3 ) Works on the hope that it is difficult to create the transformations and the initial digest.