Discrete logarithms within computer and network security Prof Bill Buchanan, Edinburgh Napier



Similar documents
Introduction to Cryptography

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

SFWR ENG 4C03 - Computer Networks & Computer Security

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem

Overview of Public-Key Cryptography

Computer Security: Principles and Practice

CSCE 465 Computer & Network Security

Cryptography and Network Security

CIS 5371 Cryptography. 8. Encryption --

Cryptography and Network Security Chapter 10

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

Public Key Cryptography. c Eli Biham - March 30, Public Key Cryptography

7! Cryptographic Techniques! A Brief Introduction

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Network Security. Omer Rana

Public Key (asymmetric) Cryptography

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

A Novel Approach to combine Public-key encryption with Symmetric-key encryption

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Practice Questions. CS161 Computer Security, Fall 2008

Elements of Applied Cryptography Public key encryption

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Cryptography and Network Security

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Elements of Applied Cryptography. Key Distribution. Trusted third party: KDC, KTC Diffie-Helmann protocol The man-in-the-middle attack

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Securing Data at Rest ViSolve IT Security Team

SECURITY IN NETWORKS

Introduction to Cryptography CS 355

Public Key Cryptography Overview

CS 758: Cryptography / Network Security

Table of Contents. Bibliografische Informationen digitalisiert durch

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Lecture 6 - Cryptography

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Network Security. HIT Shimrit Tzur-David

Outline. CSc 466/566. Computer Security. 7 : Cryptography Public Key. History of Public Key Cryptography. Public-key Algorithms. Christian Collberg

CS Computer Security Third topic: Crypto Support Sys

Computer Science A Cryptography and Data Security. Claude Crépeau

Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1

Digital Signatures. Prof. Zeph Grunschlag

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Notes on Network Security Prof. Hemant K. Soni

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

2. Cryptography 2.4 Digital Signatures

Elliptic Curve Cryptography

Digital Signature. Raj Jain. Washington University in St. Louis

CRYPTOGRAPHY IN NETWORK SECURITY

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Secure File Transfer Using USB

EXAM questions for the course TTM Information Security May Part 1

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University

THE UNIVERSITY OF TRINIDAD & TOBAGO

Network Security. Chapter 2 Basics 2.2 Public Key Cryptography. Public Key Cryptography. Public Key Cryptography

Module: Applied Cryptography. Professor Patrick McDaniel Fall CSE543 - Introduction to Computer and Network Security

The Mathematics of the RSA Public-Key Cryptosystem

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Software Tool for Implementing RSA Algorithm

CS 392/681 - Computer Security

Introduction to Computer Security

Digital Signature CHAPTER 13. Review Questions. (Solution to Odd-Numbered Problems)

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Cryptography and Network Security Chapter 15

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION

Security and Authentication Primer

Lukasz Pater CMMS Administrator and Developer

Cryptography & Digital Signatures

Computer Networks - CS132/EECS148 - Spring

EXAM questions for the course TTM Information Security June Part 1

Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis

IT Networks & Security CERT Luncheon Series: Cryptography

Digital signatures. Informal properties

Ch.9 Cryptography. The Graduate Center, CUNY.! CSc Theoretical Computer Science Konstantinos Vamvourellis

CIS 433/533 - Computer and Network Security Public Key Crypto/ Cryptographic Protocols

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Network Security Essentials Chapter 7

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Security Sensor Network. Biswajit panja

Applied Cryptography Public Key Algorithms

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms

Center for Internet Security. INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay

IPSEC: IKE. Markus Hidell Based on material by Vitaly Shmatikov, Univ. of Texas, and by the previous course teachers

CPSC 467b: Cryptography and Computer Security

Capture Resilient ElGamal Signature Protocols

RSA Question 2. Bob thinks that p and q are primes but p isn t. Then, Bob thinks Φ Bob :=(p-1)(q-1) = φ(n). Is this true?

Elements of Security

Digital signatures are one of the most important inventions/applications of modern cryptography.

Application Layer (1)

Massachusetts Institute of Technology Handout : Network and Computer Security October 9, 2003 Professor Ronald L. Rivest.

Study of algorithms for factoring integers and computing discrete logarithms

Transcription:

Discrete logarithms within computer and network security Prof Bill Buchanan, Edinburgh Napier http://asecuritysite.com @billatnapier Introduction. Encryption: Public/Private Key. Key Exchange. Authentication. Signatures. ElGamal. Alice Bob Eve Trent Author: Prof Bill Buchanan

Discrete logarithms within computer and network security Prof Bill Buchanan, Edinburgh Napier http://asecuritysite.com @billatnapier Introduction. Encryption: Public/Private Key. Key Exchange. Authentication. Signatures. ElGamal. Alice Bob Introduction Eve Trent Author: Prof Bill Buchanan

Encryption Introduction Bruce Schneier Vincent Rijmen and Joan Daemen AES Twofish, Blowfish, Secrets and Lies Modern private key encryption Author: Prof Bill Buchanan

Encryption Introduction Intruder Eve Privacy (Private Key) Identity (Public Key) Integrity (Public/Private Key) Bob Alice Trent Trusted third party Author: Prof Bill Buchanan

Discrete logarithms within computer and network security Prof Bill Buchanan, Edinburgh Napier http://asecuritysite.com @billatnapier Introduction. Encryption: Public/Private Key. Key Exchange. Authentication. Signatures. ElGamal. Alice Bob Encryption Eve Trent Author: Prof Bill Buchanan

Encryption RSA Select two primes (p,q) Next, the n value is calculated. Thus: n = p x q = 11 x 3 = 33 Next PHI is calculated by: PHI = (p-1)(q-1) = 20 e selected so that GCD(e,PHI)=1 Public key: (n,e) Author: Prof Bill Buchanan

Discrete logarithms within computer and network security Prof Bill Buchanan, Edinburgh Napier http://asecuritysite.com @billatnapier Introduction. Encryption: Public/Private Key. Key Exchange. Authentication. Signatures. ElGamal. Alice Bob Eve Trent Authentication Author: Prof Bill Buchanan

Using Bob s private key to authenticate himself Message Message MD5 Encrypted MD5 The magic private key Bob s private key Bob Bob s public key Authentication Author: Prof Bill Buchanan

Bob encrypts the message/hash with Alice s public key Message Message MD5 Encrypted MD5 Bob The magic private key Bob s public key Bob s private key Encrypted Content Alice s public key Alice Authentication Alice s private key Author: Prof Bill Buchanan

Bob encrypts the message/hash with Alice s public key Message MD5 Message Encrypted MD5 Encrypted Content Bob Bob s private key The magic private key Authentication Bob s public key Encrypted Content Alice s public key Alice s private key Alice Author: Prof Bill Buchanan

Alice decrypts the message Message MD5 Message Encrypted MD5 Encrypted Content Bob Bob s private key The magic private key Bob s public key Alice Authentication Encrypted Content Message Encrypted MD5 Alice s public key Alice s private key Author: Prof Bill Buchanan

Alice decrypts the message Message MD5 Message Encrypted MD5 Encrypted Content Bob Bob s private key The magic private key Bob s public key Alice Authentication Encrypted Content Message Encrypted MD5 MD5 (message) MD5 (result) Alice compares the MD5 values. If they are the same Bob sent the message Author: Prof Bill Buchanan

Discrete logarithms within computer and network security Prof Bill Buchanan, Edinburgh Napier http://asecuritysite.com @billatnapier Introduction. Encryption: Public/Private Key. Key Exchange. Authentication. Signatures. ElGamal. Alice Bob ElGamal Eve Trent Author: Prof Bill Buchanan

Encryption ElGamal Bob Y = g x mod p Extremely difficult to the value of x, and there can be many solutions Eve Eve Y = 3 4 mod 17 -> 13 Alice Author: Prof Bill Buchanan

Encryption ElGamal Bob First Bob generates a prime number (p) and a number (g) which is between 1 and (p-1): P: G: p g Bob select a random number (x) which will be his private key: Bob selects a random number(x): He then calculates Y: x Bob sends g, p and Y to Alice. Y = g x mod p Alice Author: Prof Bill Buchanan

Alice p g y M (message) K (random) a=g k mod P b=y k M mod P a,b Bob Author: Prof Bill Buchanan

Encryption Conclusion Encryption Bob Eve Public key Encryption/ Decryption Typical application: Diffie-Hellman used to generate private-key. Public-key used for authentication. Private-key used for encryption. Encryption/ Decryption Key exchange (Diffie-Hellman) Secret key used to encrypt/decrypt (DES/3DES/AES) Communications Channel Used to authenticate (RSA) Encryption/ Decryption Alice Private key Private key Key exchange (Diffie-Hellman) Public key Author: Prof Bill Buchanan Secret key used to encrypt/decrypt (DES/3DES/AES) Public key Used to authenticate (RSA) Private key Private key RSA 2048 bits Replace by: ElGamal 160bits Public key Author: Prof Bill Buchanan

Discrete logarithms within computer and network security Prof Bill Buchanan, Edinburgh Napier http://asecuritysite.com @billatnapier Introduction. Encryption: Public/Private Key. Key Exchange. Authentication. Signatures. ElGamal. Alice Bob Eve Trent Author: Prof Bill Buchanan