Symmetric and asymmetric cryptography overview

Similar documents
Computer Security: Principles and Practice

IT Networks & Security CERT Luncheon Series: Cryptography

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

7! Cryptographic Techniques! A Brief Introduction

Network Security. Omer Rana

Properties of Secure Network Communication

Center for Internet Security. INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Symmetric Key cryptosystem

The Advanced Encryption Standard: Four Years On

How To Encrypt With A 64 Bit Block Cipher

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Lukasz Pater CMMS Administrator and Developer

Public Key (asymmetric) Cryptography

Cryptography and Network Security

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

CRYPTOGRAPHY IN NETWORK SECURITY

EXAM questions for the course TTM Information Security May Part 1

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

The Mathematics of the RSA Public-Key Cryptosystem

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Lecture 9: Application of Cryptography

Public Key Cryptography and RSA. Review: Number Theory Basics

CSCE 465 Computer & Network Security

Keywords Web Service, security, DES, cryptography.

Cryptography and Network Security Chapter 3

Split Based Encryption in Secure File Transfer

How To Understand And Understand The History Of Cryptography

Public Key Cryptography: RSA and Lots of Number Theory

CSCI-E46: Applied Network Security. Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

Chapter 8. Network Security

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Evaluation of the RC4 Algorithm for Data Encryption

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab

Network Security - ISA 656 Introduction to Cryptography

A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.

A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA

Cryptography and Key Management Basics

A Comparison of the 3DES and AES Encryption Standards

Applied Cryptography Public Key Algorithms

CSCE 465 Computer & Network Security

Network Security. Chapter 2 Basics 2.1 Symmetric Cryptography. Cryptographic algorithms: outline. Basic Terms: Block cipher and Stream cipher

Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths

CS 758: Cryptography / Network Security

EXAM questions for the course TTM Information Security June Part 1

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Multi-Layered Cryptographic Processor for Network Security

Discrete logarithms within computer and network security Prof Bill Buchanan, Edinburgh Napier

Cryptography & Network Security

A Study of New Trends in Blowfish Algorithm

Associate Prof. Dr. Victor Onomza Waziri

Public Key Cryptography Overview

Securing Data at Rest ViSolve IT Security Team

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key

Notes on Network Security Prof. Hemant K. Soni

Savitribai Phule Pune University

A Novel Approach to combine Public-key encryption with Symmetric-key encryption

The science of encryption: prime numbers and mod n arithmetic

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Implementation of Full -Parallelism AES Encryption and Decryption

Table of Contents. Bibliografische Informationen digitalisiert durch

XML Encryption Syntax and Processing. Duan,Limiao 07,12,2006

The Misuse of RC4 in Microsoft Word and Excel

The Advanced Encryption Standard (AES)

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Chapter 23. Database Security. Security Issues. Database Security

Computer System Management: Hosting Servers, Miscellaneous

Current State of Cryptography and Design of an Online Storage System

Symmetric Mechanisms for Authentication in IDRP

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Cryptography and Network Security Chapter 9

1 Data Encryption Algorithm

Elements of Applied Cryptography Public key encryption

Modeling and verification of security protocols

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

SECURITY IN NETWORKS

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

How To Encrypt Data With Encryption

Encryption VIDEO COMMUNICATION SYSTEM-TECHNICAL DOCUMENTATION

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Message Authentication Codes

Cryptography and Network Security Block Cipher

Network Security. HIT Shimrit Tzur-David

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Shor s algorithm and secret sharing

Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Triple Security of Information Using Stegnography and Cryptography

An Introduction to the RSA Encryption Method

Transcription:

Symmetric and asymmetric cryptography overview Modern cryptographic methods use a key to control encryption and decryption Two classes of key-based encryption algorithms symmetric (secret-key) asymmetric (public-key) Symmetric: same key used for encryption and decryption Asymmetric: for encryption a different key is used for encryption and decryption. decryption key cannot be derived from encryption key

Symmetric ciphers Main problem: key distribution Symmetric ciphers can be devided into stream ciphers and block ciphers Stream ciphers can encrypt a single bit of plaintext at a time Block ciphers take a number of bits and encrypt them as a single unit

Asymmetric ciphers Said to be the most significant new development in cryptography in the last 300-400 years first described publicly by Hellman and Diffie in 1976 The encryption key is public, decryption key secret anyone can encrypt a message but only the one who knows the corresponding private key can decrypt it In practise asymmetric and symmetric algorithms are often used together, called hybrid encryption

Algorithm requirements The algorithm itself should be known, only the key is secret Key should be random With a good algorithm it's impossible to find the key even if the plaintext and ciphertext are known impossible = takes far to long to go through the keyspace

Confusion and diffusion Shannon: strong ciphers could be built by combining substitution with transposition repeatedly He described the properties of a cipher as being confusion and diffusion diffusion means spreading the plaintext information through the ciphertext Easiest block ciphers were simple networks that combined substitution and permutation cicuits, so called SP-networks

DES Digital Encryption Standard Widely used symmetric algorithm Encrypts a 64-bit block using a 56-bit key DES uses diffusion and confusion in many stages. The algorithm is quite complicated. Challange first broken in 1997, took 14000 PCs four months, in 1998 in under a day Use the algorithm multiple times with different keys: 3DES [triple-des]

AES (Advanced Encryption Standard) Search for a replacement to DES started in January 1997 Based on winning algorithm Rijndael, AES was officially adopted in December 2001 AES contains a subset of Rijndael's capabilities (e.g., AES only supports a 128- bit block size)

AES (Rijndael) overview Designed by Belgian cryptographers Rijmen and Daemen Can operate over a variable-length block using variable-length keys Iterated block cipher meaning that the initial input block and cipher key undergoes multiple rounds of transformation before producing the output

Other common secret key algorithms International Data Encryption Algorithm (IDEA) DES-like 64-bit block cipher using 128-bit keys RC5 a block-cipher supporting a variety of block sizes, key sizes, and number of encryption passes over the data Blowfish symmetric 64-bit block cipher. Key lengths can vary from 32 to 448 bits in length Twofish 128-bit block cipher using 128-, 192-, or 256-bit keys

Asymmetric algorithm One-way functions techniques mathematical functions that are easy to calculate whereas their inverse function is relatively difficult to calculate factorization or descrete logarithms 9 x 16 = 144 vs 144 = 9 x 16 3 6 = 729 vs finding x and y so that log x y = 729

RSA (Rivest, Shamir, Adleman) One of the more commonly used public key algorithms The RSA algorithm is user to do public key encryption and digital signatures based on factoring. The formula is simple, but takes a long time to calculate. RSA is used in most web-browsers as part of SSL.

Strength of asymmetric cryptographic primitives. Asymmetic crypthographic primitives are believed to require at least twice the block length of a symmetric algorithm with corresponding key length Future quantum computers -> factoring and descrete logarithm computations easy -> asymmetric cryptography would have to be abandoned