9/17/2015. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Similar documents
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

IT Networks & Security CERT Luncheon Series: Cryptography

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

SECURITY IN NETWORKS

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Introduction to Computer Security

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Message Authentication Codes

Cryptography and Network Security Chapter 12

CSCE 465 Computer & Network Security

Network Security. HIT Shimrit Tzur-David

Authentication requirement Authentication function MAC Hash function Security of

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Chapter 7: Network security

CSCI-E46: Applied Network Security. Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING

lundi 1 octobre 2012 In a set of N elements, by picking at random N elements, we have with high probability a collision two elements are equal

CIS433/533 - Computer and Network Security Cryptography

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Symmetric and Public-key Crypto Due April , 11:59PM

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Introduction to Encryption

Message Authentication

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Modes of Operation of Block Ciphers

Computer Security: Principles and Practice

CSCE 465 Computer & Network Security

Cryptography and Network Security Chapter 11. Fourth Edition by William Stallings

Principles of Network Security

CSE/EE 461 Lecture 23

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

The Misuse of RC4 in Microsoft Word and Excel

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

CRYPTOGRAPHY IN NETWORK SECURITY

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Center for Internet Security. INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO

Message authentication and. digital signatures

Lecture 9: Application of Cryptography

A Standards-based Approach to IP Protection for HDLs

1 Data Encryption Algorithm

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Hash Functions. Integrity checks

OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

Client Server Registration Protocol

What is network security?

Fundamentals of Computer Security

Introduction to Cryptography CS 355

Cryptography and Network Security Digital Signature

Digital signatures. Informal properties

Chapter 10. Network Security

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

An Introduction to Cryptography and Digital Signatures

Table of Contents. Bibliografische Informationen digitalisiert durch

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

Public Key Cryptography Overview

Network Security - ISA 656 Introduction to Cryptography

Cryptography Lecture 8. Digital signatures, hash functions

How To Encrypt With A 64 Bit Block Cipher

SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK

WIRELESS LAN SECURITY FUNDAMENTALS

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Cryptography & Digital Signatures

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

7! Cryptographic Techniques! A Brief Introduction

Cryptography and Network Security Chapter 11

ICOM 5018 Network Security and Cryptography

Implementation and Comparison of Various Digital Signature Algorithms. -Nazia Sarang Boise State University

Insight Guide. Encryption: A Guide

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Network Security. Modes of Operation. Steven M. Bellovin February 3,

Application Layer (1)

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

Public Key (asymmetric) Cryptography

How To Understand And Understand The History Of Cryptography

AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Cryptographic Hash Functions Message Authentication Digital Signatures

CS 758: Cryptography / Network Security

Overview of Public-Key Cryptography

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Tutorial 2. May 11, 2015

PGP - Pretty Good Privacy

NEW HORIZON COLLEGE OF ENGINEERING, BANGALORE CLOUD COMPUTING ASSIGNMENT Explain any six benefits of Software as Service in Cloud computing?

DataTrust Backup Software. Whitepaper Data Security. Version 6.8

DFW Backup Software. Whitepaper Data Security

SSL/TLS: The Ugly Truth

Cryptography and Network Security

CS155. Cryptography Overview

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

A Comparison of the 3DES and AES Encryption Standards

Lecture 6 - Cryptography

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem

Cryptography & Network Security

Transcription:

Cryptography Basics IT443 Network Security Administration Instructor: Bo Sheng Outline Basic concepts in cryptography system Secret cryptography Public cryptography Hash functions 1 2 Encryption/Decryption Cryptanalysis encryption decryption code breaking, attacking the cipher Plaintext: a message in its original form Ciphertext: a message in the transformed, unrecognized form Encryption: the process that transforms a into a Decryption: the process that transforms a to the corresponding Key: the value used to control encryption/decryption. Difficulty depends on sophistication of the cipher amount of information available to the code breaker Any cipher can be broken by exhaustive trials, but rarely practical 3 4 Caesar Cipher Replace each letter with the one 3 letters later in the ex.: CAT FDW Mono-Alphabetic Ciphers Generalized substitution cipher: an arbitrary (but fixed) mapping of one letter to another 26! ( 4.0*10 26 2 88 ) possibilities Trivial to break 5 6 1

Attacking Mono-Alphabetic Ciphers Broken by statistical analysis of letter, word, and phrase frequencies of the language Frequency of single letters in English language, taken from a large corpus of text: Ciphertext Only Attacks Ex.: attacker can intercept encrypted communications, nothing else Breaking the cipher: analyze patterns in the provides clues about the encryption method/ 7 8 Known Plaintext Attacks Ex.: attacker intercepts encrypted text, but also has access to some of the corresponding (definite advantage) Makes some codes (e.g., mono-ic ciphers) very easy to break Chosen Plaintext Attacks Ex.: attacker can choose any desired, and intercept the corresponding Allows targeted code breaking (choose exactly the messages that will reveal the most about the cipher) 9 10 The Weakest Link in Security Cryptography is rarely the weakest link Weaker links Implementation of cipher Distribution or protection of s Secret Keys vs Secret Algorithms Security by obscurity We can achieve better security if we keep the algorithms secret Hard to keep secret if used widely Reverse engineering, social engineering Publish the algorithms Security of the algorithms depends on the secrecy of the s Less unknown vulnerability if all the smart (good) people in the world are examine the algorithms 11 12 2

Outline Basic concepts in cryptography system Secret cryptography Public cryptography Hash functions Secret Key Cryptography encryption Same decryption Same is used for encryption and decryption Also known as Symmetric cryptography Conventional cryptography 13 14 Secret Key Cryptography Stream cipher Block cipher Converts one input block of fixed size k bits to an output block of k bits DES, IDEA, AES, AES Selected from an open competition, organized by NSA Joan Daemen and Vincent Rijmen (Belgium) Block size=128 bits, Key Size= 128/192/256 bits Key Size Keys should be selected from a large potential set, to prevent brute force attacks Secret sizes 40 bits were considered adequate in 70 s 56 bits used by DES were adequate in the 80 s 128 bits are adequate for now If computers increase in power by 40% per year, need roughly 5 more bits per decade to stay sufficiently hard to break 15 16 Public Key Cryptography Public Key Cryptography encryption decryption Sign Verify Public Private Private Public A public/private pair is used Public can be publicly known Private is kept secret by the owner of the Much slower than secret cryptography Also known as asymmetric cryptography Another mode: digital signature Digital signature Only the party with the private can create a digital signature. The digital signature is verifiable by anyone who knows the public. The signer cannot deny that he/she has done so. 17 18 3

Public Key Cryptography It must be computationally easy to generate a public / private pair hard to determine the private, given the public It must be computationally easy to encrypt using the public easy to decrypt using the private hard to recover the message from just the and the public Symmetric vs Asymmetric Symmetric algorithms are much faster In the order of a 1000 times faster Symmetric algorithms require a shared secret Impractical if the communicating entities don t have another secure channel Both algorithms are combined to provide practical and efficient secure communication E.g., establish a secret session using asymmetric crypto and use symmetric crypto for encrypting the traffic 19 20 Outline Basic concepts in cryptography system Secret cryptography Public cryptography Hash functions Message of arbitrary length Hash Function Hash A fixed-length short message Also known as Message digest One-way transformation One-way function Hash Length of H(m) much shorter than length of m Usually fixed lengths: 128 or 160 bits 21 22 Properties of Hash Consider a hash function H Performance: Easy to compute H(m) One-way property: Given H(m) but not m, it s computationally infeasible to find m Weak collision resistance (free): Given H(m), it s computationally infeasible to find m such that H(m ) = H(m). Strong collision resistance (free): Computationally infeasible to find m 1, m 2 such that H(m 1 ) = H(m 2 ) Hash Applications File / Message integrity Check if a downloaded file is corrupted Detect if a file has been changed by someone after it was stored Compute a hash H(F) of file F openssl dgst -md5 filename 23 24 4

Hash Applications Password verification Password cannot be stored in In a hashed format Linux: /etc/passwd, /etc/shadow Hash Applications User authentication Alice wants to authenticate herself to Bob Assuming they already share a secret K Alice Bob cat /etc/shadow computes Y=H(R K) time verifies that Y=H(R K) 25 26 Modern Hash Functions MD5 (128 bits) Previous versions (i.e., MD2, MD4) have weaknesses. Broken; collisions published in August 2004 Too weak to be used for serious applications SHA (Secure Hash Algorithm) Weaknesses were found SHA-1 (160 bits) Broken, but not yet cracked Collisions in 2 69 hash operations, much less than the brute-force attack of 2 80 operations Results were circulated in February 2005, and published in CRYPTO 05 in August 2005 SHA-256, SHA-384, Birthday Attack What is the smallest group size k such that The probability that at least two people in the group have the same birthday is greater than 0.5? 23 Implication for hash function H of length m With probability at least 0.5 If we hash about 2 m/2 random inputs, Two messages will have the same hash image m=64, 1ns per hash Brute force (2 64 ): 10 13 seconds over 300 thousand years Birthday attack (2 32 ): 4 seconds 27 28 Lab 1 Sample codes eecs.mit.edu s IP is 18.62.1.6 Assume their subnetwork use 28-bit prefix 18. 62. 1. 00000110 Scan 18.62.1.0 ~ 18.62.1.15 dig -x 18.62.1.0 +short /home/shengbo/it443/scanip.sh /home/shengbo/it443/scanip.pl Plaintext Key Electronic Code Book (ECB) M 1 M 2 M 3 M 4 128 128 128 46 + padding E E E E 128 128 128 128 Ciphertext C 1 C 2 C 3 C 4 29 30 5

Cipher Block Chaining (CBC) M 1 M 2 M 3 M 4 Initialization Vector Key 128 128 128 46 + padding E E E E 128 128 128 128 C 1 C 2 C 3 C 4 31 6