CPSC 467b: Cryptography and Computer Security



Similar documents
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

CPSC 467: Cryptography and Computer Security

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Content Teaching Academy at James Madison University

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography & Network Security

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

CS 758: Cryptography / Network Security

Cryptography & Digital Signatures

Overview of Public-Key Cryptography

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Chapter 10. Network Security

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Compter Networks Chapter 9: Network Security

CSE/EE 461 Lecture 23

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Cryptography and Network Security

Lecture 9 - Network Security TDTS (ht1)

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

An Introduction to Cryptography as Applied to the Smart Grid

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Capture Resilient ElGamal Signature Protocols

The Misuse of RC4 in Microsoft Word and Excel

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

Client Server Registration Protocol

Information Security Basic Concepts

RSA Attacks. By Abdulaziz Alrasheed and Fatima

Cryptography and Network Security

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Cryptography and Network Security

Authenticated encryption

Lecture 6 - Cryptography

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Lecture 9: Application of Cryptography

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

SFWR ENG 4C03 - Computer Networks & Computer Security

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

Message Authentication Codes

24 th IEEE Annual Computer Communications Workshop (CCW)

Chap. 1: Introduction

Archived NIST Technical Series Publication

Chapter 8. Network Security

Security Goals Services

SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK

QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University

Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre

How To Protect Your Data From Attack

IT Networks & Security CERT Luncheon Series: Cryptography

Cryptographic mechanisms

CSCE 465 Computer & Network Security

CRYPTOGRAPHY IN NETWORK SECURITY

Fundamentals of Computer Security

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

CRYPTOGRAPHY AND NETWORK SECURITY

Recommendation for Cryptographic Key Generation

Computer and Network Security. Alberto Marchetti Spaccamela

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Data Breaches and the Encryption Safe Harbor. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

Advanced Topics in Cryptography and Network Security

TELE 301 Network Management. Lecture 18: Network Security

Lecture 9 - Message Authentication Codes

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Elements of Applied Cryptography Public key encryption

Healthcare Compliance Solutions

Cryptography and Network Security: Summary

CIS 5371 Cryptography. 8. Encryption --

CRYPTOG NETWORK SECURITY

Government of Ontario IT Standard (GO-ITS) Number Security Requirements for the Use of Cryptography

Security and Authentication Primer

Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths

Cryptography and Network Security Chapter 1

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Network Security. HIT Shimrit Tzur-David

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Chapter 10. Cloud Security Mechanisms

Notes on Network Security - Introduction

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

HIPAA Privacy & Security White Paper

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

COSC 472 Network Security

Elliptic Curve Cryptography Methods Debbie Roser Math\CS 4890

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

Information Security

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Transcription:

CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22

Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22

Course Overview CPSC 467b, Lecture 1 3/22

What is this course about? The course title is Cryptography and Computer Security. Here are some definitions paraphrased from Wikipedia: Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). https://en.wikipedia.org/wiki/cryptography Computer security is about protecting information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. https://en.wikipedia.org/wiki/computer_security Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. https://en.wikipedia.org/wiki/information_security CPSC 467b, Lecture 1 4/22

Role of cryptography Cryptography is to information security as locks are to personal security. Both are clever mechanisms that can be analyzed in isolation. Both can be effective when used in suitable contexts. Both comprise only a small part of the security picture. CPSC 467b, Lecture 1 5/22

Information security in the real world Some goals of information security. Protection against data damage. Protection against theft of intellectual property. Protection against surveillance. Protection against unauthorized actions. Protection of constitutional privacy rights. Protection of freedom of information. CPSC 467b, Lecture 1 6/22

How is security achieved in the real world? Prevention: Physical barriers, locks, encryption, firewalls, etc. Detection: Audits, checks and balances. Legal means: Laws, sanctions. Concealment: Camouflage, steganography. CPSC 467b, Lecture 1 7/22

Threat examples Some risks and possible countermeasures: Eavesdropping on private conversations: encryption. Unauthorized use of a computer: passwords, physical security. Unwanted email: spam filters. Unintentional data corruption: checksums and backups. Denial of service: redundancy, isolation. Breach of contract: nonrepudiable signatures. Data corruption: access controls, cryptographic hash functions. Disclosure of confidential data: access controls, encryption, physical security. CPSC 467b, Lecture 1 8/22

Principles of risk management No such thing as absolute security. Security goal: optimize tradeoff between cost of security measures and losses from security breaches. Security risks can be lowered by Reducing exposure to attack. Reducing number of vulnerabilities. Reducing value to the attacker of a successful attack. Increasing the cost of a successful attack. Increasing the penalty for a failed attempt. CPSC 467b, Lecture 1 9/22

Focus of this course This course is primarily focused on the use of cryptography in information security. It will cover: 1. Classical cryptography. 2. Formal definitions of cryptographic security. 3. Cryptographic primitives: private key cryptography, public key cryptography, pseudorandom numbers, MACs, cryptographic hash functions, digital signatures. 4. Practical implementations of cryptographic primitives. 5. Cryptographic protocols for multiparty problems: contract signing, oblivious transfer, zero-knowledge proofs, bit commitment, secret-splitting, and coin flipping. 6. Brief overview of real-world applications of cryptography such as SSH, SSL, WPA, encrypted email, PGP/GPG, etc. CPSC 467b, Lecture 1 10/22

Computer science, mathematics and cryptography Cryptography cuts across both computer science and mathematics. Computer science: Cryptographic algorithms must be implemented correctly and efficiently. Mathematics: Underlies both algorithms and their analysis. Many cryptographic primitives are based on: Number theoretic problems such as factoring and discrete log; Algebraic properties of structures such as elliptic curves. Understanding and modeling security uses Probability theory and coding theory; Complexity theory. Will explore in enough depth to provide insight for how algorithms work and why they are believed secure. CPSC 467b, Lecture 1 11/22

Organization of this course Roughly organized around cryptographic primitives. For each one: What can be done with it? Study of cryptographic algorithms and protocols. [Primary reference: Trapp & Washington.] What are its properties? Modeling and analysis. Requires complexity theory, probability theory, and statistics. [Primary reference: Goldwasser & Bellare.] How is it built? Requires some mathematics, particularly number theory and algebra. [We ll cover needed math in limited depth.] How is it implemented? Requires attention to detail, especially to prevent accidental leak of secret information. [We ll do some implementations.] CPSC 467b, Lecture 1 12/22

What this course is not This course is broad rather than deep. It will not go deeply into the mathematics underlying cryptosystems such as RSA, AES and elliptic curves. It will only briefly touch on cryptanalysis, the flip side of cryptography. It will not go deeply into real-world security protocols. It will not talk about security mechanisms for computer and network devices and applications such as firewalls, operating system access controls, detecting software security holes, or dealing with web security vulnerabilities. CPSC 467b, Lecture 1 13/22

Example primitive: Symmetric cryptography (informal) A symmetric cryptosystem (sometimes called a private-key or one-key system) is a pair of efficiently-computable functions E and D such that E(k, m) encrypts plaintext message m using key k to produce a ciphertext c. D(k, c) decrypts ciphertext c using k to produce a message m. Requirements: Correctness D(k, E(k, m)) = m for all keys k and all messages m. Security Given c = E(k, m), it is hard to find m without knowing k. CPSC 467b, Lecture 1 14/22

Application of a symmetric cryptosystem Secret message transmission problem: Alice wants to send Bob a private message m over the internet. Eve is an eavesdropper who listens in and wants to learn m. Alice and Bob want m to remain private and unknown to Eve. Image credit: Derived from image by Frank Kagan Gürkaynak, http://www.iis.ee.ethz.ch/~kgf/acacia/fig/alice_bob.png CPSC 467b, Lecture 1 15/22

Solution using symmetric cryptography Protocol: 1. Alice and Bob share a common secret key k. 2. Alice computes c = E(k, m) and sends c to Bob. 3. Bob receives c, computes m = D(k, c ), and assumes m to be Alice s message. Assumptions: Eve learns nothing except for c during the protocol. The channel is perfect, so c = c. The real world is not so perfect, so we must ask what happens if c c? Eve is a passive eavesdropper who can only read c but can not modify it. CPSC 467b, Lecture 1 16/22

Eve s side of the story Cartoon by Randall Munroe, https://www.xkcd.com/177/ CPSC 467b, Lecture 1 17/22

Requirements What do we require of E, D, and the computing environment? Given c, it is hard to find m without also knowing k. k is not initially known to Eve. Eve can guess k with at most negligible success probability. (k must be chosen randomly from a large key space.) Alice and Bob successfully keep k secret. (Their computers have not been compromised; Eve can t find k on their computers even if she is a legitimate user, etc.) Eve can t obtain k in other ways, e.g., by social engineering, using binoculars to watch Alice or Bob s keyboard, etc. CPSC 467b, Lecture 1 18/22

Symmetric Cryptography CPSC 467b, Lecture 1 19/22

Symmetric cryptosystems (somewhat more formal) A symmetric cryptosystem consists of a set M of plaintext messages, a set C of ciphertexts, a set K of keys, an encryption function E : K M C a decryption function D : K C M. We often write E k (m) = E(k, m) and D k (c) = D(k, c). CPSC 467b, Lecture 1 20/22

Desired properties Decipherability m M, k K, D k (E k (m)) = m. In other words, D k is the left inverse of E k. Feasibility E and D, regarded as functions of two arguments, should be computable using a feasible amount of time and storage. Security (weak) It should be difficult to find m given c = E k (m) without knowing k. CPSC 467b, Lecture 1 21/22

What s wrong with this definition? This definition leaves three important questions unanswered? 1. What is a feasible amount of time and storage? 2. What does it mean to be difficult to find m? 3. What does it mean to not know k? These questions are all critical in practice. 1. E and D must be practically computable by Alice and Bob or the cryptosystem can t be used. For most applications, this means computable in milliseconds, not minutes or days. 2. The confidentiality of m must be preserved, possibly for years, after Eve discovers c. How long is long enough? 3. The only way to be certain that Eve does not know k is to choose k at random from a random source to which Eve has no access. This is easy to get wrong. CPSC 467b, Lecture 1 22/22