Cryptography and Network Security: Summary



Similar documents
Cryptography and Network Security, PART IV: Reviews, Patches, and Theory 1 / 53

CS 758: Cryptography / Network Security

Table of Contents. Bibliografische Informationen digitalisiert durch

Cryprography and Network Security, PART II: Key Exchange Protocols

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

EXAM questions for the course TTM Information Security May Part 1

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

CSCE 465 Computer & Network Security

CIS 5371 Cryptography. 8. Encryption --

Chapter 8. Network Security

An Overview of Common Adversary Models

The Mathematics of the RSA Public-Key Cryptosystem

Computer Security: Principles and Practice

CS Computer Security Third topic: Crypto Support Sys

Overview of Public-Key Cryptography

Cryptography and Network Security, part I: Basic cryptography

Notes on Network Security Prof. Hemant K. Soni

CPSC 467b: Cryptography and Computer Security

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Elliptic Curve Cryptography Methods Debbie Roser Math\CS 4890

Modeling and verification of security protocols

Message Authentication Code

Authenticated encryption

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Authentication requirement Authentication function MAC Hash function Security of

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

CRYPTOGRAPHY AND NETWORK SECURITY

Cryptography and Network Security

Network Security. Chapter 2 Basics 2.2 Public Key Cryptography. Public Key Cryptography. Public Key Cryptography

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Authentication and Encryption: How to order them? Motivation

SSL/TLS: The Ugly Truth

Network Security. Omer Rana

CRYPTOG NETWORK SECURITY

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

Shor s algorithm and secret sharing

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Client Server Registration Protocol

Lecture 9: Application of Cryptography

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Challenges in Teaching a Graduate Course in Applied Cryptography

The Advanced Encryption Standard (AES)

Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre

Chapter 3. Network Domain Security

IJESRT. [Padama, 2(5): May, 2013] ISSN:

Secret File Sharing Techniques using AES algorithm. C. Navya Latha Garima Agarwal Anila Kumar GVN

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay

Public Key Cryptography Overview

Cryptography and Key Management Basics

Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Elements of Applied Cryptography Public key encryption

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Public Key Cryptography in Practice. c Eli Biham - May 3, Public Key Cryptography in Practice (13)

SPINS: Security Protocols for Sensor Networks

EXAM questions for the course TTM Information Security June Part 1

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

Formal Methods in Security Protocols Analysis

Message Authentication Codes

Cryptographic mechanisms

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Installation and usage of SSL certificates: Your guide to getting it right

Cryptography and Network Security

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks

Cryptographic Hash Functions Message Authentication Digital Signatures

Security Sensor Network. Biswajit panja

Advanced Topics in Cryptography and Network Security

Lecture 9 - Network Security TDTS (ht1)

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Dr. Arjan Durresi. Baton Rouge, LA These slides are available at:

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Advanced Cryptography

Secure Remote Password (SRP) Authentication

IT Networks & Security CERT Luncheon Series: Cryptography

Introduction. Digital Signature

Introduction to Cryptography

An Introduction to Cryptography as Applied to the Smart Grid

Authenticity of Public Keys

OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.

QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University

Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers

Authentication Types. Password-based Authentication. Off-Line Password Guessing

, ) I Transport Layer Security

Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)

Applied Cryptography Public Key Algorithms

THE UNIVERSITY OF TRINIDAD & TOBAGO

Properties of Secure Network Communication

Transcription:

Cryptography and Network Security: Summary Timo Karvi 12.2013 Timo Karvi () Cryptography and Network Security: Summary 12.2013 1 / 17

Summary of the Requirements for the exam The advices are valid for two years. Timo Karvi () Cryptography and Network Security: Summary 12.2013 2 / 17

Modular Arithmetics You should be able to prove the basic properties of modular arithmetics, understand and be able to construct inverse elements with respect to addition and multiplication. understand the concept of the primitive root and be able to find small primitive roots. It is not necessary to remember the extended Euclidean algorithm. Pocket calculators are not needed. Timo Karvi () Cryptography and Network Security: Summary 12.2013 3 / 17

Finite Fields You should be able to construct finite fields of the form GF(p n ), and to find irreducible polynomials of small degree. Timo Karvi () Cryptography and Network Security: Summary 12.2013 4 / 17

Basic Problems You should be able to explain the factorization problem and it relation to cryptography as well as the discrete logarithm problem. Timo Karvi () Cryptography and Network Security: Summary 12.2013 5 / 17

AES You should know the basic logic of AES and the functioning of SubBytes, ShiftRows and MixColumns operations. However, it is not necessary to remember the S-box or the multiplication matrix of MixColumns. Timo Karvi () Cryptography and Network Security: Summary 12.2013 6 / 17

RSA I You should be able to explain generally, how public and private keys are defined. Moreover, it is expected that you can construct public and private keys concretely when n is small. You should be able to explain the encryption and decryption procedures. It is not necessary to remember the theorems which show how RSA can be broken if some bits of the secret keys are known or if private keys are too small. You should be able to explain the problem of short plaintexts and how this problem is solved in practice (including OAEP). Remember side channel attacks against RSA! It is not necessary to remember the algorithm to calculate powers or requirements for the parameters. Remember how digital signatures are done using RSA. Timo Karvi () Cryptography and Network Security: Summary 12.2013 7 / 17

DH You should be able to explain the basic Diffie-Hellman method to generate keys. Also the man-in-the-middle attack against the basic DH. Timo Karvi () Cryptography and Network Security: Summary 12.2013 8 / 17

Theory You should know how to make addition with elliptic curve points, when the formulas are shown. You should know the formal definitions of Perfect secrecy, predictable PRG, statistical test, secure PRG, semantic security, ECK, CBC, Counter mode, semantically secure under CPA, Timo Karvi () Cryptography and Network Security: Summary 12.2013 9 / 17

Needham-Schroeder with a Server You should be able to analyze the key generating protocol of Needham and Schroeder. This means that you can find its weak points. You can explain why various parameters are needed and what extra parameters should be added so that the weakness disappears. However, it is not necessary to remember the protocol by heart. You should know the concepts of forward and partial forward secrecy and resistance to key compromise impersonation. Also you can analyse some simple cases if they satisfy these concepts. Timo Karvi () Cryptography and Network Security: Summary 12.2013 10 / 17

Attacks You should be able to explain the various attack possibilities against key agreement or security protocols. For reflection and typing attacks, also examples. You should know the possibility of certificate manipulation, but it is not necessary to remember the example. Timo Karvi () Cryptography and Network Security: Summary 12.2013 11 / 17

Design Principles It may be possible that you have to write an essay about the design principles for cryptographic protocols. The same with the robust principles of public key cryptography. Timo Karvi () Cryptography and Network Security: Summary 12.2013 12 / 17

Protocols I Remember the attack agaist Bellare-Rogaway. Remember the ISO/IEC 9798 protocol 4. A simple security analysis is expected. It is not necessary to remember by heart Andrew s Secure RPC Protocol, but you should be able to analyse it and find its flaw, if ther protocol is shown to you. Similarly with Burrow s modification. You can explain and analyse Boyd s protocol. You should know the Denning-Sacco improvement of Needham-Schroeder. You should know the ISO/IEC 11770-3 protocols and be able to explain their differences. Timo Karvi () Cryptography and Network Security: Summary 12.2013 13 / 17

Protocols II Not necessary to remember the public key version of Needham-Schroeder, but you should be able to analyse it if it is shown to you. The same with Station-to Station Protocol. Not necessary to remember IKE, but you should have some ideas what must be taken into account in practical protocols. Timo Karvi () Cryptography and Network Security: Summary 12.2013 14 / 17

Group Protocols Practical requirements. GDH.2 should be known in such a way that you can even simulate it. Not necessary to remember GDH.1 or 3. Remember BD with broadcasts. Not necessary to remember BD without broadcasts by heart, but you should be able to simulate it, if it is shown to you. The concept of the key tree, calculation principles for the blinded and private keys, join and leave operations should be known. Some ideas about the performance of the various protocols. The authenticated versions of the conference protocols do not belong to the exam area. Timo Karvi () Cryptography and Network Security: Summary 12.2013 15 / 17

Authenticated Encryption Remember the chaining methods and attacks against simple CBC. Remember the formal definition of ciphertext integrity, authenticated encryption and CCA security. Remember examples, correct and incorrect, of practical solutions to ciphertext integrity and authentication. CBC-MAC, NMAC. You should be able to explain TLS. Timo Karvi () Cryptography and Network Security: Summary 12.2013 16 / 17

Proof theory You should be able to explain a proof of a protocol, if such is shown to you. You shouls also know the basic idea of the proofs. Timo Karvi () Cryptography and Network Security: Summary 12.2013 17 / 17