How To Understand And Understand The History Of Cryptography



Similar documents
CIS433/533 - Computer and Network Security Cryptography

Cryptography and Network Security

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015


CSCE 465 Computer & Network Security

Cryptography and Network Security Chapter 3

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

How To Encrypt With A 64 Bit Block Cipher

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

Cryptography & Network Security

Network Security. Omer Rana

Chapter 23. Database Security. Security Issues. Database Security

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

IT Networks & Security CERT Luncheon Series: Cryptography

Properties of Secure Network Communication

Evaluation of the RC4 Algorithm for Data Encryption

Lecture 6 - Cryptography

Lecture 9 - Network Security TDTS (ht1)

Chapter 8. Network Security

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

7! Cryptographic Techniques! A Brief Introduction

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Symmetric Key cryptosystem

CRYPTOGRAPHY IN NETWORK SECURITY

Lecture 4 Data Encryption Standard (DES)

Network Security - ISA 656 Introduction to Cryptography

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

1 Data Encryption Algorithm

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Developing and Investigation of a New Technique Combining Message Authentication and Encryption

The Misuse of RC4 in Microsoft Word and Excel

CS 758: Cryptography / Network Security

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay

SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK

Introduction to Encryption

Application Layer (1)

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 13

Network Security. HIT Shimrit Tzur-David

Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Table of Contents. Bibliografische Informationen digitalisiert durch

Network Security Technology Network Management

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

lundi 1 octobre 2012 In a set of N elements, by picking at random N elements, we have with high probability a collision two elements are equal

Lecture 9: Application of Cryptography

Cyber Security Workshop Encryption Reference Manual

Chapter 23. Database Security. Security Issues. Database Security

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Overview of Symmetric Encryption

Module: Applied Cryptography. Professor Patrick McDaniel Fall CSE543 - Introduction to Computer and Network Security

Network Security. Modes of Operation. Steven M. Bellovin February 3,

Fundamentals of Computer Security

CSE/EE 461 Lecture 23

Message Authentication Codes

Network Security. Chapter 2 Basics 2.1 Symmetric Cryptography. Cryptographic algorithms: outline. Basic Terms: Block cipher and Stream cipher

MAC. SKE in Practice. Lecture 5

1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase

Secret File Sharing Techniques using AES algorithm. C. Navya Latha Garima Agarwal Anila Kumar GVN

Cryptography Exercises

Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson

Insight Guide. Encryption: A Guide

Advanced Cryptography

Cryptography and Network Security

Cryptography & Digital Signatures

SSL Firewalls

CSE331: Introduction to Networks and Security. Lecture 20 Fall 2006

Blaze Vault Online Backup. Whitepaper Data Security

Keywords Web Service, security, DES, cryptography.

A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.

SECURITY IN NETWORKS

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

A NEW DNA BASED APPROACH OF GENERATING KEY-DEPENDENT SHIFTROWS TRANSFORMATION

Today. Network Security. Crypto as Munitions. Crypto as Munitions. History of Cryptography

CPSC 467b: Cryptography and Computer Security

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR

Error oracle attacks and CBC encryption. Chris Mitchell ISG, RHUL

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Application Layer (1)

Page 1. Session Overview: Cryptography

SeChat: An AES Encrypted Chat

Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach

Chapter 6 CDMA/802.11i

EXAM questions for the course TTM Information Security May Part 1

Current State of Cryptography and Design of an Online Storage System

Network Security: Cryptography CS/SS G513 S.K. Sahay

Transcription:

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professors Jaeger Lecture 5 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/

A historical moment... 2 The enigma machine was used to secure communication of german military throughout the second world war...... and it changed the course of human history.

Intuition Cryptography is the art (and sometimes science) of secret writing Less well know is that it is also used to guarantee other properties, e.g., authenticity of data This is an enormously deep and important field However, much of our trust in these systems is based on faith (particularly in efficient secret key algorithms) Cryptographers create ciphers - Cryptography Cryptanalyst break ciphers - Cryptanalysis The history of cryptography is an arms race between cryptographers and cryptanalysts.

Cryptosystem A cryptosystem is a 5-tuple consisting of (E,D,M,K,C) Where, E is an encryption algorithm D is an decryption algorithm M is the set of plaintexts K is the set of keys C is the set of ciphertexts E : M K C D : C K M 4

What is a key? A key is an input to a cryptographic algorithm used to obtain confidentiality, integrity, authenticity or other property over some data. The security of the cryptosystem often depends on keeping the key secret to some set of parties. The keyspace is the set of all possible keys Entropy is a measure of the variance in keys typically measured in bits Keys are often stored in some secure place: passwords, on disk keyrings,... TPM, secure co-processor, smartcards,...... and sometimes not, e.g., certificates 5

Transposition Ciphers Scrambles the symbols to produce output The key is the permutation of symbols B L U E U B L E

Substitution Ciphers Substitutes one symbol for another (codebook) The key is the permutation B B/A A L L/N N U E U/Z E/O Z O

Encryption algorithm Algorithm used to make content unreadable by all but the intended receivers E(key,plaintext) = ciphertext D(key,ciphertext) = plaintext Algorithm is public, key is private Block vs. Stream Ciphers Block: input is fixed blocks of same length Stream: stream of input

Example: Caesar Cipher Substitution cipher Every character is replaced with the character three slots to the right A B C D E F G H I J K L M N O P Q R S T U V W X Y Z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C Q: What is the key? S E C U R I T Y A N D P R I V A C Y V H F X U L W B D Q G S U L Y D F B

Cyptanalyze this. AVGGNALYVBAF

Cryptanalysis of ROTx Ciphers Goal: to find plaintext of encoded message Given: ciphertext How: simply try all possible keys Known as a brute force attack 1 T F D V S J U Z B M E Q S J W B D Z 2 U G E W T K V A C N F R T H X C E A 3 W H F X U L W B D Q G S U L Y D F B S E C U R I T Y A N D P R I V A C Y

Shared key cryptography Traditional use of cryptography Symmetric keys, where A single key (k) is used is used for E and D D( k, E( k, p ) ) = p All (intended) receivers have access to key Note: Management of keys determines who has access to encrypted data E.g., password encrypted email Also known as symmetric key cryptography

The one-time pad (OTP) Assume you have a secret bit string s of length n known only to two parties, Alice and Bob Alice sends a message m of length of n to bob Alice uses the following encryption function to generate ciphertext c forall i=1 to n : ci = mi si E.g., XOR the data with the secret bit string An adversary Mallory cannot retrieve any part of the data Simple version of the proof of security: Assume for simplicity that value of each bit in m is equally likely, then you have no information to work with.

Data Encryption Standard (DES) Introduced by the US NBS (now NIST) in 1972 Signaled the beginning of the modern area of cryptography Block cipher Fixed sized input 8-byte input and a 8-byte key (56-bits+8 parity bits)

DES Round Initial round permutes input, then 16 rounds Each round key (ki) is 48 bits of input key Function f is a substitution table (s-boxes) l i k i r i f l i+1 r i+1

Cryptanalysis of DES DES has an effective 56-bit key length Wiener: 1,000,000$ - 3.5 hours (never built) July 17, 1998, the EFF DES Cracker, which was built for less than $250,000 < 3 days January 19, 1999, Distributed.Net (w/eff), 22 hours and 15 minutes (over nearly 100,000 machines) We all assume that NSA and agencies like it around the world can crack (recover key) DES in milliseconds What now? Give up on DES?

Variants of DES DESX (two additional keys ~= 118-bits) Triple DES (three DES keys ~= 112-bits) Keys k1, k2, k3 c = E( k3, D( k2, E( k1, p))) k 1 k 2 k 3 p E D E c

Advanced Encryption Standard (AES) Result of international NIST bakeoff between cryptographers Intended as replacement for DES Rijndael (pronounced Rhine-dall ) Currently implemented in many devices and software, but not yet fully embraced Cryptography community is actively vetting the the theory and implementations (stay tuned)

Hardness Functions Plaintext P Ciphertext C Encryption key ke Decryption key kd D(kd, E(ke, P)) = P Computing C from P is hard, computing C from P with ke is easy Computing P from C is hard, computing P from C with kd is easy

Key size and algorithm strength Key size is an oft-cited measure of the strength of an algorithm, but is strength strongly correlated (or perfectly correlated with key length)? Say we have two algorithms, A and B with key sizes of 128 and 160 bits (the common measure) Is A less secure than B? What if A=B (for variable key-length algorithms)?