Ky Vu DeVry University, Atlanta Georgia College of Arts & Science



Similar documents
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Compter Networks Chapter 9: Network Security

CSE/EE 461 Lecture 23

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

EDA385 Embedded Systems Design. Advanced Course

Introduction to Cryptography

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Table of Contents. Bibliografische Informationen digitalisiert durch

Network Security. Omer Rana

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Savitribai Phule Pune University

NXP & Security Innovation Encryption for ARM MCUs

Archived NIST Technical Series Publication

Software Engineering 4C03 Research Project. An Overview of Secure Transmission on the World Wide Web. Sean MacDonald

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

Evaluation of the RC4 Algorithm for Data Encryption

EXAM questions for the course TTM Information Security May Part 1

The Misuse of RC4 in Microsoft Word and Excel

SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Chapter 8. Network Security

Message Authentication Codes

Cryptography & Network Security

Elements of Applied Cryptography Public key encryption

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Client Server Registration Protocol

Insight Guide. Encryption: A Guide

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

CRYPTOGRAPHY IN NETWORK SECURITY

Wireless Local Area. Network Security

CPSC 467b: Cryptography and Computer Security

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

Properties of Secure Network Communication

CSCI-E46: Applied Network Security. Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING

Symmetric Key cryptosystem

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Cryptography and Security

Data Breaches and the Encryption Safe Harbor. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

CSCE 465 Computer & Network Security

Lecture 9: Application of Cryptography

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

CS 758: Cryptography / Network Security

Network Security. HIT Shimrit Tzur-David

As enterprises conduct more and more

Chapter 23. Database Security. Security Issues. Database Security

Error oracle attacks and CBC encryption. Chris Mitchell ISG, RHUL

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

Security in Distributed Systems. Network Security

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin.

Security Sensor Network. Biswajit panja

Public Key Cryptography Overview

How To Understand And Understand The History Of Cryptography

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

Network Security Technology Network Management

Chapter 3. Network Domain Security

Center for Internet Security. INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Content Teaching Academy at James Madison University

The Mathematics of the RSA Public-Key Cryptosystem

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Advanced Cryptography

24 th IEEE Annual Computer Communications Workshop (CCW)

Introduction to Computer Security

Security and Authentication Primer

IT Networks & Security CERT Luncheon Series: Cryptography

AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014

Introduction. Where Is The Threat? Encryption Methods for Protecting Data. BOSaNOVA, Inc. Phone: Web:

Chapter 10. Network Security

Information Security

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

Review On Incremental Encrypted Backup For Cloud

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

How To Encrypt With A 64 Bit Block Cipher

Cryptography and Network Security Chapter 9

7! Cryptographic Techniques! A Brief Introduction

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths

A Standards-based Approach to IP Protection for HDLs

SPINS: Security Protocols for Sensor Networks

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

SECURITY IN NETWORKS

Cryptography and Network Security

WEBARROW: A CASE STUDY OF SECURE WEB DEPLOYMENT

Principles of Network Security

Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology

How To Encrypt Data With Encryption

Transcription:

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security Strength - Applications - Limitations Encryption A random key c(t) is generated and input into both function F and function P PT j The plaintext PT j is input into function F The ID of the encryption card y is also input in function P c(t) F P y F(PT j, c(t)) P(c(t), y) 1035 (PT j ) y Function F and function P encrypt the respective inputs and the sum of the outputs is the cipher-text denoted as (PT j ) y

The objective of this presentation is: To review the current state of data security using conventional cryptography To analyze the strength and weakness of current concepts and algorithms To analyze the need for a Paradigm Shift in data security To propose a solution

Current Solutions - Traditional concept Current encryption techniques can be divided into two categories of Key Management: - Symmetric - Asymmetric Definition Major Algorithms Advantages/ Disadvantages Attack Strategies

Symmetric-Key Encryption Major Algorithms Definition: Consider an encryption scheme consisting of a set of encryption and decryption transformations {Ee: e κ} and {D d : : d κ}, respectively, where κ is the key space. The encryption scheme is said to be symmetric-key if for each associated encryption/decryption key pair (e, d), it is computationally easy to determine d knowing e, and to determine e from d. IDEA International Data Encryption Algorithm RSA Data Security Blowfish Encryption Algorithm Twofish Encryption Algorithm

Symmetric-Key Encryption Advantages Some well-know algorithms have survived brute force attacks, so far Relatively simple and easy to implement Demand on system resources is minimal, when compared to other algorithms Communication and protection remain secure as long as the private key remains secret Disadvantages When two or more parties share same key, key confidentiality becomes difficult Key loss, stolen key or accidental key disclosure is likely to occur Key Management between communicators becomes more complex Large organizational Key Management usually requires a trusted-third party (TTP)

Symmetric-Key Encryption Attack strategies Security breaches against symmetric-key algorithm have been recorded. - 1995, DES 56-bit encryption algorithm broken and declared not secure. - 128-bit keys became the new DES standard. - 1999, New York Times reported that 512-bit code could be broken. Methods of attacking block cipher or stream cipher includes differential and linear crypt-analysis.

Asymmetric-Key Encryption Major Algorithms Definition: in public key encryption systems each entity A has a public key e and a corresponding private key d. In secure systems, the task of computing d given e is computationally infeasible. The public key defines an encryption transformation E e, while the private key defines the associated decryption transformation D d. Any entity B wishing to send a message m to A obtains an authentic copy of A s public key e, uses the encryption transformation to obtain the ciphertext c = E e (m), and transmits c to A. To decrypt c, A applies the decryption transformation to obtain the original message m = D d (c). Diffie-Hellman s secure key exchange RSA Data Security Digital Signature Algorithm (DSA)

Asymmetric-Key Encryption Advantages It is no longer necessary to encrypt with a private key, which is needed only for decryption. This reduces the problem of managing the number of keys being used. It is ok to publish the public key, and in many cases is necessary. Its simplicity is remarkable: the one-way function encrypts data with the public key, and the same one-way function will decrypt the ciphertext with the private key. the number of keys required in the case of a large network may be considerably smaller than in the case of symmetric-key environment Disadvantages A person may claim that he owns a public key, but there is no guarantee that this claim is true. This is a problem of identity. When an entity sends a ciphertext to another, how would they be sure that the recipient is the intended person. The above problem led to the need for a Trusted third Party (TTP) to manage key distribution. Asymmetric keys are inherently much slower than a comparable symmetric-key counterpart. Key sizes are disproportionately larger than key sizes in symmetric-key approach.

Asymmetric-Key Encryption Attack Strategies - cipher text-only attack, attackers deduce the encryption key - known-plain text attack, adversaries attempts to collect a quantity of plaintext and corresponding cipher text then targets a plaintext to obtain the corresponding cipher text. - chosen- cipher text attack, adversaries target a cipher text and may try to gain access to the equipment used for the decryption task with the objective of figuring out the plaintext.

Methods of Attack! - Digital signature algorithm and message authentication code attacks for message forgery. - Attacks on Protocols, many angles of attack and focus on elements such as keys, identity of sender or receiver, and password. - Examples of attack types: known-key attack: the attacker uses known keys to figure out new keys, impersonation: attacker is disguised as a legitimate entity in a communication network. dictionary: Attacker manipulates all passwords listed in stored computer files hoping to find the right password. Computer Speed and Security IEEE Spectrum reported a comment by Anne- Marie Corley on September 3, 2009: Modern Cryptography relies on the extreme difficulty computers have in factoring huge numbers, but an algorithm that works only on a quantum computer find factors easily. Today in Science, researchers at the University of Bristol, in England, reported the first factoring using this method called Shor s algorithm a chip-scale quantum computer, bringing the field a tiny step closer to realizing practical quantum computation and code cracking.

Hackers penetrated part of the Pentagon security system, forcing it to take quick measure of shutting down the attacked area. 9 The Department of Justice has charged three hackers with theft of over 130 million credit cards through data breaches that compromised businesses including Heartland Payment Systems, 7-Eleven, and supermarket chain owner Hannaford Bros. One of the three, Albert Gonzalez, is already awaiting trial in jail after having been earlier charged with the attack on TJX, in which over 47.5 million credit card numbers were taken over several years The attacks began in October 2006 and used computer systems across the U.S., as well as systems in Latvia, the Netherlands and Ukraine. The attackers used SQL injection attacks, according to the indictment. 10 A sophisticated computer hacker had access to servers at wireless giant T- Mobile for at least a year, which he used to monitor U.S. Secret Service e- mail, obtain customers passwords and social security numbers 11

What is Transparent Key A completely secure encryption without the need for keymanagement, including the distribution, storage, loss, and compromise of encryption keys. Hardware based, it allows the sender and recipient to encrypt and decrypt the data without the need to input or authenticate keys. three critical features: 1) the encryption keys are transparent. 2) the hardware generates the keys dynamically and randomly (or pseudorandomly). 3) No established set of keys. For each byte of plaintext, the key is eight bit long. Key length no longer an issue. Using bit-wise encryption, this algorithm encrypts any binary coded text or video.

How it works! Encrypting Process A random key c(t) is generated and input into both function F and function P c(t) Hardware logic generates a random (or pseudo-random) encryption key. PT j The plaintext PT j is input into function F The ID of the encryption card y is also input in function P F P y F(PT j, c(t)) P(c(t), y) 1035 (PT j ) y Function F and function P encrypt the respective inputs and the sum of the outputs is the cipher-text denoted as (PT j ) y Hardware logic encrypts one byte of plaintext and ID through functions F and P respectively. Function F and P form ciphertext through the summation function, resulting in two bytes for each byte of plaintext. A new random (or pseudorandom) key is generated for next byte of plaintext.

How it works! Decryption (PT j ) y The same cipher-text (PT j ) yr is decomposed into its constituent parts, F j and P P = P(c(t), y) The P component of the encrypted data along with the ID of the receiving party y are input into function P -1, the inverse of the P function of the ciphertext F j = F(PT j, c(t)) P -1 y c(t) The F j component of the encrypted data is input into function F -1, the inverse of the F function of the ciphertext F -1 PT j The output of the function F-1 is the original plaintext PT j The output of the function P -1 is the key c(t) and along with F j, the key is input into function F -1 Decryption process Same cipher-text (PTj) yr is decomposed into its constituent parts, Fj and P, each part going its separate way to the inverse functions F -1 and P -1. The inverse function P -1, recovers encryption key c(t). The inverse function F -1 uses the recovered key to decrypt the cipher-text. The plaintext is recovered.

Benefits Transparency to Cryptanalysis encrypts all punctuation symbols creating continuous string of ASCCI codes without regular breaks same word will look completely different every time it is encrypted; mathematical analysis can not detect patterns does not use an established set of keys Transparency to Users no key management, distribution, or storage is required. Increased Encryption Speed Transparency to Network Eliminates Bottlenecks at server level

Benefits Transparency to Cryptanalysis encrypts all punctuation symbols creating continuous string of ASCCI codes without regular breaks same word will look completely different every time it is encrypted; mathematical analysis can not detect patterns does not use an established set of keys Transparency to Users no key management, distribution, or storage is required. Increased Encryption Speed Transparency to Network Eliminates Bottlenecks at server level

Conclusions The current state of data security and the way sensitive/confidential business being conducted is facing a threat and a dilemma. Transparent Keys Technology represents one of many possible solutions to the above dilemma. It is a proposal for a Giant Change from the current Paradigm. Whether people agree with Transparent Keys Technology or not, a Paradigm Shift is a mandate for conducting data security transaction in our new world. We could no longer afford to waste more precious time.

Thank you

Q & A