Public Key (asymmetric) Cryptography



Similar documents
Notes on Network Security Prof. Hemant K. Soni

Cryptography and Network Security

Cryptography and Network Security Chapter 9

CSCE 465 Computer & Network Security

Digital Signature. Raj Jain. Washington University in St. Louis

Public Key Cryptography Overview

Overview of Public-Key Cryptography

Cryptography and Network Security Chapter 10

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Authentication requirement Authentication function MAC Hash function Security of

Computer Security: Principles and Practice

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

2. Cryptography 2.4 Digital Signatures

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Network Security. Chapter 2 Basics 2.2 Public Key Cryptography. Public Key Cryptography. Public Key Cryptography

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Cryptography and Network Security

CRYPTOGRAPHY IN NETWORK SECURITY

The Mathematics of the RSA Public-Key Cryptosystem

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Public Key Cryptography: RSA and Lots of Number Theory

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Public Key Cryptography of Digital Signatures

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Lecture 6 - Cryptography

7! Cryptographic Techniques! A Brief Introduction

SECURITY IN NETWORKS

Authentication, digital signatures, PRNG

Elements of Applied Cryptography Public key encryption

Applied Cryptography Public Key Algorithms

Cryptography and Network Security

Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis

Symmetric Key cryptosystem

CS 758: Cryptography / Network Security

Lukasz Pater CMMS Administrator and Developer

Public Key Cryptography and RSA. Review: Number Theory Basics

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Principles of Network Security

Lecture 9: Application of Cryptography

Digital Signatures. Meka N.L.Sneha. Indiana State University. October 2015

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

RSA Attacks. By Abdulaziz Alrasheed and Fatima

Chapter 7: Network security

Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

CIS 5371 Cryptography. 8. Encryption --

Communications security

Public Key Cryptography. c Eli Biham - March 30, Public Key Cryptography

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

Software Tool for Implementing RSA Algorithm

SFWR ENG 4C03 - Computer Networks & Computer Security

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

Secure File Transfer Using USB

A New Generic Digital Signature Algorithm

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

Introduction to Cryptography CS 355

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

A Novel Approach to combine Public-key encryption with Symmetric-key encryption

Network Security. HIT Shimrit Tzur-David

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

CIS 433/533 - Computer and Network Security Public Key Crypto/ Cryptographic Protocols

The science of encryption: prime numbers and mod n arithmetic

Cryptography Lecture 8. Digital signatures, hash functions

Module: Applied Cryptography. Professor Patrick McDaniel Fall CSE543 - Introduction to Computer and Network Security

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Capture Resilient ElGamal Signature Protocols

A Factoring and Discrete Logarithm based Cryptosystem

Table of Contents. Bibliografische Informationen digitalisiert durch

CS549: Cryptography and Network Security

Signature Schemes. CSG 252 Fall Riccardo Pucella

An Introduction to Cryptography as Applied to the Smart Grid

Application of Digital Signature for Securing Communication Using RSA Scheme based on MD5

Discrete logarithms within computer and network security Prof Bill Buchanan, Edinburgh Napier

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.

EXAM questions for the course TTM Information Security May Part 1

What is network security?

Cryptography and Network Security Digital Signature

Implementation of Elliptic Curve Digital Signature Algorithm

A SOFTWARE COMPARISON OF RSA AND ECC

Part VII. Digital signatures

Digital Signatures. (Note that authentication of sender is also achieved by MACs.) Scan your handwritten signature and append it to the document?

Network Security. Omer Rana

Review of methods for secret sharing in cloud computing

Public Key Cryptography. Performance Comparison and Benchmarking

Cryptography Exercises

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Introduction. Digital Signature

An Introduction to digital signatures

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

IT Networks & Security CERT Luncheon Series: Cryptography

LUC: A New Public Key System

Introduction to Computer Security

Elements of Applied Cryptography. Key Distribution. Trusted third party: KDC, KTC Diffie-Helmann protocol The man-in-the-middle attack

Transcription:

Public-Key Cryptography UNIVERSITA DEGLI STUDI DI PARMA Dipartimento di Ingegneria dell Informazione Public Key (asymmetric) Cryptography Luca Veltri (mail.to: luca.veltri@unipr.it) Course of Network Security, Spring 2014 http://www.tlc.unipr.it/veltri Also referred to as asymmetric cryptography or two-key cryptography Probably most significant advance in the 3000 year history of cryptography public invention due to Whitfield Diffie & Martin Hellman in 1975 at least that's the first published record known earlier in classified community (e.g. NSA?) Is asymmetric because who encrypts messages or verify signatures cannot decrypt messages or create signatures more in general, operation performed by two parties use different key values Uses clever application of number theoretic concepts and mathematic functions rather than permutations and substitutions 2 Public-Key vs. Secret Cryptography All secret key algorithms do the same thing they take a block and encrypt it in a reversible way All hash algorithms do the same thing they take a message and perform an irreversible transformation Instead, public key algorithms look very different in how they perform their function in what functions they perform They have in common: a private and a public quantities associated with a principal Public-Key vs. Secret Cryptography (cont.) Public key cryptography can do anything secret key cryptography can do, but.. The known public-key cryptographic algorithms are orders of magnitude slower than the best known secret key cryptographic algorithms are usually used only for things secret key cryptography can't do (or can t do in a suitable way) Complements rather than replaces secret key crypto often it is mixed with secret key technology e.g. public key cryptography might be used in the beginning of communication for authentication and to establish a temporary shared secret key used to encrypt the conversation 3 4

Public-Key vs. Secret Cryptography (cont.) Public-Key Cryptography With symmetric/secret-key cryptography you need a secure method of telling your partner the key you need a separate key for everyone you might communicate with Instead, with public-key cryptography, keys are not shared Public-key cryptography often uses two keys: a public-key, which may be known by anybody, and can be used to encrypt messages, or verify signatures a private-key, known only to the recipient, used to decrypt messages, or sign (create) signatures it is computationally easy to en/decrypt messages when key is known it is computationally infeasible to find decryption key knowing only encryption key (and vice-versa) Some asymmetric algorithms don t use keys at all! 5 6 Why Public-Key Cryptography? Security of Public Key Schemes Can be used to: key distribution secure communications without having to trust a KDC with your key (key exchange) digital signatures verify a message is come intact from the claimed sender (authentication) encryption/decryption - secrecy of the communication (confidentiality) Note: public-key cryptography simplifies but not eliminates the problem of trusted systems and key management some algorithms are suitable for all uses,others are specific to one Example of public key algorithms: RSA, which does encryption and digital signature El Gamal and DSS, which do digital signature but not encryption Diffie-Hellman, which allows establishment of a shared secret zero knowledge proof systems, which only do authentication 7 Security of public-key algorithms still relies on key size (as for secret-key algorithms) Like private key schemes brute force exhaustive search attack is always theoretically possible But keys used are much larger (>512bits) A crucial feature is that the private key is difficult to determine from the public key security relies on a large enough difference in difficulty between easy (en/decrypt) and hard (cryptanalyse) problems often the hard problem is known, its just made too hard to do in practise requires the use of very large numbers hence is slow compared to private key schemes 8

Rivest, Shamir, and Adleman (RSA) Rivest, Shamir, and Adleman by Rivest, Shamir & Adleman of MIT in 1977 best known & widely used public-key scheme Based on exponentiation in a finite (Galois) field over integers modulo n nb. exponentiation takes O((log n) 3 ) operations (easy) uses large integers (eg. 1024 bits) security due to cost of factoring large numbers nb. factorization takes O(e log n log log n ) operations (hard) The key length is variable long keys for enhanced security, or a short keys for efficiency The plaintext block size (the chunk to be encrypted) is also variable The plaintext block size must be smaller than the key length The ciphertext block will be the length of the key RSA is much slower to compute than popular secret key algorithms like DES, IDEA, and AES 10 RSA Algorithm Why RSA Works First, you need to generate a public key and a corresponding private key: choose two large primes p and q (around 512 bits each or more) p and q will remain secret multiply them together (result is 1024 bits), and call the result n it's practically impossible to factor numbers that large for obtaining p and q choose a number e that is relatively prime (that is, it does not share any common factors other than 1) to φ(n) since you know p and q, you know φ(n) = (p-1 )(q-1 ) your public key is KU =<e,n> find the number d that is the multiplicative inverse of e mod φ(n) your private key is KR=<d,n> or KR=<d,p,q> Because of Euler's Theorem: a kø(n)+1 mod n = a where gcd(a,n)=1 In RSA have: n=p. q ø(n)=(p-1)(q-1) carefully chosen e & d to be inverses mod ø(n) hence e. d=1+k. φ(n) for some k Hence: c d = (m e ) d = m 1+kø(n) = m mod n To encrypt a message m (< n), someone can use your public key c = m e mod n Only you will be able to decrypt c, using your private key m = c d mod n 11 12

RSA Key Setup Each user generates a public/private key pair by: selecting two large primes at random p,q computing their system modulus n = p q note ø(n)=(p-1)(q-1) selecting at random the encryption key e where 1<e<ø(n), gcd(e,ø(n))=1 solve following equation to find decryption key d e d = 1 mod ø(n) and 0 d n Publish their public encryption key: KU={e,n} Keep secret private decryption key: KR={d,p,q} RSA Use To encrypt a message M the sender: obtains public key of recipient KU=<e,n> computes: c=me mod n, where 0 m<n To decrypt the ciphertext c the owner: uses their private key KR=<d,n> computes: m=c d mod n Note that the message m must be smaller than the modulus n (block if needed) 13 14 RSA RSA Example C=E(Ke,M) M Kc C RSA setup select primes: p=17 & q=11 compute n = pq =17 11=187 compute ø(n)=(p 1)(q-1)=16 10=160 Kd select e : gcd(e,160)=1; choose e=7 C M determine d: de=1 mod 160 and d < 160 Value is d=23 since 23 7=161= 10 160+1 publish public key KU={7,187} M=D(Kd,C) keep secret private key KR={23,187}={23,17,11} M plaintext C ciphertext Ke encription key (e.g. public key, Ku or K + ) Kd decription key (e.g. private key, Kr or K - ) 15 16

RSA encryption/decryption: RSA Example (cont) given message M = 88 (nb. 88<187) encryption: C = 88 7 mod 187 = 11 decryption: M = 11 23 mod 187 = 88 RSA Security three approaches to attacking RSA: brute force key search (infeasible given size of numbers) mathematical attacks (based on difficulty of computing ø(n), by factoring modulus N) timing attacks (on running of decryption) 17 18 Diffie-Hellman Diffie-Hellman First public-key type scheme proposed By Diffie & Hellman in 1976 along with the exposition of public key concepts now know that James Ellis (UK CESG) secretly proposed the concept in 1970 predates RSA less general than RSA: it does neither encryption nor signature Is a practical method for public exchange of a secret key allows two individuals to agree on a shared secret (key) It is actually used for key establishment Used in a number of commercial products 19 20

Diffie-Hellman Setup Diffie-Hellman Key Exchange Diffie-Hellman setup: all users agree on global parameters: p = a large prime integer or polynomial g = a primitive root mod p Alice g, p Bob each user (eg. A) generates their key chooses a secret key (number): x A < p compute their public key: y A = g xa mod p x a y a =g xa mod p y a each user makes public that key y A y b x b y b =g xb mod p K ab =y b xa =g xaxb K ab =y a xb =g xaxb 21 22 Key exchange: Diffie-Hellman Key Exchange Shared key K AB for users A & B can be computed as: K AB = g x A. xb mod p = y A x B mod p (which B can compute) = y B x A mod p (which A can compute) K AB can be used as session key in secret-key encryption scheme between A and B Attacker must solve discrete log Diffie-Hellman - Example users Alice & Bob who wish to swap keys: agree on prime p=353 and g=3 select random secret keys: A chooses x A =97, B chooses x B =233 compute public keys: y A =3 97 mod 353 = 40 y B =3 233 mod 353 = 248 (Alice) (Bob) compute shared session key as: x K AB = y A B mod 353 = 248 97 = 160 x K AB = y B A mod 353 = 40 233 = 160 (Alice) (Bob) 23 24

Zero Knowledge Proof Systems Only do authentication prove that you know a secret without revealing the secret RSA is a zero knowledge system There are zero knowledge systems with much higher performance Example (Isomorphic graphs): Alice defines two large (say 500 vertices) isomorphic graphs G A, G B G A and G B become public, but only Alice knows the mapping to prove her identity to Bob, Alice find a set of isomorphic graphs G 1,G 2,.., G k Bob divides the set into two subset T A and T B Alice shows to Bob the mapping between each G i T A and G A, and between each G j T B and G B Security uses of public key cryptography Transmitting over an insecure channel each party has a <public key, private key> pair (Ku,Kr) each party encrypts with the public key of the other party encrypt m A using Ku B decrypt m B using Kr A Secure storage on insecure media encrypt with public key, decrypt with private key useful when you can let third party to encrypt data decrypt m A using Kr B encrypt m B using Ku A Peer Authentication authentication by proving the knowledge of the private key encrypt r using Ku B decrypt to r using Kr B r 25 26 Security uses of public key cryptography Key establishment e.g. Diffie-Hellman Data authentication (Digital signature) based on cryptographic checksum see later Note Public key cryptography has specific algorithm for specific function such as data encryption MAC/digital signature key establishment peer authentication Pros and cons of Public key cryptography Every users have to keep only one secret (the private key) Public keys of other users can verified through a trusted third party infrastructure (e.g. PKI) The total number of keys for N users is 2N instead, with symmetric cryptography n(n-1)/2 keys are needed 27 28

Digital Signature Digital signature and digital certification Digital Signature is an application in which a signer, say "Alice," "signs" a message m in such a way that anyone can "verify" that the message was signed by no one other than Alice, and consequently that the message has not been modified since she signed it i.e. the message is a true and correct copy of the original The difference between digital signatures and conventional ones is that digital signatures can be mathematically verified The typical implementation of digital signature involves a message-digest algorithm and a public-key algorithm for encrypting the message digest (i.e., a message-digest encryption algorithm) 30 Digital Signature through RSA Two Approaches to Digital Signatures Signature m signature through private key h=h(m) {h} KR H RSA calculation of h=h(m) KR m {H(m)} KR signed plaintext RSA approach Verification m' H h''=h(m') h'? YES/NO DSS approach RSA KU 31 32

Digital Signature Standard (DSS) DSS Operations DSS (Digital Signature Standard) Proposed by NIST (U.S. National Institute of Standards and Technology) & NSA in 1991 FIPS 186 Based on an algorithm known as DSA (Digital Signature Algorithm) is a variant of the Elgamal (Taher Elgamal) scheme uses 160-bit exponents creates a 320 bit signature (160+160) but with 1024 (or more) bit security uses SHA/SHS hash algorithm Security depends on difficulty of computing discrete logarithms 33 34 DSA Key Generation DSS Signing and Verifying have shared global public key values (p,q,g) L and N are respectively the key length and hash length L = 1024 or more, and multiple of 64 (e.g. 1024, 2048, 3072,..) N = 160 or more (e.g. 160, 256,..) take a large (L-bit) prime p choose q, a N-bit prime factor of p-1 in practice, you can choose q, and then p such that (p-1) is multiple of q choose g such that its multiplicative order modulo p is q in practice, g=a (p-1)/q for some arbitrary a with 1<a<p-1, with a (p-1)/q mod p > 1 Signing Verifying choose x<q compute y = g x mod p public key = (p,q,g,y) private key = x s=f1(h(m),k,x,r,q)=(k -1 (H(m)+xr)) mod q r=f2(k,p,q,g)=(g k mod p) mod q w=f3(s,q)=s -1 mod q v=f4(p,q,g,y,h(m),w,r)= =((g H(m)w mod q y rw mod q ) mod p) mod q 35 36

DSA Signature Creation DSA Signature Verification to sign a message M the sender generates: a random signature key k, k<q N.B.: k must be random, be destroyed after use, and never be reused computes the message digest: h = SHA(M) then computes signature pair: r = (g k mod p)mod q s = k -1 (h+x. r)mod q sends signature (r,s) with message M having received M & signature (r,s) to verify a signature, recipient computes: w = s -1 mod q v = (g hw mod q y rw mod q mod p) mod q if v=r then signature is verified proof v = (g hw mod q y rw mod q mod p) mod q = = (g w(h+xr) mod q mod p) mod q = = (g k mod p) mod q = = r 37 38 Digital Certification Digital certification is an application in which a certification authority "signs" a special message m containing the name of some user, say "Alice," and her public key in such a way that anyone can "verify" that the message was signed by no one other than the certification authority and thereby develop trust in Alice's public key The typical implementation of digital certification involves a signature algorithm for signing the special message 39