CS6750: Cryptography and Communica7on Security

Size: px
Start display at page:

Download "CS6750: Cryptography and Communica7on Security"

Transcription

1 CS6750: Cryptography and Communica7on Security Class 5: Key Distribu7on and PKIs Dr. Erik- Oliver Blass Travis Mayberry

2 Plan 1. The problem of key distribu7on 2. The idea of Merkle, Diffie and Hellman 3. The solu7on of Rivest, Shamir, and Adleman 4. Public- Key Infrastructures 5. Iden7ty- based encryp7on

3 How to distribute cryptographic keys? (And why is it a problem?!) If the users can meet in person beforehand it s simple. But what to do if they cannot meet? (a typical example: on- line shopping)

4 A naive solu7on: Predeploy Pairwise Keys A company gives to every employee P i a separate key K ij to communicate with every P j P 2 P 3 K 12 K 13 K 14 P 4 P 1 K 15 P 5

5 Drawbacks Quadra7c number of keys required High storage & deployment costs P 2 P 3 P 4 P 1 Other drawbacks? P 5

6 Alterna7ve: Key Distribu7on Centers Some trusted server (a Key Distribu>on Center, KDC) gives the keys to the users on the fly feasible if the users are, e.g., working in one company Therefore, we will discuss it! infeasible on the internet relies on the honesty of KDC Why?! KDC needs to be permanently available (no crash) Single point of failure, perfect target for an a_ack...

7 How to establish a key with a trusted server? key shared by Alice and the server: K AS key shared by Bob and the server: K BS server S A want to establish a fresh session key B Looks easy, but not so trivial as it may seem!

8 Nota7on {M} K a message M encrypted and authen7cated with K Formally: K=(K 0,K 1 ) {M} K = Enc K0 (M), Tag K1 (Enc K0 (M)) Authen7cated Encryp7on

9 Idea 1 key shared by Alice and the server: K AS key shared by Bob and the server: K BS (A,B) server S selects a random K AB {K AB } K AS {K AB } K BS Ticket A {K AB } K BS, A B

10 An a_ack key shared by Alice and the server: K AS (A,B) {K AB } K AS {K AB } K BS server S selects a random K AB key shared by Bob and the server: K BS I m talking to D {K AB } K BS, A {K AB } K BS, D A B

11 Idea 2 key shared by Alice and the server: K AS key shared by Bob and the server: K BS (A,B) server S selects a random K AB Alice verifies this! {K AB, B} K AS {K AB, A} K BS A {K AB, A} K BS B

12 A replay a_ack the adversary stores the values that the server sent in the previous session and replays them. (A,B) So, the key is not fresh {K AB, B} K AS {K AB, A} K BS A {K AB, A} K BS B

13 How to protect against replay a_acks? Nonce number used once. Nonce is a random number generated by one party and returned to that party to show that a message is newly generated ( fresh ).

14 Idea 3: Needham- Schroeder 1972 key shared by Alice and the server: K AS key shared by Bob and the server: K BS server S A,B,N A selects a random K AB {K AB, B, N A, {K AB, A} KBS } KAS Ticket 1 Ticket 2 {K AB, A} K BS A {N B } K AB {N B - 1} K AB B Why this?

15 A replay a_ack on Needham- Schroeder Assume that an old session key X AB is known to the adversary. then this might happen: {X AB, A} K BS {N B } X AB {N B - 1} X AB Bob Known Session Key A_ack

16 Fixed Needham- Schroeder protocol key shared by Alice and the server: K AS key shared by Bob and the server: K BS (A,B,N A, {A,N B } K BS ) server S selects a random K AB {K AB, B, N A } K AS {K AB, A, N B } K BS (A,B) A Now, Alice knows that Bob has K AB. {A,N B } K BS {K AB, A, N B } K BS {N B } K AB {N B - 1} K AB B Now, Bob knows that has K AB.

17 Plan 1. The problem of key distribu7on 2. The idea of Merkle, Diffie and Hellman 3. The solu7on of Rivest, Shamir and Adleman 4. Public- Key Infrastructure 5. Iden7ty- based encryp7on

18 The solu7on without KDC Public- Key Cryptography Ralph Merkle (1974) Whihield Diffie and Mar7n Hellman (1976)

19 A li_le bit of history Diffie and Hellman were the first to publish a paper containing the idea of public- key cryptography: W.Diffie and M.E.Hellman, New direc>ons in cryptography IEEE Trans. Inform. Theory, IT- 22, 6, 1976, pp A similar idea was described by Ralph Merkle: in 1974 he described it in a project proposal for a Computer Security course at UC Berkeley (it was rejected) in 1975 he submi_ed it to the CACM journal (it was rejected) (see h_p:// ) It 1997 the GCHQ (the Bri7sh equivalent of the NSA) revealed that they knew it already in 1973.

20 The idea Instead of using one key k, use 2 keys (pk,sk), where pk is used for encryp>on, sk is used for decryp>on. pk can be public, and only sk has to be kept secret! That s why it s called: public- key cryptography m c := Enc(k,m) Dec(k,c) Alice c := Enc(pk,m) Bob Dec(sk,c) k pk k sk

21 Same idea can also work for authen7ca7on sk is used for compu>ng a tag, pk is used for verifying correctness of the tag. this will be called signatures Sign the signing algorithm m (m,t := Tag(k,m)) Vrfy(k,m,t) Alice (m,t := Sign(sk,m)) Bob Vrfy(pk,m,t) k sk k pk

22 Anyone can send encrypted messages to anyone else public register: P 2 4. P 3 computes Dec(sk 3,c) P 3 pk 1 sk 3 pk 2 pk 3 pk 4 2. reads pk 3 P 1 P 4 pk 5 1. P 1 wants to send m to P 3 P 5

23 Anyone can verify the signatures public register: P 2 Sign(sk 3,m) P 3 pk 1 sk 3 pk 2 pk 3 2. reads pk 3 Sign(sk 3,m) P 4 pk 4 P 1 pk 5 3. computes Vrfy(pk 3,m,t) P 5

24 Advantages of signature schemes Digital signatures are: 1. publicly verifiable 2. transferable 3. provide non- repudia>on (we explain it on the next slides)

25 Look at MACs... k k m є {0,1}* (m, t=tag k (m)) Alice Bob Why should I trust you? Look, I got (m,t) from Alice! 1. I don t know k, so how can I verify the tag? 2. You could have created t yourself (because you know k)! Carol

26 Signatures are publicly- verifiable! sk A m є {0,1}* (m, σ =Sign sk (m)) Alice Bob Look, I got (m,σ) from Alice! I can calculate Vrfy(pk A,m,σ) and check. Carol

27 à Signatures are transferable Alice sk A σ = Sign(sk A,m) Alice signed m Alice signed m Alice signed m I believe it! I believe it! I believe it! pk A P 1 (m,σ) (m,σ) (m,σ) pk A pk A pk A P 2 P 3 P 4

28 Non- repudia7on sk A m є {0,1}* (m, σ =Sign sk (m)) Alice Bob I ve got (m,σ) from Alice What would happen in case of a MAC? It s not true! I never signed m! Vrfy(pk,m,σ) = yes so you cannot repudiate signing m... Judge

29 Important problems Who maintains the register? How to contact it securely? How to revoke the key (if it is lost)?... We will discuss these things later (when we will be talking about Public- Key Infrastructures)

30 Is public key cryptography possible? In physical world : yes! Examples: 1. normal wri_en signatures 2. padlocks: anyone can lock it the key is needed to unlock

31 The observa7on of Diffie and Hellman (pk, sk) the key pair plaintexts public- key encryp7on: Enc(pk,x) Dec(sk,y) ciphertexts signature schemes: easy only if one knows sk tags ( signatures ) Sign(sk,y) Vrfy(pk,x) messages Looks similar... easy only if one knows sk

32 Trapdoor permuta>ons (informal defini7on) A trapdoor permuta7on is a family of permuta7ons indexed by pk є K: {Enc pk : M C } pk є K such that for every key pk, there exists a key sk, and this is denoted Dec sk Enc pk easy M easy: one can compute Enc pk - 1 if one knows a trapdoor sk hard (otherwise) C

33 How to encrypt a message m? messages encryp>on: decryp>on: c := Enc pk (m) m := Dec sk (c) plaintexts one can compute it only if one knows sk

34 How to sign a message m? signing: one can compute it only if one knows sk Dec sk (m) signatures verifying: Enc pk (m) messages Warning: In general it is not that simple. We will explain it later.

35 Plan 1. The problem of key distribu7on 2. The idea of Merkle, Diffie and Hellman 3. The solu7on of Rivest, Shamir, and Adleman 4. Public- Key Infrastructure 5. Iden7ty- based encryp7on

36 Do trapdoor func7ons exist? Yes: exponen7a7on modulo N, where N is a product of two large primes. Ron Rivest, Adi Shamir, and Leonard Adleman (1977) RSA func7on is (conjectured to be) a trapdoor permuta7on!

37 The RSA func7on A first look! N = pq, such that p and q are random primes, and p = q e random, such that gcd(e, (p- 1)(q- 1)) = 1 d random, such that ed = 1 (mod (p- 1)(q- 1)) pk := (N,e) sk := (N,d) Enc pk : Z N Z N is defined as: Enc pk (m) = m e mod N. Dec sk : Z N Z N is defined as: Dec sk (c) = c d mod N.

38 Ques7ons and doubts N = pq, such that p and q are random primes, and p = q e random such that gcd(e, (p- 1)(q- 1)) = 1 d such that ed = 1 (mod (p- 1)(q- 1)) pk := (N,e) sk := (N,d) Enc pk : Z N Z N is defined as: Enc pk (m) = m e mod N. Dec sk : Z N Z N is defined as: Dec sk (c) = c d mod N. How large these primes need to be? How to sample them? Looks a bit strange... Can exponen7a7on be done efficiently? Enc pk (1) = 1 e mod N = 1 Oops... We will address it later...! encryp7on is determinis7c...

39 Is RSA secure? Is RSA secure: 1. as an encryp7on scheme? 2. as a signature scheme? The answer is not that simple. First, we would need to define security! We will do it in the next lectures.

40 End of Class

41 Remember this slide? public register: pk 1 P 2 sk 2 P 3 sk 3 pk 2 pk 3 pk 4 pk 5 How to maintain such a public register? P 1 sk 1 sk 5 P 5 P 4 sk 4

42 A problem sk A m є {0,1}* (m, σ =Sign sk (m)) Alice Bob It s not true! I never signed m! I got (m,σ) from Alice Vrfy(pk,m,σ) = yes so you cannot repudiate signing m... But pk is not my public key! Judge

43 Solu7on: cer7fica7on authori>es A simplified view: (pk Cert,sk Cert ) arrives with her ID and pk Alice, pays authority Cer>fica>on Authority checks the ID of Alice and issues a cer>ficate: Alice Sign sk Cert ( pk Alice is a public key of Alice ) Now, everyone can verify that pk Alice is a public key of Alice. So, Alice can a_ach it to every signature. really everyone?

44 How to verify the cer7ficate? To verify the cer7ficate coming from Cert, one needs: 1. to know the public key of Cert 2. to trust Cert How?

45 Plan 1. The problem of key distribu7on 2. The idea of Merkle, Diffie and Hellman 3. The solu7on of Rivest, Shamir and Adleman 4. Public- Key Infrastructure 5. Iden7ty- based encryp7on

46 Users can cer7fy keys of other users knows pk 2 knows pk 3 P 1 P 2 P 3 pk 1 pk 2 pk 3 Requirement trusts P 2 P 2 cer7fies that pk 3 is a public key of P 3 signature of P 2 that pk 3 is the public key of P3 P 1 believes This should be done only if P 2 really met P 3 in person and verified his iden7ty.

47 knows pk 2 knows pk 3 knows pk 4 P 1 P 2 P 3 P 4 pk 1 pk 2 pk 3 pk 4 trusts P 2 trusts P 3 P 2 cer7fies that pk 3 is a public key of P 3 signature of P 2 P 3 cer7fies that pk 4 is a public key of P 4 signature of P 3 P 1 believes that pk 4 is a public key of P 4

48 knows pk 2 knows pk 3 knows pk 4 knows pk 5 P 1 P 2 P 3 P 4 P 5 pk 1 pk 2 pk 3 pk 4 pk 5 trusts P 2 trusts P 3 This is called a cer>ficate chain trusts P 4 P 2 cer7fies that pk 3 is a public key of P 3 signature of P 2 P 1 believes P 3 cer7fies that pk 4 is a public key of P 4 signature of P 3 that pk 5 is a public key of P 5 P 4 cer7fies that pk 5 is a public key of P 5 signature of P 4

49 A problem knows pk 2 knows pk 3 knows pk 4 P 1 P 2 P 3 P 4 pk 1 pk 2 pk 3 pk 4 trusts P 2 trusts P 3 What if P 1 does not know P 3? How can he trust him? Naïve answer: P 2 can recommend P 3 to P 1.

50 A ques7on: is trust transi7ve? Does: P 1 P 2 P 3 pk 1 pk 2 pk 3 trusts P 2 trusts P 3 imply: P 1 P 2 P 3 pk 1 pk 2 pk 3 trusts P 3?

51 Example I can recommend P 3 P 1 P 2 P 3 pk 1 pk 2 trusts that P 2 is a very honest person pk 3 trusts that P 3 is a very honest person P 1 P 2 P 3 pk 1 pk 2 pk 3 Does not trust that P 3 is honest, because he thinks that P 2 is honest, but very naive

52 Moral Trust is not transi>ve: P 1 trusts in the cer7ficates issued by P 2 is not the same as saying: P 1 trusts that if P 2 says one can trust the cer7ficates issued by P 3 then one can trust the cer7ficates issued by P 3

53 level 1 recommenda7on: P i : you can trust in all the cer>ficates issued by P i+1 level 2 recommenda7on: P i : you can trust all the level 1 recommenda>ons issued by P i+1 level 3 recommenda7on: P i : you can trust all the level 2 recommenda>ons issued by P i+1 and so on... Recommenda7on levels Recursively: level n+1 recommenda7on: P i : you can trust all the level n recommenda>ons issued by P i+1

54 Now, if: P 1 P 2 P 3 P 4 P 1 trusts in all the recommenda7ons of level 2 issued by P 2 P 2 issues a recommenda7on of level 2 for P 3 P 3 issues a recommenda7on of level 1 for P 4 then P 1 P 2 P 3 P 4 trusts the cer7ficates issued by P 4 Of course, also recommenda7ons need to be signed. Starts to look complicated?

55 There is more! P 1 can associate trust value v p1p2 to P 2, P 2 assigns v p2p3 to P 3 etc. P 1 trusts P 2 with v p1p2 = 0.9 P 2 trusts P 3 with v p2p3 = 0.5 à P 1 trusts P 3 with v p1p3 = v p1p2 v p2p3 =0.45 Idea: if v p1px < threshold, P 1 does not trust P x anymore P 1 and P x need to meet and sign cer7ficates Also, trust values need to be signed!

56 Result: Web of Trust Example: Philadelphia Linux User Group

57 Prac7cal alterna7ve? Web browsers! In web browsers, X.509 cer7ficates include recommenda7on. Here, the level of recommenda7ons is bounded using a field called basic constraints/path length. X.509 is used for example in SSL. à in every Web browser So, let s look at it.

58

59

60

61

62 this field limits the recommenda7on depth (here it s unlimited)

63 Concrete example Let s go to the Bank of Rome website

64 a cer7ficate chain contains 3 cer7ficates

65 the second cer7ficate was signed by Verisign Primary Authority for Verisign Inc. (it s not strange, we will discuss it)

66 The third cer7ficate was issued by Verisign Inc. for Banca di Roma

67 The typical picture web browser knows these cer>ficates Verisign DigiCert Entrust... Implicit assump7ons: Verisign USA Verisign Europe the author of the browser is honest, the author of the browser is competent nobody manipulated the browser is it always true? Bank of America a cer7ficate path

68 What happens when Alice contacts the bank? Alice sends (cert 1,..., cert n ) Bank If Alice s browser knows cert 1, it can verify the chain and trust the public key of the bank from cert n

69 What happens if cer7fica7on path is invalid? For example, if the first cer7ficate in the path is not known to the user. Experiment: let s delete the Verisign cer7ficate in the configura7on of the browser...

70

71 What happens?

72 Plan 1. The problem of key distribu7on 2. The idea of Merkle, Diffie and Hellman 3. The solu7on of Rivest, Shamir and Adleman 4. Public- Key Infrastructures 5. Iden7ty- based encryp7on

73 Iden7ty based cryptography Main idea: User s iden7fier ID is the public key. (e.g., ID = user s address). message M C = Enc(ID,M) ID: peter@gmail.com ques>on: What is the private key?

74 Solu7on central authority Generates secret key SK : Extract(SK, peter@gmail.com holds a master secret key SK Generates secret key of SK joe@yahoo.com : Extract(SK, joe@yahoo.com) Generates secret key of SK john@gmail.com : Extract(SK, john@yahoo.com) joe@yahoo.com john@gmail.com sent over a secure link

75 How to decrypt knows SK message M C = Enc(peter@gmail.com, M) peter@gmail.com calculates M=Dec(SK peter, C)

76 ID- based encryp7on Main advantage: no need for mul7ple cer7ficates, PKI Drawbacks: S7ll, users need to trust authority Need to have a secure link to it

77 ID- based encryp7on Proposed by Adi Shamir in (implemented iden7ty- based signatures) Encryp7on schemes proposed by Boneh and Franklin (2001) and, independently, Cocks (2001). In 2002 Boneh started a company Voltage Security that produces solu7ons based on his ID- based scheme.

78 Conclusion Key exchange for Alice and Bob Centralized server, Web of Trust, PKI Third trusted party required Does it work without? No!

79 End of Class

1 Identification protocols

1 Identification protocols ISA 562: Information Security, Theory and Practice Lecture 4 1 Identification protocols Now that we know how to authenticate messages using MACs, a natural question is, how can we use MACs to prove that

More information

Computer Security Course. Public Key Crypto. Slides credit: Dan Boneh

Computer Security Course. Public Key Crypto. Slides credit: Dan Boneh Computer Security Course. Dawn Song Public Key Crypto Slides credit: Dan Boneh Administra>ve Issues Security is a fast- changing field We cover a broad spectrum of areas in computer security Hence, there

More information

What did we talk about last time? Public key cryptography A little number theory

What did we talk about last time? Public key cryptography A little number theory Week 4 - Friday What did we talk about last time? Public key cryptography A little number theory If p is prime and a is a positive integer not divisible by p, then: a p 1 1 (mod p) Assume a is positive

More information

The ElGamal Public- key System

The ElGamal Public- key System Online Cryptography Course Dan Boneh Public key encryp3on from Diffie- Hellman The ElGamal Public- key System Recap: public key encryp3on: (Gen, E, D) Gen pk sk m c c m E D Recap: public- key encryp3on

More information

Public Key Algorithms

Public Key Algorithms Public Key Algorithms 1 Public Key Algorithms It is necessary to know some number theory to really understand how and why public key algorithms work Most of the public key algorithms are based on modular

More information

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017 COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Previously Exchanging keys and public key encryption Public Key Encryption pk sk Public Key Encryption pk cß Enc(pk,m) sk m Public

More information

Cryptography CS 555. Topic 16: Key Management and The Need for Public Key Cryptography. CS555 Spring 2012/Topic 16 1

Cryptography CS 555. Topic 16: Key Management and The Need for Public Key Cryptography. CS555 Spring 2012/Topic 16 1 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography CS555 Spring 2012/Topic 16 1 Outline and Readings Outline Private key management between two parties Key management

More information

Kurose & Ross, Chapters (5 th ed.)

Kurose & Ross, Chapters (5 th ed.) Kurose & Ross, Chapters 8.2-8.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) Addison-Wesley, April 2009. Copyright 1996-2010, J.F Kurose and

More information

Computer Security: Crypto & Web Security

Computer Security: Crypto & Web Security CSE 484 / CSE M 584 Computer Security: Crypto & Web Security TA: Thomas Crosley tcrosley@cs Many slides by Franziska Roesner and Adrian Sham HTTP://XKCD.COM/1323/ Lab 1 Deadline Reminders Lab 1 Final due

More information

CS 425 / ECE 428 Distributed Systems Fall 2017

CS 425 / ECE 428 Distributed Systems Fall 2017 CS 425 / ECE 428 Distributed Systems Fall 2017 Indranil Gupta (Indy) Dec 5, 2017 Lecture 27: Security All slides IG Security Threats Leakage Unauthorized access to service or data E.g., Someone knows your

More information

Key Management. CS 161: Computer Security Prof. Vern Paxson

Key Management. CS 161: Computer Security Prof. Vern Paxson Key Management CS 161: Computer Security Prof. Vern Paxson TAs: Paul Bramsen, Apoorva Dornadula, David Fifield, Mia Gil Epner, David Hahn, Warren He, Grant Ho, Frank Li, Nathan Malkin, Mitar Milutinovic,

More information

Cryptography Lecture 4. Attacks against Block Ciphers Introduction to Public Key Cryptography. November 14, / 39

Cryptography Lecture 4. Attacks against Block Ciphers Introduction to Public Key Cryptography. November 14, / 39 Cryptography 2017 Lecture 4 Attacks against Block Ciphers Introduction to Public Key Cryptography November 14, 2017 1 / 39 What have seen? What are we discussing today? What is coming later? Lecture 3

More information

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III Cryptography III Public-Key Cryptography Digital Signatures 2/1/18 Cryptography III 1 Public Key Cryptography 2/1/18 Cryptography III 2 Key pair Public key: shared with everyone Secret key: kept secret,

More information

ASYMMETRIC (PUBLIC-KEY) ENCRYPTION. Mihir Bellare UCSD 1

ASYMMETRIC (PUBLIC-KEY) ENCRYPTION. Mihir Bellare UCSD 1 ASYMMETRIC (PUBLIC-KEY) ENCRYPTION Mihir Bellare UCSD 1 Recommended Book Steven Levy. Crypto. Penguin books. 2001. A non-technical account of the history of public-key cryptography and the colorful characters

More information

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 08r. Pre-exam 2 Last-minute Review Cryptography Paul Krzyzanowski Rutgers University Spring 2018 March 26, 2018 CS 419 2018 Paul Krzyzanowski 1 Cryptographic Systems March 26, 2018 CS

More information

ASYMMETRIC (PUBLIC-KEY) ENCRYPTION. Mihir Bellare UCSD 1

ASYMMETRIC (PUBLIC-KEY) ENCRYPTION. Mihir Bellare UCSD 1 ASYMMETRIC (PUBLIC-KEY) ENCRYPTION Mihir Bellare UCSD 1 Recommended Book Steven Levy. Crypto. Penguin books. 2001. A non-technical account of the history of public-key cryptography and the colorful characters

More information

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7 Public-Key Cryptography Professor Yanmin Gong Week 3: Sep. 7 Outline Key exchange and Diffie-Hellman protocol Mathematical backgrounds for modular arithmetic RSA Digital Signatures Key management Problem:

More information

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d) Outline AIT 682: Network and Systems Security 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard Topic 5.2 Public Key Cryptography Instructor: Dr. Kun Sun 2 Public Key

More information

Applied Cryptography and Computer Security CSE 664 Spring 2018

Applied Cryptography and Computer Security CSE 664 Spring 2018 Applied Cryptography and Computer Security Lecture 13: Public-Key Cryptography and RSA Department of Computer Science and Engineering University at Buffalo 1 Public-Key Cryptography What we already know

More information

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography CSCI 454/554 Computer and Network Security Topic 5.2 Public Key Cryptography Outline 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard 2 Introduction Public Key Cryptography

More information

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology Cryptography & Key Exchange Protocols Faculty of Computer Science & Engineering HCMC University of Technology Outline 1 Cryptography-related concepts 2 3 4 5 6 7 Key channel for symmetric cryptosystems

More information

Part VI. Public-key cryptography

Part VI. Public-key cryptography Part VI Public-key cryptography Drawbacks with symmetric-key cryptography Symmetric-key cryptography: Communicating parties a priori share some secret information. Secure Channel Alice Unsecured Channel

More information

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA CSCI 454/554 Computer and Network Security Topic 5.2 Public Key Cryptography 1. Introduction 2. RSA Outline 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard 2 Introduction Public Key Cryptography

More information

Public-Key Encryption, Key Exchange, Digital Signatures CMSC 23200/33250, Autumn 2018, Lecture 7

Public-Key Encryption, Key Exchange, Digital Signatures CMSC 23200/33250, Autumn 2018, Lecture 7 Public-Key Encryption, Key Exchange, Digital Signatures CMSC 23200/33250, Autumn 2018, Lecture 7 David Cash University of Chicago Plan 1. Security of RSA 2. Key Exchange, Diffie-Hellman 3. Begin digital

More information

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

ח'/סיון/תשע א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms Public Key Cryptography Kurose & Ross, Chapters 8.28.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) AddisonWesley, April 2009. Copyright 19962010,

More information

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 26. Cryptographic Systems: An Introduction Paul Krzyzanowski Rutgers University Fall 2015 1 Cryptography Security Cryptography may be a component of a secure system Adding cryptography

More information

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005 Lecture 30 Security April 11, 2005 Cryptography K A ciphertext Figure 7.3 goes here K B symmetric-key crypto: sender, receiver keys identical public-key crypto: encrypt key public, decrypt key secret Symmetric

More information

Spring 2010: CS419 Computer Security

Spring 2010: CS419 Computer Security Spring 2010: CS419 Computer Security Vinod Ganapathy Lecture 7 Topic: Key exchange protocols Material: Class handout (lecture7_handout.pdf) Chapter 2 in Anderson's book. Today s agenda Key exchange basics

More information

Introduction to Cryptography and Security Mechanisms. Abdul Hameed

Introduction to Cryptography and Security Mechanisms. Abdul Hameed Introduction to Cryptography and Security Mechanisms Abdul Hameed http://informationtechnology.pk Before we start 3 Quiz 1 From a security perspective, rather than an efficiency perspective, which of the

More information

Lecture 2 Applied Cryptography (Part 2)

Lecture 2 Applied Cryptography (Part 2) Lecture 2 Applied Cryptography (Part 2) Patrick P. C. Lee Tsinghua Summer Course 2010 2-1 Roadmap Number theory Public key cryptography RSA Diffie-Hellman DSA Certificates Tsinghua Summer Course 2010 2-2

More information

Fall 2010/Lecture 32 1

Fall 2010/Lecture 32 1 CS 426 (Fall 2010) Key Distribution & Agreement Fall 2010/Lecture 32 1 Outline Key agreement without t using public keys Distribution of public keys, with public key certificates Diffie-Hellman Protocol

More information

Great Theoretical Ideas in Computer Science. Lecture 27: Cryptography

Great Theoretical Ideas in Computer Science. Lecture 27: Cryptography 15-251 Great Theoretical Ideas in Computer Science Lecture 27: Cryptography What is cryptography about? Adversary Eavesdropper I will cut his throat I will cut his throat What is cryptography about? loru23n8uladjkfb!#@

More information

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 38 A Tutorial on Network Protocols

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

COMPUTER & NETWORK SECURITY

COMPUTER & NETWORK SECURITY COMPUTER & NETWORK SECURITY Lecture 7: Key Management CRYPTOBULLETIN: IN THE LAST WEEK OpenSSL Patch to Plug Severe Security Holes http://krebsonsecurity.com/2015/03/openssl patch to plug severe security

More information

Key Exchange. References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings

Key Exchange. References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings Key Exchange References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings Outlines Primitives Root Discrete Logarithm Diffie-Hellman ElGamal Shamir s Three Pass

More information

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment. CS355: Cryptography Lecture 17: X509. PGP. Authentication protocols. Key establishment. Public Keys and Trust Public Key:P A Secret key: S A Public Key:P B Secret key: S B How are public keys stored How

More information

Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Misconceptions Concerning Public-Key Encryption Public-key encryption is more secure from

More information

Data Security and Privacy. Topic 14: Authentication and Key Establishment

Data Security and Privacy. Topic 14: Authentication and Key Establishment Data Security and Privacy Topic 14: Authentication and Key Establishment 1 Announcements Mid-term Exam Tuesday March 6, during class 2 Need for Key Establishment Encrypt K (M) C = Encrypt K (M) M = Decrypt

More information

Issues. Separation of. Distributed system security. Security services. Security policies. Security mechanism

Issues. Separation of. Distributed system security. Security services. Security policies. Security mechanism Module 9 - Security Issues Separation of Security policies Precise definition of which entities in the system can take what actions Security mechanism Means of enforcing that policy Distributed system

More information

Information Security CS 526

Information Security CS 526 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication Topic 14: Secure Communication 1 Readings for This Lecture On Wikipedia Needham-Schroeder protocol (only the symmetric

More information

CSC 5930/9010 Modern Cryptography: Public Key Cryptography

CSC 5930/9010 Modern Cryptography: Public Key Cryptography CSC 5930/9010 Modern Cryptography: Public Key Cryptography Professor Henry Carter Fall 2018 Recap Number theory provides useful tools for manipulating integers and primes modulo a large value Abstract

More information

T Cryptography and Data Security

T Cryptography and Data Security T-79.4501 Cryptography and Data Security Lecture 10: 10.1 Random number generation 10.2 Key management - Distribution of symmetric keys - Management of public keys Stallings: Ch 7.4; 7.3; 10.1 1 The Use

More information

Public Key Algorithms

Public Key Algorithms CSE597B: Special Topics in Network and Systems Security Public Key Cryptography Instructor: Sencun Zhu The Pennsylvania State University Public Key Algorithms Public key algorithms RSA: encryption and

More information

Chapter 9: Key Management

Chapter 9: Key Management Chapter 9: Key Management Session and Interchange Keys Key Exchange Cryptographic Key Infrastructure Storing and Revoking Keys Digital Signatures Slide #9-1 Overview Key exchange Session vs. interchange

More information

Hash Functions, Public-Key Encryption CMSC 23200/33250, Autumn 2018, Lecture 6

Hash Functions, Public-Key Encryption CMSC 23200/33250, Autumn 2018, Lecture 6 Hash Functions, Public-Key Encryption CMSC 23200/33250, Autumn 2018, Lecture 6 David Cash University of Chicago Plan 1. A few points about hash functions 2. Introducing Public-Key Encryption 3. Math for

More information

CS 6324: Information Security More Info on Key Establishment: RSA, DH & QKD

CS 6324: Information Security More Info on Key Establishment: RSA, DH & QKD ERIK JONSSON SCHOOL OF ENGINEERING & COMPUTER SCIENCE Cyber Security Research and Education Institute CS 6324: Information Security Dr. Junia Valente Department of Computer Science The University of Texas

More information

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Public Key Cryptography Modular Arithmetic RSA

More information

CSC 474/574 Information Systems Security

CSC 474/574 Information Systems Security CSC 474/574 Information Systems Security Topic 2.5 Public Key Algorithms CSC 474/574 Dr. Peng Ning 1 Public Key Algorithms Public key algorithms covered in this class RSA: encryption and digital signature

More information

Chapter 9. Public Key Cryptography, RSA And Key Management

Chapter 9. Public Key Cryptography, RSA And Key Management Chapter 9 Public Key Cryptography, RSA And Key Management RSA by Rivest, Shamir & Adleman of MIT in 1977 The most widely used public-key cryptosystem is RSA. The difficulty of attacking RSA is based on

More information

Module: Cryptographic Protocols. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security

Module: Cryptographic Protocols. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security CMPSC443 - Introduction to Computer and Network Security Module: Cryptographic Protocols Professor Patrick McDaniel Spring 2009 1 Key Distribution/Agreement Key Distribution is the process where we assign

More information

Key Establishment. Chester Rebeiro IIT Madras. Stinson : Chapter 10

Key Establishment. Chester Rebeiro IIT Madras. Stinson : Chapter 10 Key Establishment Chester Rebeiro IIT Madras CR Stinson : Chapter 10 Multi Party secure communication C D A B E F N parties want to communicate securely with each other (N=6 in this figure) If sends a

More information

Public Key Cryptography and the RSA Cryptosystem

Public Key Cryptography and the RSA Cryptosystem Public Key Cryptography and the RSA Cryptosystem Two people, say Alice and Bob, would like to exchange secret messages; however, Eve is eavesdropping: One technique would be to use an encryption technique

More information

Chapter 9 Public Key Cryptography. WANG YANG

Chapter 9 Public Key Cryptography. WANG YANG Chapter 9 Public Key Cryptography WANG YANG wyang@njnet.edu.cn Content Introduction RSA Diffie-Hellman Key Exchange Introduction Public Key Cryptography plaintext encryption ciphertext decryption plaintext

More information

Online Cryptography Course. Basic key exchange. Trusted 3 rd par7es. Dan Boneh

Online Cryptography Course. Basic key exchange. Trusted 3 rd par7es. Dan Boneh Online Cryptography Course Dan Boneh Basic key exchange Trusted 3 rd par7es Key management Problem: n users. Storing mutual secret keys is difficult Total: O(n) keys per user A befer solu7on Online Trusted

More information

Crypto-systems all around us ATM machines Remote logins using SSH Web browsers (https invokes Secure Socket Layer (SSL))

Crypto-systems all around us ATM machines Remote logins using SSH Web browsers (https invokes Secure Socket Layer (SSL)) Introduction (Mihir Bellare Text/Notes: http://cseweb.ucsd.edu/users/mihir/cse207/) Cryptography provides: Data Privacy Data Integrity and Authenticity Crypto-systems all around us ATM machines Remote

More information

Diffie-Hellman. Part 1 Cryptography 136

Diffie-Hellman. Part 1 Cryptography 136 Diffie-Hellman Part 1 Cryptography 136 Diffie-Hellman Invented by Williamson (GCHQ) and, independently, by D and H (Stanford) A key exchange algorithm o Used to establish a shared symmetric key Not for

More information

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any

More information

Lecture 20: Public-key Encryption & Hybrid Encryption. Public-key Encryption

Lecture 20: Public-key Encryption & Hybrid Encryption. Public-key Encryption Lecture 20: & Hybrid Encryption Lecture 20: & Hybrid Encryption Overview Suppose there is a 2-round Key-Agreement protocol. This means that there exists a protocol where Bob sends the first message m B

More information

Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 1: Overview What is Cryptography? Cryptography is the study of

More information

Lecture 6: Overview of Public-Key Cryptography and RSA

Lecture 6: Overview of Public-Key Cryptography and RSA 1 Lecture 6: Overview of Public-Key Cryptography and RSA Yuan Xue In this lecture, we give an overview to the public-key cryptography, which is also referred to as asymmetric cryptography. We will first

More information

CS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to share so many secrets?!?

CS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to share so many secrets?!? 50fb6be35f4c3105 9d4ed08fb86d8887 b746c452a9c9443b 15b22f450c76218e CS 470 Spring 2018 9df7031cdbff9d10 b700a92855f16328 5b757e66d2131841 62fedd7d9131e42e Mike Lam, Professor Security a.k.a. Why on earth

More information

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages. Telling Secrets Secret Writing Through the Ages William Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 Tuesday 4 February 2014 W. J. Turner Telling Secrets

More information

CS 161 Computer Security

CS 161 Computer Security Popa & Wagner Spring 2016 CS 161 Computer Security Discussion 5 Week of February 19, 2017 Question 1 Diffie Hellman key exchange (15 min) Recall that in a Diffie-Hellman key exchange, there are values

More information

ASYMMETRIC CRYPTOGRAPHY

ASYMMETRIC CRYPTOGRAPHY ASYMMETRIC CRYPTOGRAPHY CONTENT: 1. Number Theory 2. One Way Function 3. Hash Function 4. Digital Signature 5. RSA (Rivest-Shamir Adleman) References: 1. Applied Cryptography, Bruce Schneier 2. Cryptography

More information

L7: Key Distributions. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

L7: Key Distributions. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 L7: Key Distributions Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 9/16/2015 CSCI 451 - Fall 2015 1 Acknowledgement Many slides are from or are

More information

Key Exchange. Secure Software Systems

Key Exchange. Secure Software Systems 1 Key Exchange 2 Challenge Exchanging Keys &!"#h%&'() & & 1 2 6(6 1) 2 15! $ The more parties in communication, the more keys that need to be securely exchanged " # Do we have to use out-of-band methods?

More information

Introduction to Cryptography Lecture 7

Introduction to Cryptography Lecture 7 Introduction to Cryptography Lecture 7 El Gamal Encryption RSA Encryption Benny Pinkas page 1 1 Public key encryption Alice publishes a public key PK Alice. Alice has a secret key SK Alice. Anyone knowing

More information

Defending Computer Networks Lecture 20: More Encryp1on. Stuart Staniford Adjunct Professor of Computer Science

Defending Computer Networks Lecture 20: More Encryp1on. Stuart Staniford Adjunct Professor of Computer Science Defending Computer Networks Lecture 20: More Encryp1on Stuart Staniford Adjunct Professor of Computer Science HW5 out on website Logis;cs Will need at least one correc;on Due Weds Dec 2nd No lectures next

More information

Public Key Cryptography

Public Key Cryptography Public Key Cryptography Giuseppe F. Italiano Universita` di Roma Tor Vergata italiano@disp.uniroma2.it Motivation Until early 70s, cryptography was mostly owned by government and military Symmetric cryptography

More information

Security protocols and their verification. Mark Ryan University of Birmingham

Security protocols and their verification. Mark Ryan University of Birmingham Security protocols and their verification Mark Ryan University of Birmingham Contents 1. Authentication protocols (this lecture) 2. Electronic voting protocols 3. Fair exchange protocols 4. Digital cash

More information

Cryptography: More Primitives

Cryptography: More Primitives Design and Analysis of Algorithms May 8, 2015 Massachusetts Institute of Technology 6.046J/18.410J Profs. Erik Demaine, Srini Devadas and Nancy Lynch Recitation 11 Cryptography: More Primitives 1 Digital

More information

Protocols II. Computer Security Lecture 12. David Aspinall. 17th February School of Informatics University of Edinburgh

Protocols II. Computer Security Lecture 12. David Aspinall. 17th February School of Informatics University of Edinburgh Protocols II Computer Security Lecture 12 David Aspinall School of Informatics University of Edinburgh 17th February 2011 Outline Introduction Shared-key Authentication Asymmetric authentication protocols

More information

Encryption. INST 346, Section 0201 April 3, 2018

Encryption. INST 346, Section 0201 April 3, 2018 Encryption INST 346, Section 0201 April 3, 2018 Goals for Today Symmetric Key Encryption Public Key Encryption Certificate Authorities Secure Sockets Layer Simple encryption scheme substitution cipher:

More information

CS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to talk so much?!? Content taken from the following:

CS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to talk so much?!? Content taken from the following: 50fb6be35f4c3105 9d4ed08fb86d8887 b746c452a9c9443b 15b22f450c76218e CS 470 Spring 2017 9df7031cdbff9d10 b700a92855f16328 5b757e66d2131841 62fedd7d9131e42e Mike Lam, Professor Security a.k.a. Why on earth

More information

CS Computer Networks 1: Authentication

CS Computer Networks 1: Authentication CS 3251- Computer Networks 1: Authentication Professor Patrick Traynor 4/14/11 Lecture 25 Announcements Homework 3 is due next class. Submit via T-Square or in person. Project 3 has been graded. Scores

More information

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell 1 Cryptography Merriam-Webster Online Dictionary: 1. secret writing 2. the enciphering and deciphering

More information

Modular arithme.c and cryptography

Modular arithme.c and cryptography Modular arithme.c and cryptography CSC 1300 Discrete Structures Villanova University Public Key Cryptography (Slides 11-32) by Dr. Lillian Cassel, Villanova University Villanova CSC 1300 - Dr Papalaskari

More information

Overview. Public Key Algorithms I

Overview. Public Key Algorithms I Public Key Algorithms I Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 Durresi@csc.lsu.Edu These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601-04/ Louisiana State

More information

Introduction. Cambridge University Press Mathematics of Public Key Cryptography Steven D. Galbraith Excerpt More information

Introduction. Cambridge University Press Mathematics of Public Key Cryptography Steven D. Galbraith Excerpt More information 1 Introduction Cryptography is an interdisciplinary field of great practical importance. The subfield of public key cryptography has notable applications, such as digital signatures. The security of a

More information

Elements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy

Elements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy Elements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy Homework 3 Due: Monday, 11/28/2016 at 11:55pm PT Solution: Will be posted

More information

Applied Cryptography and Computer Security CSE 664 Spring 2017

Applied Cryptography and Computer Security CSE 664 Spring 2017 Applied Cryptography and Computer Security Lecture 18: Key Distribution and Agreement Department of Computer Science and Engineering University at Buffalo 1 Key Distribution Mechanisms Secret-key encryption

More information

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by

More information

Lecture 1: Course Introduction

Lecture 1: Course Introduction Lecture 1: Course Introduction Thomas Johansson T. Johansson (Lund University) 1 / 37 Chapter 9: Symmetric Key Distribution To understand the problems associated with managing and distributing secret keys.

More information

Session key establishment protocols

Session key establishment protocols our task is to program a computer which gives answers which are subtly and maliciously wrong at the most inconvenient possible moment. -- Ross Anderson and Roger Needham, Programming Satan s computer Session

More information

Web Security 2 https://www.xkcd.com/177/ http://xkcd.com/1323/ Encryption basics Plaintext message key secret Encryp)on Func)on Ciphertext Insecure network Decryp)on Func)on Curses! Foiled again! key Plaintext

More information

CSE 127: Computer Security Cryptography. Kirill Levchenko

CSE 127: Computer Security Cryptography. Kirill Levchenko CSE 127: Computer Security Cryptography Kirill Levchenko October 24, 2017 Motivation Two parties want to communicate securely Secrecy: No one else can read messages Integrity: messages cannot be modified

More information

Session key establishment protocols

Session key establishment protocols our task is to program a computer which gives answers which are subtly and maliciously wrong at the most inconvenient possible moment. -- Ross Anderson and Roger Needham, Programming Satan s computer Session

More information

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 08. Cryptography Part II Paul Krzyzanowski Rutgers University Spring 2018 March 23, 2018 CS 419 2018 Paul Krzyzanowski 1 Block ciphers Block ciphers encrypt a block of plaintext at a

More information

Introduction to Cryptography Lecture 7

Introduction to Cryptography Lecture 7 Introduction to Cryptography Lecture 7 Public-Key Encryption: El-Gamal, RSA Benny Pinkas page 1 1 Public key encryption Alice publishes a public key PK Alice. Alice has a secret key SK Alice. Anyone knowing

More information

Overview. Basic Components. Internet s Design: Insecure. Network security and defini1ons Brief introduc1on to cryptography

Overview. Basic Components. Internet s Design: Insecure. Network security and defini1ons Brief introduc1on to cryptography Overview Network and Communica1on Security Network security and defini1ons Brief introduc1on to cryptography Cryptographic hash func1ons Symmetric- key crypto Public- key crypto IP- Sec DNS- Sec 1! 2!

More information

Other Uses of Cryptography. Cryptography Goals. Basic Problem and Terminology. Other Uses of Cryptography. What Can Go Wrong? Why Do We Need a Key?

Other Uses of Cryptography. Cryptography Goals. Basic Problem and Terminology. Other Uses of Cryptography. What Can Go Wrong? Why Do We Need a Key? ryptography Goals Protect private communication in the public world and are shouting messages over a crowded room no one can understand what they are saying 1 Other Uses of ryptography Authentication should

More information

Cryptographic Protocols 1

Cryptographic Protocols 1 Cryptographic Protocols 1 Luke Anderson luke@lukeanderson.com.au 5 th May 2017 University Of Sydney Overview 1. Crypto-Bulletin 2. Problem with Diffie-Hellman 2.1 Session Hijacking 2.2 Encrypted Key Exchange

More information

RSA Cryptography in the Textbook and in the Field. Gregory Quenell

RSA Cryptography in the Textbook and in the Field. Gregory Quenell RSA Cryptography in the Textbook and in the Field Gregory Quenell 1 In the beginning... 2 In the beginning... Diffie and Hellman 1976: A one-way function can be used to pass secret information over an insecure

More information

Elements of Cryptography and Computer and Networking Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy

Elements of Cryptography and Computer and Networking Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy Elements of Cryptography and Computer and Networking Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy Homework 2 Due: Friday, 10/28/2016 at 11:55pm PT Will be posted on

More information

Public key encryp4on: defini4ons and security

Public key encryp4on: defini4ons and security Online Cryptography Course Dan Boneh Public Key Encryp4on from trapdoor permuta4ons Public key encryp4on: defini4ons and security Public key encryp4on Bob: generates (PK, SK) and gives PK to Alice Alice

More information

HOST Cryptography I ECE 525. Cryptography Handbook of Applied Cryptography &

HOST Cryptography I ECE 525. Cryptography Handbook of Applied Cryptography & Cryptography Handbook of Applied Cryptography & http://cseweb.ucsd.edu/users/mihir/cse207/ Brief History: Proliferation of computers and communication systems in 1960s brought with it a demand to protect

More information

CSC/ECE 774 Advanced Network Security

CSC/ECE 774 Advanced Network Security Computer Science CSC/ECE 774 Advanced Network Security Topic 2. Network Security Primitives CSC/ECE 774 Dr. Peng Ning 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange;

More information

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic.

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic. 15-441 Lecture Nov. 21 st 2006 Dan Wendlandt Worms & Viruses Phishing End-host impersonation Denial-of-Service Route Hijacks Traffic modification Spyware Trojan Horse Password Cracking IP Spoofing DNS

More information

Cryptography III Want to make a billion dollars? Just factor this one number!

Cryptography III Want to make a billion dollars? Just factor this one number! Cryptography III Want to make a billion dollars? Just factor this one number! 3082010a0282010100a3d56cf0bf8418d66f400be31c3f22036ca9f5cf01ef614de2eb9a1cd74a0c344b5a20d5f80df9a23c89 10c354821aa693432a61bd265ca70f309d56535a679d68d7ab89f9d32c47c1182e8a14203c050afd5f1831e5550e8700e008f2

More information