ECE Lecture 2. Basic Concepts of Cryptology. Basic Vocabulary CRYPTOLOGY. Symmetric Key Public Key Protocols

Similar documents
ECE 646 Lecture 1 CRYPTOLOGY

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A. Introduction to Cryptography

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY

Cryptographic Techniques. Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

Introduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption

Lecture IV : Cryptography, Fundamentals

Introduction to Cryptography. In the News: Hacker exposes embassies'

Hardware Acceleration for Cryptographic Functions

Cryptography MIS

Data Encryption Standard

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

Introduction to Cryptography. Vasil Slavov William Jewell College

2.1 Basic Cryptography Concepts

Data Encryption Standard

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Computers and Security

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some

CSC 580 Cryptography and Computer Security

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

Introduction to Modern Cryptography. Lecture 2. Symmetric Encryption: Stream & Block Ciphers

Computer Security: Principles and Practice

Computer Security 3/23/18

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

LECTURE NOTES ON COMPUTER AND DATA SECURITY

APNIC elearning: Cryptography Basics

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

CRYPTOGRAPHY. BY, Ayesha Farhin

Cryptographic Concepts

Cryptography Math/CprE/InfAs 533

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Block Ciphers. Secure Software Systems

Cryptography Introduction to Computer Security. Chapter 8

ECE 297:11 Reconfigurable Architectures for Computer Security

CSCE 813 Internet Security Symmetric Cryptography

GSM Security Overview

PASSWORDS & ENCRYPTION

Network Security Issues and Cryptography

Foundations of Cryptology

Technological foundation

ON THE IMPACT OF GSM ENCRYPTION AND MAN-IN-THE-MIDDLE ATTACKS ON THE SECURITY OF INTEROPERATING GSM/UMTS NETWORKS

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Lecture 1 Applied Cryptography (Part 1)

Making and Breaking Ciphers

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

Symmetric Encryption. Thierry Sans

COMPLEXITY ACROSS DISCIPLINES

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

Cryptography. Intercepting Information Scenario 1. Tuesday, December 9, December 9, Wireless broadcasts information using radio signals

Classical Cryptography. Thierry Sans

Lecture 3: Symmetric Key Encryption

Lecture 4: Symmetric Key Encryption

Introduction to Cryptology ENEE 459E/CMSC 498R. Lecture 1 1/26/2017

EEC-484/584 Computer Networks

Computer Security CS 526

symmetric cryptography s642 computer security adam everspaugh

LECTURE 4: Cryptography

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

1.264 Lecture 28. Cryptography: Asymmetric keys

Introduction to information Security

Uses of Cryptography

page 1 Introduction to Cryptography Benny Pinkas Lecture 3 November 18, 2008 Introduction to Cryptography, Benny Pinkas

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Distributed ID-based Signature Using Tamper-Resistant Module

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

CSE 127: Computer Security Cryptography. Kirill Levchenko

Hardware Design and Software Simulation for Four Classical Cryptosystems

Introduction to Cryptography

CCNA Security 1.1 Instructional Resource

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

Foreword Preface About the Author Aperitifs The Lexicon of Cryptography Cryptographic Systems Cryptanalysis Side Information Thomas Jefferson and the

Cyber Security Applied Cryptography. Dr Chris Willcocks

Cryptography Introduction

Public Key Cryptography

CSC 474/574 Information Systems Security

Test Conditions. Closed book, closed notes, no calculator, no laptop just brains 75 minutes. Steven M. Bellovin October 19,

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Cryptography Introduction

Lecture 2: Shared-Key Cryptography

Cryptography and Network Security Block Ciphers + DES. Lectured by Nguyễn Đức Thái

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

NETWORK SECURITY & CRYPTOGRAPHY

Information Security: Principles and Practice Second Edition. Mark Stamp

Public-key Cryptography: Theory and Practice

Cryptography Functions

Computational Security, Stream and Block Cipher Functions

Survey of Codebreaking Machines. Swathi Guruduth Vivekanand Kamanuri Harshad Patil

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

Textbook: Ahmet Burak Can Hacettepe University. Supplementary books:

Cryptography and Network Security

Transcription:

ECE 646 - Lecture 2 Basic Concepts of Cryptology 1 CRYPTOLOGY CRYPTOGRAPHY CRYPTANALYSIS Symmetric Key Public Key Protocols Block Cipher Stream Cipher from Greek cryptos - hidden, secret logos - word graphos - writing 2 Basic Vocabulary message (plaintext, clear message) encryption (encipherment) ciphertext (cryptogram, encrypted message) decryption (decipherment) message (plaintext, clear message) X Y X Sender Receiver 3 1

Cryptosystem (Cipher) message X m bits j bits cryptographic key K n bits ciphertext Y 4 Definition of a cryptosystem (cipher) enciphering transformation E K (X) message space X family of enciphering transformations key space K key K ciphertext space Y family of deciphering transformations deciphering transformation D K (Y) K K X X D K (E K (X)) = X 5 Substitution Cipher Key = a b c d e f g h i j k l m n o p q r s t u v w x y z f q i s h n c v j t y a u w d r e x l b m z o g k p enciphering deciphering TO BE OR NOT TO BE BD QH DX WDB BD QH TO BE OR NOT TO BE Number of keys = 26! 4 10 26 6 2

Kerckhoff s principle A cryptosystem should be secure even if everything about the system, except the key, is public knowledge A Kerckhoff, 1883 7 Unpublished vs published algorithm? Unpublished algorithm Published algorithm 1 Cryptanalysis must include recovering the algorithm 2 Smaller number of users, smaller motivation to break 3 Unavailable for other countries 1 The only reliable way of assessing cipher security 2 Prevents backdoors hidden by designers 3 Large number of implementations = low cost + high performance 4 No need for anti-reverseengineering protection 5 Software implementations 6 Domestic and international standardization 8 Fundamental Tenet of Cryptography If lots of smart people have failed to solve a problem, then it probably will not be solved anytime soon 9 3

Security of unpublished ciphers Commercial packages cracking unpublished encryption schemes built-in: Time: MS Word, MS Excel, MS Money Word-Perfect, ProWrite, Data Perfect Lotus 1-2-3, Symphony, Quattro-Pro Paradox, Semantec s Q&A PKZip, etc 1-2 minutes for old versions of programs up to several days for new versions of some programs Price: ~ $99 per module (in the past), $595 per toolkit (49 modules) Companies: Access Data Crak Software Passwords recovered even for empty files! 10 Access Data DNA: Distributed Network Attack client-server application DNA client runs in the background, only taking unused processor time performs an exhaustive key search on Office 97 Office 2000, and Adobe Acrobat encrypted documents Expected recovery times (500 MHz, Intel machines, MS Word): Product Maximum Time Expected 5 Client Network 11 days 55 days 10 Client Network 55 days 275 days 25 Client Network 25 days 125 days 50 Client Network 125 days 05 day 100 Client Network 12 hours 6 hours 11 Breaking ciphers used in GSM, 1999 (1) GSM - world's most widely used mobile telephone system 51% market share of all cellular phones, both analog and digital over 215 million subscribers in America, Europe, Asia, Africa, and Australia In the US, GSM employed by T-Mobile, transitioned to by the new AT&T (Cingular), etc Two voice encryption algorithms: A5/1 and A5/2 encrypt voice between the cell phone and the base station 12 4

Breaking ciphers used in GSM (2) Both voice encryption algorithms never published designed and analyzed by the secretive "SAGE" group (part of ETSI European Telecommunications Standard Institute) A5/1 believed to be based on the modified French naval cipher Both algorithms reverse-engineered by "Marc Briceno" with the Smartcard Developer Association published by the Berkeley group A5/1 in May 1999, A5/2 in August 1999 13 Breaking ciphers used in GSM (3) Published attacks A5/2 August 1999, Ian Goldberg and David Wagner, UC Berkeley Number of operations in the attack ~ 2 16 A5/1 May 1999, Jovan Golic Number of operations in the attack ~ 2 40 December 1999, Alex Biryukov and Adi Shamir Less than 1 second on a single PC with 128 MB RAM and two 73 GB hard disks Based on the analysis of the A5/1 output during the first two minutes of the conversation 14 Features required from today s ciphers STRENGTH PERFORMANCE FUNCTIONALITY easy key distribution digital signatures 15 5

SOFTWARE Software or hardware? security of data during transmission HARDWARE speed low cost flexibility (new cryptoalgorithms, protection against new attacks) random key generation access control to keys tamper resistance (viruses, internal attacks) 16 Basic hardware implementations of cryptography VLSI chip (ASIC, FPGA) smart card PCMCIA card cryptographic card stand-alone cryptographic device 17 Cryptographic chips and boards 18 6

Why are cryptographic chips needed? hardware accelerators for web servers SSL (Secure Socket Layer) cryptographic protocol used by majority of today s web servers to protect credit card numbers for on-line transactions such as buying a book on the amazoncom 19 Why are cryptographic chips needed? hardware accelerators for Virtual Private Networks (VPNs) IPSec (Secure Internet Protocol) cryptographic protocol used to support VPNs (Virtual Private Networks), ie, secure communication between remote Local Area Networks (LANs) using Internet IPSec optional in IP ver 4, required in emerging IP ver 6 Acceleration can be provided using: - secure gateways - secure client PCMCIA cards 20 Virtual Private Network Remote user Host Security gateway Internet Security gateway Host Host Cryptographic end points Host local networks may belong to the same or different organizations security gateways may come from different vendors 21 7

Why are cryptographic chips needed? secure storage secure XML supply chain communication secure phones secure PDAs secure satellite communications cipher breaking 23 Evolution of cryptography and cryptanalysis cryptography cryptanalysis 1920 mathematics engineering 1940 rotor machines mathematics statistics engineering statistics 1970 enciphering devices permutation theory cryptographic bombs computers physics 1980 DES RSA number theory integrated circuits physics 1990 software packages ECC 2000 operating systems quantum cryptography number theory special-purpose supercomputers computer machines networks 24 quantum computing 8