Cryptography MIS

Similar documents
Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Cryptography and Network Security

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

APNIC elearning: Cryptography Basics

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security: Principles and Practice

Cryptography=To protect transmitted info from being read and understood by anyone but the recipient.

Computer Security 3/23/18

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Cryptographic Concepts

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

(2½ hours) Total Marks: 75

Symmetric, Asymmetric, and One Way Technologies

Introduction to Cryptography. Vasil Slavov William Jewell College

Cryptography Introduction

BCA III Network security and Cryptography Examination-2016 Model Paper 1

CCNA Security 1.1 Instructional Resource

Public Key Cryptography

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

EEC-484/584 Computer Networks

CSE 127: Computer Security Cryptography. Kirill Levchenko

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

Jaap van Ginkel Security of Systems and Networks

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

Some Stuff About Crypto

EEC-682/782 Computer Networks I

Garantía y Seguridad en Sistemas y Redes

Introduction to Cryptographic Systems. Asst. Prof. Mihai Chiroiu

Classical Cryptography. Thierry Sans

Cryptography and Network Security. Sixth Edition by William Stallings

Symmetric Encryption Algorithms

Network Security Chapter 8

Presented by: Kevin Hieb May 2, 2005

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Introduction to Symmetric Cryptography

CS6701- CRYPTOGRAPHY AND NETWORK SECURITY UNIT 2 NOTES

Cryptography Part II Introduction to Computer Security. Chapter 8

Cryptography and Network Security

Foreword Preface About the Author Aperitifs The Lexicon of Cryptography Cryptographic Systems Cryptanalysis Side Information Thomas Jefferson and the

Cryptography (Overview)

Security. Communication security. System Security

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

CIT 380: Securing Computer Systems. Symmetric Cryptography

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption

CSCE 813 Internet Security Symmetric Cryptography

Making and Breaking Ciphers

CIS 4360 Secure Computer Systems Symmetric Cryptography

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Computer and Data Security. Lecture 3 Block cipher and DES

Conventional Encryption Principles Conventional Encryption Algorithms Cipher Block Modes of Operation Location of Encryption Devices Key Distribution

Cryptography Functions

Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan

Network Security Essentials

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators

Cipher Suite Configuration Mode Commands

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2

Chapter 3 Block Ciphers and the Data Encryption Standard

Introduction to Modern Symmetric-Key Ciphers

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Network Security Essentials Chapter 2

Study Guide to Mideterm Exam

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Cryptography Introduction to Computer Security. Chapter 8

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

ELECTRONICS DEPARTMENT

CRYPTOGRAPHY AND NETWORK SECURITY

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY

Basics of Cryptography

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

PROTECTING CONVERSATIONS

CSC 580 Cryptography and Computer Security

CSCE 715: Network Systems Security

Key Exchange. Secure Software Systems

Lecture 13 Secure Multimedia Coding (I)

Encryption I. An Introduction

CSC 474/574 Information Systems Security

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

Winter 2011 Josh Benaloh Brian LaMacchia

Cryptography and Network Security. Sixth Edition by William Stallings

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some

Ref:

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Encryption. INST 346, Section 0201 April 3, 2018

Lecture 4: Symmetric Key Encryption

Jaap van Ginkel Security of Systems and Networks

Transcription:

Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message wrapped around wooden rod) Rotate ROT13, aka Caesar Cipher Transposition values are scrambled Vulnerable to frequency analysis Plaintext -> Encryption -> Ciphertext -> Decryption -> Plaintext Algorithm (cipher) set of rules how enciphering and deciphering Kerckhoff s Principle Auguste Kerchkhoff Published 1883 Only secrecy in a cryptography system should be the key If too many secrets, there are more vulnerabilities to exploit 1

Strength of Cryptosystem Algorithm Secrecy of the key Length of the key Initialization vectors How components work together Cryptography strength = work factor Estimate of the effort and resources to penetrate cryptosystem One Time Pad Considered unbreakable if implemented properly Gilbert Vernam, 1917 (aka Vernam Cipher) Uses a pad of random values Uses a binary mathematic function (XOR) Requirements: Made up of truly random values Used only once Securely distributed Secured at sites At least as long as the message Spy-Novel Ciphers Running Key set of books Book page, line number, column count Concealment message within a message E.g. every third word 2

Steganography Hiding in plain sight Security through obscurity Three Components: Carrier signal, data stream or file that has hidden information (payload) inside Stegomedium medium in which the information is hidden Payload the information that is to be concealed and transmitted Symmetric Algorithms Block Cipher Confusion Substitution; making the relationship between key and ciphertext complex. Diffusion (Claude Shannon) Transposition Single plaintext bit has influence over several ciphertext bits Avalanche effect (Horst Feistel) slight change = significant ciphertext change Stream Cipher streams of bits Mathematical functions performed on each bit Use keystream generator to produce ciphertext Initialization Vectors Random value used with algorithm Two identical plaintext values encrypted with same key / randomness Cryptographic Transformation Compression Expansion Padding Key mixing Key schedules generate subkeys from master keys 3

Symmetric - DES Data Encryption Standard 64 bit blocks, 64-bit key (56+8), 16 rounds Triple Des (3DES) two or three keys, 48 rounds Symmetric - Advanced Encryption Standard (AES) Five finalists MARS, RC6, Serpent, Twofish, Rijandel Rijandel: 128-bit 10 rounds 192-bit 12 rounds 256-bit 14 rounds Symmetric - International Data Encryption Algorithm (IDEA) 64 bit divided into 16 smaller blocks 8 rounds on each block 128-bit key 4

Other Symmetric: Blowfish 64 bit data blocks, variable key 32-448 bits, 16 rounds RC4 (Rivest, 87) Stream, variable key, aka ArcFour RC5 (Rivest) 32, 64, or 128 block. Key up to 2048 bits RC6 based on RC5; increased speed Asymmetric Diffie-Hellman key agreement RSA Ron Rivest, Adi Shamir, Leonard Adleman(1978) Authentication as well as key encryption Key exchange protocol (encrypts the symmetric key) El Gamal Public key algorithm used for signatures, encryption, key exchange. (slow!) Elliptic Curve Cryptosystems (ECC) Similar to RSA; efficient; used in wireless devices Knapsack e.g. Merkle - Hellman, insecure Message Integrity One-Way Hash Message Authentication Code (MAC) HMAC Hash MAC CBC-MAC Cipher Block Chaining MAC CMAC Cipher-Based MAC Collisions produce same value for two different messages Birthday Paradox 1 in 253 to be same as individual 1 in 23 greater than any two 5

Available Hashing Algorithms MD4 (Rivest) 128-bit; no longer secure MD5 (Rivest) also 128-bit, but more complex than MD4 Secure Hash Algorithm (SHA) 160-bit used with Digital Signature Algorithm SHA-256 SHA-384 SHA-512 Digital Signature Hash value encrypted with sender s private key Digital Signature Standard (1991) NIST standard Federal Government Digital Signature Algorithm (only for signatures, slower than RSA) RSA Elliptic Curve Digital Signature Algorithm (ECDSA) Public Key Infrastructure ISO authentication framework that uses public key cryptography and X.509 Hybrid uses symmetric and asymmetric Public Key Cryptography is one piece of PKI Certificate Authorities trusted third party Registration Authority registration, but not issuance Certificate Revocation List Online Certificate Status Protocol real-time verification 6

Cryptography Attacks Ciphertext-Only attempt to discover key Known-Plaintext (brute force) Chosen Plaintext (can choose which plaintext) Chosen Ciphertext (may need control of the system) Differential Cryptanalysis Linear Cryptanalysis probability of specific key Side Channel Cryptography Attacks Replay Algebraic Analytic Statistical Social Engineering Attacks Meet-in-the-Middle Attacks Next Steps Communications and Network Security 7