Cryptography Introduction

Similar documents
Cryptography Introduction

Cryptography MIS

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

2.1 Basic Cryptography Concepts

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Cryptographic Concepts

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

APNIC elearning: Cryptography Basics

Introduction to Symmetric Cryptography

CSC 580 Cryptography and Computer Security

Computer Security: Principles and Practice

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

(2½ hours) Total Marks: 75

CSC 474/574 Information Systems Security

Security: Cryptography

Cryptography and Network Security

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

CSE 127: Computer Security Cryptography. Kirill Levchenko

Encryption. INST 346, Section 0201 April 3, 2018

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain

KALASALINGAM UNIVERSITY

EEC-484/584 Computer Networks

Lecture 1 Applied Cryptography (Part 1)

Grenzen der Kryptographie

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Classical Cryptography. Thierry Sans

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

CCNA Security 1.1 Instructional Resource

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Some Stuff About Crypto

Introduction to Cryptography. Vasil Slavov William Jewell College

Security. Communication security. System Security

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

CSC 774 Network Security

NETWORK SECURITY & CRYPTOGRAPHY

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

Lecture 6: Symmetric Cryptography. CS 5430 February 21, 2018

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

BCA III Network security and Cryptography Examination-2016 Model Paper 1

EEC-682/782 Computer Networks I

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

Cryptography Introduction to Computer Security. Chapter 8

CIS 4360 Secure Computer Systems Applied Cryptography

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

Security Requirements

Cryptography (Overview)

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

ELECTRONICS DEPARTMENT

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

Study Guide to Mideterm Exam

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

Public Key Cryptography

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Cryptography Functions

Technological foundation

Cryptographic Systems

Introduction Classical Confidentiality Modern Confidentiality Integrity Authentication

18-642: Cryptography 11/15/ Philip Koopman

L2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Cryptography CS 555. Topic 1: Course Overview & What is Cryptography

Symmetric, Asymmetric, and One Way Technologies

Ref:

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY

Computers and Security

PROTECTING CONVERSATIONS

Encryption and Forensics/Data Hiding

CIS 4360 Secure Computer Systems Symmetric Cryptography

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Key Establishment and Authentication Protocols EECE 412

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

Introduction to Cryptography

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Lecture 6: Overview of Public-Key Cryptography and RSA

Garantía y Seguridad en Sistemas y Redes

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Key Exchange. References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings

Making and Breaking Ciphers

Computer Security 3/23/18

SRI VENKATESWARA COLLEGE OF ENGINEERING

Security in ECE Systems

Cryptology Part 1. Terminology. Basic Approaches to Cryptography. Basic Approaches to Cryptography: (1) Transposition (continued)

CPSC 481/681 SPRING 2006 QUIZ #1 7 MAR 2006 NAME:

Cryptography. Andreas Hülsing. 6 September 2016

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Foundations of Cryptology

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan

Network Security Essentials Chapter 2

Department of Computer Science and Engineering. CSE 3482 Introduction to Computer Security. Instructor: N. Vlajic Date: Mar 1, 2017

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

Transcription:

Cryptography Introduction Last Updated: Aug 20, 2013

Terminology Access Control o Authentication Assurance that entities are who they claim to be o Authorization Assurance that entities have permission to perform an action Confidentiality o Prevent the disclosure of sensitive data to unauthorized entities Integrity o Prevent modification of sensitive data by unauthorized entities Non-repudiation o The ability to prevent participants from later denying that took part in a transaction o Usually involves cryptographic evidence that will stand up in court

What is Encryption? Transforming information so that its true meaning is hidden o Requires special knowledge to retrieve Modern encryption algorithms use transposition and substitution in complex ways that are hard to reverse Examples from history that are easy to break o ROT-13 (aka Caesar Cipher) is easy to break, simple substitution cipher o Vigenere cipher polyalphabetic substitution cipher Examples of strong encryption o AES o 3DES o RC4

Types of Encryption Schemes Cipher Classical Rotor Machines Modern Substitution Steganography Transposition Public Key Secret Key GOOD DOG PLLX XLP PLSX TWF GOOD DOG DGOGDOO Hierarchy & Examples based on: http://en.wikipedia.org/wiki/cipher

Symmetric Encryption Also known as o Conventional encryption o Secret-key encryption o Single-key encryption

Symmetric Encryption Model Alice Bob Key Key Plaintext Ciphertext Plaintext Encryption Algorithm Decryption Algorithm

Requirements Two requirements for strong symmetric encryption 1. Strong algorithm (cipher) Attacker is unable to decrypt ciphertext or discover the key even if attacker has samples of ciphertext/plaintext created using the secret key 2. Sender and receiver must securely obtain and store the secret key

Kerckhoffs Principle The security of the symmetric encryption depends on the secrecy of the key, not the secrecy of the algorithm Dr. Auguste Kerckhoffs (1835-1903) Dutch linguist and cryptographer

Types of Ciphers Block cipher (3DES, AES) o Plaintext is broken up into fixed-size blocks o Typical block size (64, 128 bits) Stream cipher (RC4) o Process plaintext continuously o Usually one byte at a time

What can go wrong? Algorithm o Relying on the secrecy of the algorithm Example: Substitution ciphers o Using an algorithm incorrectly Example: WEP used RC4 incorrectly Key o Too big Slow Storage o Too small Vulnerable to compromise

Cryptography uses REALLY big numbers 123 o 1 in 2 61 odds of winning the lotto and being hit by lightning on the same day o 2 92 atoms in the average human body o 2 128 possible keys in a 128-bit key o 2 170 atoms in the planet o 2 190 atoms in the sun o 2 233 atoms in the galaxy Big Numbers o 2 256 possible keys in a 256-bit key

Physics: To set or clear a bit requires no less than kt 123 o k is the Boltzman constant (1.38*10-16 erg/ºk) o T is the absolute temperature of the system Assuming T = 3.2ºK (ambient temperature of universe) o kt = 4.4*10-16 ergs Thermodynamic Limitations* Annual energy output of the sun 1.21*10 41 ergs o Enough to cycle through a 187-bit counter Build a Dyson sphere around the sun and collect all energy for 32 years o Enough energy to cycle through a 192-bit counter. Supernova produces in the neighborhood of 10 51 ergs o Enough to cycle through a 219-bit counter *From Applied Cryptography (Schneier)

Perfect Encryption Scheme? One-Time Pad (XOR message with key) Example*: o Message: ONETIMEPAD o Key: TBFRGFARFM o Ciphertext: IPKLPSFHGQ o The key TBFRGFARFM decrypts the message to ONETIMEPAD o The key POYYAEAAZX decrypts the message to SALMONEGGS o The key BXFGBMTMXM decrypts the message to GREENFLUID *From Applied Cryptography (Schneier)

Cryptographic Hash Function Source: http://en.wikipedia.org/wiki/cryptographic_hash_function

Message Authentication Code (MAC) Source: Network Security Essentials (Stallings)

Public Key Cryptography Terminology o Public Key o Private Key o Digital Signature Confidentiality o You encrypt with a public key, and you decrypt with a private key Integrity/Authentication o You sign with a private key, and you verify the signature with the corresponding public key Examples o Diffie-Hellman, o RSA, o Elliptic Curve Cryptography (ECC) o Identity-based Encryption (IBE)

Model for Encryption with Public Key Cryptography Alice Bob s Public Key Bob Bob s Private Key Plaintext Ciphertext Plaintext Encryption Algorithm Decryption Algorithm

Model for Digital Signature with Public Key Cryptography Alice Alice s Private Key Bob Alice s Public Key Plaintext Ciphertext Plaintext Signing Algorithm Verification Algorithm