Computer Security: Principles and Practice

Similar documents
Cryptographic Concepts

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

Lecture 1 Applied Cryptography (Part 1)

Cryptography MIS

CSE 127: Computer Security Cryptography. Kirill Levchenko

APNIC elearning: Cryptography Basics

Garantía y Seguridad en Sistemas y Redes

Ref:

Encryption. INST 346, Section 0201 April 3, 2018

Encryption I. An Introduction

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

CSC 774 Network Security

Cryptography and Network Security. Sixth Edition by William Stallings

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Cryptography and Network Security Chapter 12. Message Authentication. Message Security Requirements. Public Key Message Encryption

Message Authentication and Hash function

Cipher Suite Configuration Mode Commands

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security 3/23/18

Public Key Cryptography

Cryptographic Systems

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

CSC/ECE 774 Advanced Network Security

Spring 2010: CS419 Computer Security

Security. Communication security. System Security

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Network Security Essentials Chapter 2

KALASALINGAM UNIVERSITY

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

BCA III Network security and Cryptography Examination-2016 Model Paper 1

Public Key Algorithms

1.264 Lecture 28. Cryptography: Asymmetric keys

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

T Cryptography and Data Security

Digests Requirements MAC Hash function Security of Hash and MAC Birthday Attack MD5 SHA RIPEMD Digital Signature Standard Proof of DSS

This chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest

Introduction to Cryptography. Vasil Slavov William Jewell College

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Chapter 3 Public Key Cryptography

PROTECTING CONVERSATIONS

PUBLIC KEY CRYPTO. Anwitaman DATTA SCSE, NTU Singapore CX4024. CRYPTOGRAPHY & NETWORK SECURITY 2018, Anwitaman DATTA

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

S. Erfani, ECE Dept., University of Windsor Network Security

Cryptography and Network Security

Lecture 6: Overview of Public-Key Cryptography and RSA

CS669 Network Security

Practical Aspects of Modern Cryptography

Cryptography (Overview)

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

Symmetric, Asymmetric, and One Way Technologies

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

NIST Cryptographic Toolkit

The most important development from the work on public-key cryptography is the digital signature. Message authentication protects two parties who

2.1 Basic Cryptography Concepts

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some

Public Key Cryptography and RSA

Public-key Cryptography: Theory and Practice

Cryptography Introduction

Public Key Cryptography

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

CS Computer Networks 1: Authentication

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc.

CSCE 715: Network Systems Security

CSC 474/574 Information Systems Security

Lecture 6 - Cryptography

Delineation of Trivial PGP Security

T Cryptography and Data Security

CSC 474/574 Information Systems Security

Overview. SSL Cryptography Overview CHAPTER 1

Information Security CS526

Cryptography and Network Security. Sixth Edition by William Stallings

Message authentication. Why message authentication. Authentication primitives. and secure hashing. To prevent against:

A hash function is strongly collision-free if it is computationally infeasible to find different messages M and M such that H(M) = H(M ).

Cryptography and Network Security

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

Key Exchange. Secure Software Systems

Double-DES, Triple-DES & Modes of Operation

CSC 8560 Computer Networks: Network Security

Lecture 5. Cryptographic Hash Functions. Read: Chapter 5 in KPS

Kurose & Ross, Chapters (5 th ed.)

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Analysis, demands, and properties of pseudorandom number generators

UNIT - IV Cryptographic Hash Function 31.1

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

Some Stuff About Crypto

Computer Security CS 526

Computational Security, Stream and Block Cipher Functions

EEC-484/584 Computer Networks

Cryptography and Network Security Chapter 3. Modern Block Ciphers. Block vs Stream Ciphers. Block Cipher Principles

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

CS 645 : Lecture 6 Hashes, HMAC, and Authentication. Rachel Greenstadt May 16, 2012

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

VPN Overview. VPN Types

Transcription:

Computer Security: Principles and Practice Chapter 2 Cryptographic Tools First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown

Cryptographic Tools cryptographic algorithms important element in security services review various types of elements symmetric encryption public-key (asymmetric) encryption digital signatures and key management secure hash functions example is use to encrypt stored data 2

Symmetric Encryption 3

Attacking Symmetric Encryption cryptanalysis rely on nature of the algorithm plus some knowledge of plaintext characteristics even some sample plaintext-ciphertext pairs exploits characteristics of algorithm to deduce specific plaintext or key brute-force attack try all possible keys on some ciphertext until get an intelligible translation into plaintext 4

Exhaustive Key Search 5

Symmetric Encryption Algorithms 6

DES and Triple-DES Data Encryption Standard (DES) is the most widely used encryption scheme uses 64 bit plaintext block and 56 bit key to produce a 64 bit ciphertext block concerns about algorithm & use of 56-bit key Triple-DES repeats basic DES algorithm three times using either two or three unique keys much more secure but also much slower 7

Advanced Encryption Standard (AES) needed a better replacement for DES NIST called for proposals in 1997 selected Rijndael in Nov 2001 published as FIPS 197 symmetric block cipher uses 128 bit data & 128/192/256 bit keys now widely available commercially 8

Block verses Stream Ciphers 9

Message Authentication protects against active attacks verifies received message is authentic contents unaltered from authentic source timely and in correct sequence can use conventional encryption only sender & receiver have key needed or separate authentication mechanisms append authentication tag to cleartext message 10

Message Authentication Codes 11

Secure Hash Functions 12

Message Auth 13

Hash Function Requirements applied to any size data H produces a fixed-length output. H(x) is relatively easy to compute for any given x one-way property computationally infeasible to find x such that H(x) = h weak collision resistance computationally infeasible to find y x such that H(y) = H(x) strong collision resistance computationally infeasible to find any pair (x, y) such that H(x) = H(y) 14

Hash Functions two attack approaches cryptanalysis exploit logical weakness in alg brute-force attack trial many inputs strength proportional to size of hash code (2 n/2 ) SHA most widely used hash algorithm SHA-1 gives 160-bit hash more recent SHA-256, SHA-384, SHA-512 provide improved size and security 15

Public Key Encryption 16

Public Key Authentication 17

Public Key Requirements 1. computationally easy to create key pairs 2. computationally easy for sender knowing public key to encrypt messages 3. computationally easy for receiver knowing private key to decrypt ciphertext 4. computationally infeasible for opponent to determine private key from public key 5. computationally infeasible for opponent to otherwise recover original message 6. useful if either key can be used for each role 18

Public Key Algorithms RSA (Rivest, Shamir, Adleman) developed in 1977 only widely accepted public-key encryption alg given tech advances need 1024+ bit keys Diffie-Hellman key exchange algorithm only allows exchange of a secret key Digital Signature Standard (DSS) provides only a digital signature function with SHA-1 Elliptic curve cryptography (ECC) new, security like RSA, but with much smaller keys 19

Public Key Certificates 20

Digital Envelopes 21

Random Numbers random numbers have a range of uses requirements: randomness based on statistical tests for uniform distribution and independence unpredictability successive values not related to previous clearly true for truly random numbers but more commonly use generator 22

Pseudorandom verses Random Numbers often use algorithmic technique to create pseudorandom numbers which satisfy statistical randomness tests but likely to be predictable true random number generators use a nondeterministic source e.g. radiation, gas discharge, leaky capacitors increasingly provided on modern processors 23

Practical Application: Encryption of Stored Data common to encrypt transmitted data much less common for stored data which can be copied, backed up, recovered approaches to encrypt stored data: back-end appliance library based tape encryption background laptop/pc data encryption 24

Summary introduced cryptographic algorithms symmetric encryption algorithms for confidentiality message authentication & hash functions public-key encryption digital signatures and key management random numbers 25