Cryptographic Systems

Similar documents
Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security 3/23/18

Computer Security: Principles and Practice

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Encryption. INST 346, Section 0201 April 3, 2018

Cryptographic Concepts

Public Key Algorithms

PROTECTING CONVERSATIONS

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018

APNIC elearning: Cryptography Basics

Ref:

n-bit Output Feedback

Kurose & Ross, Chapters (5 th ed.)

CSC 774 Network Security

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

Public Key Algorithms

Chapter 9. Public Key Cryptography, RSA And Key Management

CSE 127: Computer Security Cryptography. Kirill Levchenko

Key Exchange. Secure Software Systems

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

David Wetherall, with some slides from Radia Perlman s security lectures.

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

The most important development from the work on public-key cryptography is the digital signature. Message authentication protects two parties who

Lecture 2 Applied Cryptography (Part 2)

Key Management and Distribution

Lecture 6 - Cryptography

Cryptography and Network Security Chapter 10. Fourth Edition by William Stallings

CSC/ECE 774 Advanced Network Security

Chapter 9 Public Key Cryptography. WANG YANG

Cryptography and Network Security

Elements of Cryptography and Computer and Networking Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

Lecture 1 Applied Cryptography (Part 1)

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)

PUBLIC KEY CRYPTO. Anwitaman DATTA SCSE, NTU Singapore CX4024. CRYPTOGRAPHY & NETWORK SECURITY 2018, Anwitaman DATTA

UNIT - IV Cryptographic Hash Function 31.1

Unit 8 Review. Secure your network! CS144, Stanford University

CSC 474/574 Information Systems Security

Key Exchange. References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings

Other Topics in Cryptography. Truong Tuan Anh

CS 161 Computer Security

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

CS 161 Computer Security

Public Key Cryptography

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

Abhijith Chandrashekar and Dushyant Maheshwary

SSH PK Authentication and Auto login configuration for Chassis Management Controller

CS 161 Computer Security

Network Security. Chapter 4 Public Key Cryptography. Public Key Cryptography (4) Public Key Cryptography

CS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to talk so much?!? Content taken from the following:

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

CPSC 467: Cryptography and Computer Security

WAP Security. Helsinki University of Technology S Security of Communication Protocols

ISA 662 Internet Security Protocols. Outline. Prime Numbers (I) Beauty of Mathematics. Division (II) Division (I)

Public Key Cryptography

Security: Cryptography

VPN Overview. VPN Types

Introduction and Overview. Why CSCI 454/554?

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Understanding Cryptography by Christof Paar and Jan Pelzl. Chapter 9 Elliptic Curve Cryptography

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

Public Key Algorithms

Symmetric Encryption 2: Integrity

Module: Cryptographic Protocols. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security

Intro to Public Key Cryptography Diffie & Hellman Key Exchange

Diffie-Hellman Key Agreement

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

Lecture 20 Public key Crypto. Stephen Checkoway University of Illinois at Chicago CS 487 Fall 2017 Slides from Miller and Bailey s ECE 422

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Distributed Systems. Fall 2017 Exam 3 Review. Paul Krzyzanowski. Rutgers University. Fall 2017

Spring 2010: CS419 Computer Security

Symmetric, Asymmetric, and One Way Technologies

1.264 Lecture 28. Cryptography: Asymmetric keys

Chapter 3 Public Key Cryptography

Topics. Number Theory Review. Public Key Cryptography

Public-Key Cryptography

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Introduction to Cryptography. Steven M. Bellovin September 27,

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Chapter 7 Public Key Cryptography and Digital Signatures

Study Guide to Mideterm Exam

CS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to share so many secrets?!?

Study Guide for the Final Exam

Elliptic Curve Public Key Cryptography

CS 6324: Information Security More Info on Key Establishment: RSA, DH & QKD

Public-key encipherment concept

UNIT III 3.1DISCRETE LOGARITHMS

Cryptography. Seminar report. Submitted in partial fulfillment of the requirement for the award of degree. Of Computer Science

Introduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption

An IBE Scheme to Exchange Authenticated Secret Keys

Public Key Cryptography and RSA

Introduction to Cryptography. Lecture 6

Transcription:

CPSC 426/526 Cryptographic Systems Ennan Zhai Computer Science Department Yale University

Recall: Lec-10 In lec-10, we learned: - Consistency models - Two-phase commit - Consensus - Paxos

Lecture Roadmap Cryptographic Basics Symmetric-Key Cryptography Public-Key Cryptography Hash Functions Case Study: CryptDB

Cryptography Cryptography may be a component of a secure system Adding cryptography may not make a system secure If a system supports the stronger consistency model, then the weaker Authentication consistency model is automatically supported. But - determine stronger consistency origin of message models sacrifice more availability and fault tolerance. Integrity - verify that message has not been modified Confidentiality - others cannot read contents of the message

Terms Plaintext (cleartext) message M Encryption E(M) Produces Ciphertext, C = E(M) Decryption M = D(C)

Lecture Roadmap Cryptographic Basics Symmetric-Key Cryptography Public-Key Cryptography Hash Functions Case Study: CryptDB

Symmetric-Key Algorithm Known algorithm but we introduce a secret parameter: key Same secret key, K, for encryption & decryption - C = EK(M) and M = DK(C) Examples: AES, 3DES, IDEA, RC5 Key length - DES: 56-bit key: 2 56 = 7.2 x 10 16 keys - AES-256: 256-bit key 2 256 = 1.1 x 10 77 keys

Communicating with symmetric crypto Both parties must agree on a secret key: K Message is encrypted, sent, decrypted at other side Key distribution must be secret - otherwise messages can be decrypted - users can be impersonated

Key Explosion

Key Distribution Secure key distribution is the biggest problem with symmetric cryptography

Diffie-Hellman Key Exchange Protocol was proposed in 1976 Won Turing Award in 2005

Diffie-Hellman Key Exchange Key distribution algorithm - First algorithm to use public/private keys - Not public key encryption - Uses a one-way function: Based on difficulty of computing discrete logarithms in a finite field compared with ease of calculating exponentiation Allows us to negotiate a secret common key without fear of eavesdroppers

Diffie-Hellman Key Exchange Both parties agree on a large prime number p and a number a < p Each party generates a public/private key pair

Diffie-Hellman Key Exchange Both parties agree on a large prime number p and a number a < p Each party generates a public/private key pair One-way function: - Easy to compute in one direction - Difficult to compute in the other

Diffie-Hellman Key Exchange Both parties agree on a large prime number p and a number a < p Each party generates a public/private key pair One-way function: - Easy to compute in one direction - Difficult to compute in the other

Diffie-Hellman Key Exchange

Diffie-Hellman Key Exchange

Diffie-Hellman Key Exchange

Diffie-Hellman Key Exchange K is a common key, known only to Bob and Alice

Lecture Roadmap Cryptographic Basics Symmetric-Key Cryptography Public-Key Cryptography Hash Functions Case Study: CryptDB

Public-Key Cryptography In public-key cryptographic system - Each user generates two keys: private key and public key - Private key is used to keep secret - Public key can be shared with anyone - Algorithm based on the difficulty of factoring large number

Public-Key Cryptography

Public-Key Cryptography Examples - RSA and Elliptic curve algorithms - DSS (digital signature standard) Different keys for encrypting and decrypting - No need to worry about key distribution - Share public keys - Keep private keys secret

Public-Key Cryptography Examples - RSA and Elliptic curve algorithms - DSS (digital signature standard) Different keys for encrypting and decrypting - No need to worry about key distribution The first public-key - Share public keys algorithm - Keep private keys secret

Public-Key Cryptography

Public-Key Cryptography

Hybrid Cryptosystems Session key: randomly-generated key for one communication session Use a public key algorithm to send the session key Use a symmetric algorithm to encrypt data with the session key

Lecture Roadmap Cryptographic Basics Symmetric-Key Cryptography Public-Key Cryptography Hash Functions Case Study: CryptDB

Hash Functions Cryptographic hash function - Input: arbitrary data - Output: fixed-length bit string Many usages - Data lookup (e.g., in Chord) - Data integrity -......

Hash Functions Properties One-way function - Given H=Hash(M), it should be difficult to compute M, given H Collision resistant - Given H=Hash(M), it is difficult to find M, so that H=Hash(M ) - For a hash of length L, a perfect hash would take 2 (L/2) attempts Efficient - Computing a hash function should be computationally efficient

Hash Functions Properties One-way function - Given H=Hash(M), it should be difficult to compute M, given H Collision resistant - Given H=Hash(M), it is difficult to find M, so that H=Hash(M ) - For a hash of length L, a perfect hash would take 2 (L/2) attempts This Efficient property ensures a hash function can be used as fingerprint - Computing a hash function should be computationally efficient

Popular Hash Functions MD4 and MD5 SHA-1, SHA-2, SHA-3 and SHA-256

Lecture Roadmap Cryptographic Basics Symmetric-Key Cryptography Public-Key Cryptography Hash Functions Case Study: CryptDB

Next Lecture In the lec-12, I will cover: - What is differential privacy and why we need it - DJoin - Midterm review