Introduction to Cryptography. Vasil Slavov William Jewell College

Similar documents
Cryptographic Concepts

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Cryptography MIS

Security. Communication security. System Security

APNIC elearning: Cryptography Basics

Encryption. INST 346, Section 0201 April 3, 2018

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Kurose & Ross, Chapters (5 th ed.)

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

Computer Security: Principles and Practice

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

Cryptography and Network Security

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

Chapter 9 Public Key Cryptography. WANG YANG

1.264 Lecture 28. Cryptography: Asymmetric keys

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

KALASALINGAM UNIVERSITY

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

BCA III Network security and Cryptography Examination-2016 Model Paper 1

Chapter 3 Public Key Cryptography

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Key Exchange. Secure Software Systems

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

Cryptography and Network Security. Sixth Edition by William Stallings

Garantía y Seguridad en Sistemas y Redes

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

Cryptography Introduction to Computer Security. Chapter 8

CSC/ECE 774 Advanced Network Security

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

Security: Cryptography

CSC 774 Network Security

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Public Key Cryptography

Network Security Chapter 8

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

2.1 Basic Cryptography Concepts

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

David Wetherall, with some slides from Radia Perlman s security lectures.

Introduction to Symmetric Cryptography

Classical Cryptography. Thierry Sans

LECTURE 4: Cryptography

Channel Coding and Cryptography Part II: Introduction to Cryptography

Making and Breaking Ciphers

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Chapter 9. Public Key Cryptography, RSA And Key Management

Some Stuff About Crypto

Public Key Algorithms

Technological foundation

CSC 474/574 Information Systems Security

Ref:

CSE 127: Computer Security Cryptography. Kirill Levchenko

Computer Security 3/23/18

Applied Cryptography and Computer Security CSE 664 Spring 2018

Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview

CRYPTOGRAPHY & DIGITAL SIGNATURE

Classical Encryption Techniques

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

PROTECTING CONVERSATIONS

Cryptology. An introduction. by Ulf Lindqvist translated and processed by Erland Jonsson

Overview. Public Key Algorithms I

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

ISA 662 Internet Security Protocols. Outline. Prime Numbers (I) Beauty of Mathematics. Division (II) Division (I)

EEC-484/584 Computer Networks

PASSWORDS & ENCRYPTION

T Cryptography and Data Security

Other Uses of Cryptography. Cryptography Goals. Basic Problem and Terminology. Other Uses of Cryptography. What Can Go Wrong? Why Do We Need a Key?

CSC 474/574 Information Systems Security

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

CCNA Security 1.1 Instructional Resource

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain

EEC-682/782 Computer Networks I

Network Security. Chapter 8. MYcsvtu Notes.

Symmetric, Asymmetric, and One Way Technologies

Introduction and Overview. Why CSCI 454/554?

Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Introduction to information Security

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

What did we talk about last time? Public key cryptography A little number theory

14. Internet Security (J. Kurose)

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Modern cryptography 2. CSCI 470: Web Science Keith Vertanen

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Cryptography (Overview)

CS61A Lecture #39: Cryptography

CSC 8560 Computer Networks: Network Security

Great Theoretical Ideas in Computer Science. Lecture 27: Cryptography

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

(2½ hours) Total Marks: 75

Transcription:

Introduction to Cryptography Vasil Slavov William Jewell College

Crypto definitions Cryptography studies how to keep messages secure Cryptanalysis studies how to break ciphertext Cryptology branch of mathematics, the union of the above two

Goals of cryptography Confidentiality hiding the content of messages (only intended recipient understands transmission) Authentication proof of user s identity (assurance for origin of message) Data integrity data received was data sent (assurance for the message not being modified) Nonrepudiation proof of origin of message (ability to hold somebody responsible for sending a message)

Encryption with restricted algorithms Encryption process of desguising a message to hide its substance restricted algorithms "closed source" security by obscurity Identity which must be true D(E(M)) = M plaintext -> ENCRYPTION -> ciphertext -> DECRYPTION -> original plaintext

Encryption with keys Identity which must be true Dk2(Ek1(M)) = M encryption decryption key key V V plaintext -> ENCRYPTION -> ciphertext -> DECRYPTION -> original plaintext A cryptosystem includes algorithm plaintexts ciphertexts keyes

Key-based algorithms Types of key-based algorithms Symmetric (secret-key) stream algorithm/cipher: operate a bit/byte at a time block algorithm/cipher: operate on groups of bits only one key used for both encryption and decryption Assymetric (public-key) encryption key--public decryption key--private Hybrid

Classical cryptography codes (words with special meaning) vs. ciphers substitution ciphers substitute characters transposition ciphers shuffle characters rotor machines (Enigma)

One-time pads invented in 1917 by Major Joseph Mauborgne and AT&T s Gilbert Vernam unbreakable "a large, nonrepeating set of truly random key letters" constant change of keys (every key is unique) same input generates different output sender: message hashed against a pad of random data with _same length_ receiver: message hashed against key doesn t provide authenticity

Computer cryptography "exclusive domain of the world s militaries since World War II" simple XOR symmetric algorithm P XOR K = C C XOR K = P

Common computer crypto algorithms DES (Data Encryption Standard) most popular encryption international standard symmetric slow RSA (creators: Rivest, Shamir, Adleman) most popular public-key used for encryption and digital signatures DSA (Digital Signature Algorithm) public-key used only for digital signatures

Diffie-Hellman crypto challenge: key management introduced by Whitfield Diffie and Martin Hellman in 1976 first to use assymetric keys _method_ to securely exchange keys that encrypt data key encryption key, shared secret (assymetric) -> data encryption key (symmetric) public and private keys, mathematically linked Certificate Authority avoids need to exchange keys user queries CA prevents MIM

Diffie-Hellman (cont.) symmetric challenges exchange/distribution of keys direct key attack assymetric challenges slow for bulk encryption hybrid encrypt data with symmetric system encrypt the symmetric keys with assymetric system

Diffie-Hellman (cont.)

RSA algorithm public-key cryptosystem p and q, large primes n = pq (a.k.a. modulus) e, no common factor with (p - 1)(q - 1) except 1 (ed - 1), divisible by (p - 1)(q - 1) e and d, public and private exponents (n, e) and (n, d), public and private keys encryption: c = m^e mod n decryption: m = c^d mod n security: impossibility of factoring n

Hashes encryption mode transport mode (data portion) tunnel mode (entire packet) checksums, hash functions (message digest) CRC, MD4, MD5, SHA, SHA-1 variable length input -> mathematical transformation -> fixed length output cannot be reversed collisions: same output for different input: 1 in 2^n messages problem: recalculation of hash during transmission improvement: keyed hashes

Steganography hide message inside a message (hide secret s existence) replace LSB of each byte of an image with bits of secret message

Cryptanalitic Attacks crypto algorithm strength depends on bit size value of data must remain less than cost of breaking its protection best algorithms--public algorithms ciphertext-only known-plaintext chosen-plaintext adaptive-chosen-plaintext chosen-ciphertext chosen-key purchase-key

Cryptanalitic Attacks (cont.) breaking an algorithm total break: key found global deduction: alternate algorithm found instance (or local) deduction: find plaintext information deduction: info about key/plaintext found attack complexities data complexity processing complexity storage requirements quantum computing will end public key crypto as we know it symmetric crypto will work (will need longer keys)

Assumptions strong pseudo-random number/bit generator to keep secret session keys secret keys (in sym.) private keys (in assym.) pseudorandom number/bit generator seed message once decrypted

Export Restrictions past: 40-bit US restriction djb 1997 software source code language protected by the First Amendment

key generation: Misc. everyday examples of use of crypto: - PGP - SSH - IPSec - SSL crypto101ol.html: algorithm table, steps at end blowfish: fast, large bit size important public-key exchange algorithms: RSA DSA Fiat-Shamir Diffie-Hellman digital signatures: encrypt w/ private, decrypt with public