Shared Secret = Trust

Similar documents
CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Classical Cryptography. Thierry Sans

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

Ref:

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

COMP4109 : Applied Cryptography

CSC 474/574 Information Systems Security

Cryptography Functions

CSE 127: Computer Security Cryptography. Kirill Levchenko

Cryptography Introduction to Computer Security. Chapter 8

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III

Uses of Cryptography

Encryption Providing Perfect Secrecy COPYRIGHT 2001 NON-ELEPHANT ENCRYPTION SYSTEMS INC.

CSCE 813 Internet Security Symmetric Cryptography

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class

Cryptography (Overview)

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain

Cryptography. Andreas Hülsing. 6 September 2016

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY

Introduction to Cryptography. Lecture 1. Benny Pinkas. Administrative Details. Bibliography. In the Library

Introduction to Cryptography. Lecture 1

2.1 Basic Cryptography Concepts

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

Cryptography MIS

Lecture 2. Cryptography: History + Simple Encryption,Methods & Preliminaries. Cryptography can be used at different levels

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

CCNA Security 1.1 Instructional Resource

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Other Topics in Cryptography. Truong Tuan Anh

Public-key Cryptography: Theory and Practice

Introduction to Cryptography

Computational Security, Stream and Block Cipher Functions

Practical Aspects of Modern Cryptography

Chapter 9 Public Key Cryptography. WANG YANG

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Computers and Security

Goals of Modern Cryptography

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography

Public Key Cryptography

Cryptanalysis. Ed Crowley

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Lecture 1: Perfect Security

Security: Cryptography

Worksheet - Reading Guide for Keys and Passwords

Assignment 9 / Cryptography

Cryptography ThreeB. Ed Crowley. Fall 08

Introduction to Symmetric Cryptography

PROTECTING CONVERSATIONS

Foundations of Cryptology

Other Uses of Cryptography. Cryptography Goals. Basic Problem and Terminology. Other Uses of Cryptography. What Can Go Wrong? Why Do We Need a Key?

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

CSC 580 Cryptography and Computer Security

Classical Encryption Techniques. CSS 322 Security and Cryptography

Key Exchange. References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings

Classical Encryption Techniques

Cryptography Introduction

Making and Breaking Ciphers

CIS 4360 Introduction to Computer Security Fall WITH ANSWERS in bold. First Midterm

symmetric cryptography s642 computer security adam everspaugh

Encryption. INST 346, Section 0201 April 3, 2018

Key Establishment and Authentication Protocols EECE 412

Lecture 02: Historical Encryption Schemes. Lecture 02: Historical Encryption Schemes

Lecture 4: Symmetric Key Encryption

Cryptography Part II Introduction to Computer Security. Chapter 8

CS 161 Computer Security

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A. Introduction to Cryptography

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

CPSC 467: Cryptography and Computer Security

More on Cryptography CS 136 Computer Security Peter Reiher January 19, 2017

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Cryptography. some history. modern secret key cryptography. public key cryptography. cryptography in practice

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Nature Sunday Academy Lesson Plan

Security Requirements

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan

CS Computer Networks 1: Authentication

18-642: Cryptography 11/15/ Philip Koopman

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

14. Internet Security (J. Kurose)

Introduction to Cryptography. Ramki Thurimella

CRYPTOGRAPHY & DIGITAL SIGNATURE

Network Security Technology Project

LECTURE 4: Cryptography

Lecture 1 Applied Cryptography (Part 1)

Transcription:

Trust The fabric of life! Holds civilizations together Develops by a natural process Advancement of technology results in faster evolution of societies Weakening the natural bonds of trust From time to time artificial mechanisms need to be introduced eg photo ids Cryptography is a trust building mechanism We are at a point (or about to arrive at a point) where cryptography needs to be part of our day-today lives

Shared Secret = Trust At the crux of cryptography is the assumption that TRUST = SHARED SECRET How do we leverage shared secret to build trust? Components of Trust Secrecy, Authentication, Non-repudiation, Integrity, Identity Cryptographic Primitives Encryption/Decryption, Digital Signatures, Hash (oneway) functions, random sequence generators

Cryptography Encryption and Decryption Plain Text Encryption Cipher Text Cipher Text Decryption Plain Text Two ways Symmetric Cryptography (shared key) Asymmetric Cryptography (two-key / public-key)

An Analogy - Shared Secret as a Key Alice and Bob share a key to a lock Handling messages Put them in a box Secure the box with the lock Alice knows only Bob has a key (and viceversa) Shared key enables trust Modern cryptography uses bits and computer programs (algorithms)

Paper and Pencil Cryptography Read Sections 2.1 through 2.3 of text Evolution of Cryptography First documented use by Julius Caesar Caesar Cipher (Enciphering and Deciphering) MEET YOU TOMORROW (Plain Text) RJJY DTZ YTRTWWTB (Cipher Text) 26 possible keys (0-25, key 5 used in example above) Vignere Cipher (26 x m keys) M E E T Y O U T O M O R R O W D O G D O G D O G D O G D O G (4,15,7), m=3 P S K W M U X H U P C X U C C

More P&P Ciphers Auto-key Vignere Cipher MEET YOU TOMORROW (Plain Text) HIYA (key) Extended key H I Y A M E E T Y O U T O M O Cipher M E E T Y O U T O M O R R O W H I Y A M E E T Y O U T O M O T M C T K S Y M M A I K F A K

Even More Ciphers! A more complex substitution Cipher Each letter substituted by an arbitrary letter Full Vignere. Key generation NETWORKSECURI TY ANDCRYPTOGRAPHYBIZ NETWORKSCU IYA DPGHBZFJ LMQVX ABCD EFGHI J KLMNOPQRSTUVWXYZ 26! (403291461126605635584000000) keys Permutation Ciphers Text length M AND -> (2,3,1) -> NDA M! possible permutations Modern Ciphers Combination of substitution and permutation Repeated application many rounds

Brute-force Attacks on Ciphers A good cipher is only susceptible to brute-force attacks C = E(P,K). How do we get P from C? Without the knowledge of K Try every possible key K P i = D(C,K i ) How do we know when to stop? Under any key there will be a corresponding P i How do we know that a particular P i is the correct plaintext? Does this mean brute force attacks are not possible?

Entropy of Plain Text Think of all possible 100 character strings that make sense For example, say a billion books, each with 1 billion strings that make sense - still makes it only 10 18 possible phrases! How many total strings of length 100? 26 100. That is more than 3 x 10 141! Say we encrypt a meaningful string with a 64 bit key, the ciphertext is decrypted with another key What is the probability that the wrong key results in a string that makes sense? 2 64 * 10 18 /(3*10 141 ) < 6 * 10-105 Which is good news for the attacker...

Vernam Cipher The Ultimate Cipher? What if we make the number of possible keys the same as the number of possible plain text messages? One-time pad Vernam Cipher Cannot try out keys any more! There is always a key which maps cipher text to every possible plain text No way an attacker can eliminate any message all messages are equally likely The attacker learns NOTHING! Perfect Secrecy

Establishing shared secrets Alice and Bob Have no a priori common secrets Can they establish a secret over an open channel? Oscar can listen to all exchanges between Alice and Bob Can Alice and Bob establish a secret not privy to Oscar?

Asymmetric Key Cryptography Encrypt with public key Decrypt with private key Private key is secret, public key is not (could be entered in some on-line public directory) Used for Secrecy and Digital Signatures Plain Text Encryption Cipher Text Plain Text Encryption Signed Text Cipher Text Decryption Plain Text Signed Text Decryption Plain Text

Asymmetric Key Cryptography Alice, Bob and Oscar - have never met before no shared secret Alice announces her public key to Bob (Oscar also listens) Bob chooses a secret randomly and encrypts it with Alice's public key Alice can decrypt Bob's message and determine Bob's chosen secret Oscar cannot (he does not have access to Alice's Private key) Now Alice and Bob have a shared secret! Notion of Public key cryptography is definitely not intuitive!

Illustration of Asymmetric Key Cryptography Simple box with a lock won't work - need a more sophisticated contraption! Message box (locker) with trapdoors Encryption and Digital Signatures Front door opened with public key to drop messages for Alice and collect documents signed by Alice Back door can be opened only by Alice with her private key. Only an analogy. Need trapdoor one-way functions to realize asymmetric cryptography.