Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III

Similar documents
Public-key Cryptography: Theory and Practice

Cryptography (Overview)

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)

Key Exchange. References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Part VI. Public-key cryptography

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Ref:

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Public Key Algorithms

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

CSE 127: Computer Security Cryptography. Kirill Levchenko

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

Chapter 9 Public Key Cryptography. WANG YANG

CSC 474/574 Information Systems Security

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

Issues. Separation of. Distributed system security. Security services. Security policies. Security mechanism

Applied Cryptography Protocol Building Blocks

UNIT - IV Cryptographic Hash Function 31.1

CS 161 Computer Security

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

ASYMMETRIC CRYPTOGRAPHY

Security: Cryptography

2.1 Basic Cryptography Concepts

Key Management. Digital signatures: classical and public key Classic and Public Key exchange. Handwritten Signature

CPSC 467: Cryptography and Computer Security

CS 161 Computer Security

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Verteilte Systeme (Distributed Systems)

Computer Security: Principles and Practice

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Lecture 1 Applied Cryptography (Part 1)

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Certificateless Public Key Cryptography

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain

Secure Multiparty Computation

Applied Cryptography and Computer Security CSE 664 Spring 2018

Lecture 3.4: Public Key Cryptography IV

Cryptographic Concepts

Digital Signatures. Luke Anderson. 7 th April University Of Sydney.

Encryption. INST 346, Section 0201 April 3, 2018

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

1.264 Lecture 28. Cryptography: Asymmetric keys

Cryptography: More Primitives

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

The Network Security Model. What can an adversary do? Who might Bob and Alice be? Computer Networks 12/2/2009. CSC 257/457 - Fall

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic.

Other Uses of Cryptography. Cryptography Goals. Basic Problem and Terminology. Other Uses of Cryptography. What Can Go Wrong? Why Do We Need a Key?

Background. Network Security - Certificates, Keys and Signatures - Digital Signatures. Digital Signatures. Dr. John Keeney 3BA33

Chapter 9: Key Management

Lecture 9: Public-Key Cryptography CS /05/2018

NETWORK SECURITY & CRYPTOGRAPHY

BCA III Network security and Cryptography Examination-2016 Model Paper 1

Lecture 2 Applied Cryptography (Part 2)

Chapter 9. Public Key Cryptography, RSA And Key Management

Cryptography V: Digital Signatures

Overview. Public Key Algorithms I

Cryptography V: Digital Signatures

More on Cryptography CS 136 Computer Security Peter Reiher January 19, 2017

Introduction to Cryptography and Security Mechanisms. Abdul Hameed

RSA (algorithm) History

Cryptography. some history. modern secret key cryptography. public key cryptography. cryptography in practice

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Message authentication. Why message authentication. Authentication primitives. and secure hashing. To prevent against:

CSC 5930/9010 Modern Cryptography: Digital Signatures

Lecture 6: Overview of Public-Key Cryptography and RSA

Other Topics in Cryptography. Truong Tuan Anh

Kurose & Ross, Chapters (5 th ed.)

Introduction. Cambridge University Press Mathematics of Public Key Cryptography Steven D. Galbraith Excerpt More information

Diffie-Hellman. Part 1 Cryptography 136

CSC 5930/9010 Modern Cryptography: Public-Key Infrastructure

CCNA Security 1.1 Instructional Resource

CS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to talk so much?!? Content taken from the following:

CS 161 Computer Security

CSC 474/574 Information Systems Security

Security. Communication security. System Security

Public-Key Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Modern cryptography 2. CSCI 470: Web Science Keith Vertanen

Digital Certificates Demystified

Public Key Algorithms

Public Key Cryptography. Toni Bluher Women and Mathematics Program Lecture 2 May 22, 2018

Key Exchange. Secure Software Systems

ISA 662 Internet Security Protocols. Outline. Prime Numbers (I) Beauty of Mathematics. Division (II) Division (I)

Chapter 3. Principles of Public-Key Cryptosystems

Cryptography MIS

Cryptography and Network Security. Sixth Edition by William Stallings

APNIC elearning: Cryptography Basics

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

Encryption and Forensics/Data Hiding

Unit 8 Review. Secure your network! CS144, Stanford University

Information Security. message M. fingerprint f = H(M) one-way hash. 4/19/2006 Information Security 1

CS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to share so many secrets?!?

CSC 774 Network Security

Security in ECE Systems

Introduction and Overview. Why CSCI 454/554?

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

Transcription:

Cryptography III Public-Key Cryptography Digital Signatures 2/1/18 Cryptography III 1

Public Key Cryptography 2/1/18 Cryptography III 2

Key pair Public key: shared with everyone Secret key: kept secret, hard to derive from the public key plaintext Public Key Cryptography public key encrypt ciphertext Protocol Sender encrypts using recipient's public key Recipient decrypts using its secret key decrypt secret key plaintext Sender Attacker Recipient 2/1/18 Cryptography 3

Intuition Buys padlock Keeps key Sends open padlock to Bob Bob Locks message with s padlock Sends locked message to Opens padlock with key No keys are exchanged can share identical open padlocks with multiple people 2/1/18 4 Cryptography

Properties Advantages A single public-secret key pair allows receiving confidential messages from multiple parties Disadvantages Conceptually complex Slower performance than symmetric cryptography 2/1/18 5 Cryptography

RSA Most widely used public key cryptosystem today Developed by Rivest, Shamir, and Adleman (1978) RSA patent expired in 2000 2048-bit (or longer) keys recommended Much slower than AES Typically used to encrypt an AES symmetric key In 1973, Clifford Cocks and James Ellis developed an equivalent system at GCHQ, declassified in 1997 Image used with permission from Ron Rivest and Len Adleman Image source: The Royal Society Image source: The Telegraph 2/1/18 6 Cryptography

Digital Signatures 2/1/18 Cryptography III 7

Signatures: from Ink to Digital Signature in the real world Contracts Checks Job offers Affidavits Digital signatures are a matter of both computer security and law ESIGN Act (2000) Technological failures can have legal consequences 2/1/18 Cryptography III 8

What is a Digital Signature? message signature algorithm Signature key signature signed message verification algorithm Verification key yes no Bob 2/1/18 Cryptography III 9

Goals for a Digital Signature Authenticity Binds an identity (signer) to a message Provides assurance of the signer Unforgeability An attacker cannot forge a signature for a different identity Nonrepudiation Signer cannot deny having signed the message Integrity An attacker cannot take a signature by for a message and create a signature by for a different message 2/1/18 Cryptography III 10

Digital Signature with Public-Key Encryption In a public-key cryptosystem (e.g., RSA), we can often reverse the order of encryption and decryption E PK (D SK (M)) = M decrypts plaintext message M with the secret key and obtains a digital signature on M sign(m, SK) { return S = D SK (M) } Knowing s public key, PK, can verify the validity of signature S on M Bob encrypts signature S with PK, and Checks if it the result is message M verify(m, S, PK) { return (M == E PK (S) ) } 2/1/18 Cryptography III 11

Digital Signature with Public-Key Encryption signed message (M, S) message M M = yes no decryption algorithm signature S = D SK (M) encryption algorithm E PK (S) s secret key SK s public key PK Bob 2/1/18 Cryptography III 12

Signing Hashes Basic method for public-key digital signatures Signature as long as the message Slow public-key encryption/decryption Alternative Sign a cryptographic hash of the message Fast cryptographic hashing Sign Verify Security S = D SK (h(m)) h(m) == E PK (S) Security of the digital signature Collision resistance of the hash function 2/1/18 Cryptography III 13

Relying on Public Keys The verifier of a signature must be assured that the public key corresponds to the correct party The signer should not be able to deny the association with the public key A trusted party could keep and publish pairs (identity, public key) Government? Private organizations? What if the private key is compromised? Need for key revocation mechanism 2/1/18 Cryptography III 14

Sharing a Symmetric Key wants to send Bob a message M containing a symmetric key for subsequent encrypted communication Requirements Confidentiality of M and subsequent communication Bob understands he is communicating with Message M needs to be encrypted and digitally signed and Bob want to be protected against an active adversary, Eve Eve can eavesdrop and modify messages Eve had previously shared a symmetric key with Eve has M' with signature S' from 2/1/18 Cryptography III 15

Encrypt and Sign Sign and encrypt creates signature S of M creates ciphertext C of M sends (C, S) to Bob Bob decrypts C to M and verifies S on M Attack Eve intercepts (C, S) and replaces S with S and C with C'=E(M') Bob receives (C,S ), decrypts C' to M' and verifies S on Bob sends a message encrypted with the key in M' Eve eavesdrops the message and decrypts it (the key in M' is known to her) 2/1/18 Cryptography III 16

Sign then Encrypt Sign then encrypt creates signature S of M creates encryption C = E((M, S)) sends C to Bob Bob decrypts C to (M, S) and verifies S on M Attack Eve replaces C with E(M', S') Bob decrypts C' to (M', S') and verifies S' on M' Bob sends a message encrypted with the key in M' Eve eavesdrops and decrypts Countermeasure signs (M, PK Bob ) 2/1/18 Cryptography III 17

Encrypt then Sign Encrypt then sign encrypts M to C creates signature S of C sends (C, S) to Bob Bob verifies S on C Bob decrypts C to M Eve Attack Eve replace S with her signature S'' on C and forwards (C, S'') to Bob Bob now thinks he is communicating with Eve Eve can then forward Bob s response (intended for Eve) to Countermeasure signs both M and C Other issue No signature on M exists, hence repudiation opportunity for 2/1/18 Cryptography III 18

Demo Command-Line Crypto with OpenSSL 2/1/18 Cryptography III 19

What We Have Learned Public-key encryption Benefits and how to use it Digital signatures Properties and realization with public-key encryption in reverse Transmitting encrypted and signed messages Pitfalls and remedies Basic crypto in the shell with OpenSSL Encrypt, hash, and sign 2/1/18 Cryptography III 20