Cryptology. An introduction. by Ulf Lindqvist translated and processed by Erland Jonsson

Similar documents
CSCE 813 Internet Security Symmetric Cryptography

EEC-484/584 Computer Networks

Cryptography (Overview)

Introduction to Cryptography. Vasil Slavov William Jewell College

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

Computer Security: Principles and Practice

Cryptography MIS

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

APNIC elearning: Cryptography Basics

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

Lecture 4: Symmetric Key Encryption

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

EEC-682/782 Computer Networks I

Computer Security 3/23/18

Making and Breaking Ciphers

Symmetric Key Encryption. Symmetric Key Encryption. Advanced Encryption Standard ( AES ) DES DES DES 08/01/2015. DES and 3-DES.

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Jaap van Ginkel Security of Systems and Networks

Stream Ciphers and Block Ciphers

CRYPTOGRAPHY. BY, Ayesha Farhin

Public Key Cryptography

Network Security Essentials Chapter 2

Lecture 3: Symmetric Key Encryption

Network Security. Chapter 8. MYcsvtu Notes.

LECTURE 4: Cryptography

Classical Cryptography. Thierry Sans

Introduction to Cryptography and Security Mechanisms. Abdul Hameed

Stream Ciphers and Block Ciphers

Encryption Details COMP620

Cryptography. some history. modern secret key cryptography. public key cryptography. cryptography in practice

Cryptography Introduction to Computer Security. Chapter 8

6 Cryptographic Techniques A Brief Introduction

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Key Exchange. Secure Software Systems

7. Symmetric encryption. symmetric cryptography 1

Computers and Security

Introduction to Symmetric Cryptography

Garantía y Seguridad en Sistemas y Redes

Applied Cryptography and Computer Security CSE 664 Spring 2018

Chapter 30 Cryptography 30.1

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

Lecture IV : Cryptography, Fundamentals

Symmetric Encryption Algorithms

Symmetric, Asymmetric, and One Way Technologies

Goals of Modern Cryptography

BCA III Network security and Cryptography Examination-2016 Model Paper 1

Cryptography Functions

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Introduction to Cryptographic Systems. Asst. Prof. Mihai Chiroiu

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Public Key Algorithms

Network Security Chapter 8

CS 332 Computer Networks Security

Lecture 6: Overview of Public-Key Cryptography and RSA

page 1 Introduction to Cryptography Benny Pinkas Lecture 3 November 18, 2008 Introduction to Cryptography, Benny Pinkas

Network Security Essentials

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard

Computer and Data Security. Lecture 3 Block cipher and DES

Conventional Encryption: Modern Technologies

Introduction to Modern Cryptography. Lecture 2. Symmetric Encryption: Stream & Block Ciphers

COMPLEXITY ACROSS DISCIPLINES

Block Ciphers and Data Encryption Standard. CSS Security and Cryptography

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

Introduction to information Security

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Introduction to Cryptography. In the News: Hacker exposes embassies'

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A. Introduction to Cryptography

Block Cipher Operation. CS 6313 Fall ASU

Symmetric Encryption. Thierry Sans

Cryptography and Network Security

Great Theoretical Ideas in Computer Science. Lecture 27: Cryptography

Computer Security CS 526

Encryption. INST 346, Section 0201 April 3, 2018

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

More on Cryptography CS 136 Computer Security Peter Reiher January 19, 2017

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Cryptography Intro and RSA

Block Ciphers and the Data Encryption Standard (DES) Modified by: Dr. Ramzi Saifan

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Chapter 3 Block Ciphers and the Data Encryption Standard

Introduction to Cryptography. --- Foundations of computer security ---

Block Encryption and DES

2.1 Basic Cryptography Concepts

Overview. Public Key Algorithms I

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Goals for Today. Substitution Permutation Ciphers. Substitution Permutation stages. Encryption Details 8/24/2010

CS6701- CRYPTOGRAPHY AND NETWORK SECURITY UNIT 2 NOTES

Introduction to Cryptography

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Security and Encryption

CSE 127: Computer Security Cryptography. Kirill Levchenko

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

Transcription:

Cryptology An introduction by Ulf Lindqvist translated and processed by Erland Jonsson

Contents Introduction Terminology History Symmetrical systems (secret-key) Asymmetrical systems (public-key) Key management Problems with cryptology The Future

What is Cryptography? Methods for the protection of information and communications BQQ EBJIFDQ JBAABIÅKAB CRR FCKJGER KCBBCJÄLBC DSS GDLKHFS LDCCDKÖMCD ETT HEMLIGT MEDDELANDE (English: a secret message)

Who needs cryptography? Earlier: only diplomats and the military Now: everybody! Reasons: Electronic communication over insecure channels, e.g. the Internet Traditional methods for authentication (signature, voice) does not work for data communications

Terminology (Swedish - English) Kryptologi, kryptoteknik Kryptografi Kryptering Dekryptering Klartext Kryptotext, kryptogram Nyckel Forcering Forcör Forcera Cryptology Cryptography Encryption Decryption Plaintext, Cleartext Ciphertext, cryptogram Key Cryptanalysis Cryptanalyst Break

History The pre-scientific era ca 400 BC Sparta (transposition) ca 50 BC Julius Caesar (substitution) 19th century A Kerckhoff (only the key secret) 1920-ies G S Vernam (K as long as M) 1 1939-45 2nd Word War Scientific era 1949 C E Shannon 1976 W Diffie & M E Hellman 1. One-time pad

History Secret versus open research Cryptology used to be available only for government authorities (military, diplomats) Comprehensive open research started in the mid 70-ies The secret research is probably considerably bigger than open research NSA is believed to be 10-15 years ahead of the open research

Traditional symmetrical model with secret key Sender Cryptanalyst Receiver Cryptanalysis Encryption Decryption Medium over which we send messages Key Secure channel

Symmetrical systems Theoretical versus practical security Theoretical security No problems with key management The cryptanalyst has unlimited resources Practical security Many limitations The cryptanalyst also has limitations The security is a function of the estimated possibilities of the cryptanalyst

Symmetrical systems Cryptanalysis Assumption: the cryptanalyst knows everything about the system except the key. Different types of cryptanalysis attacks: Ciphertext-only The cryptanalyst only has encrypted text Known-plaintext The cryptanalyst has some plaintext-ciphertext pairs Chosen-plaintext/Chosen-ciphertext The cryptanalyst can make tests with selected plaintext and get the corresponding encrypted text

Symmetrical systems Cryptanalysis cont d Theoretical cryptanalysis All possible keys are tested (unlimited time) and the cipher text is decrypted. M M S S Successful cryptanalysis is possible if this leads to exactly one interpretable message. K C

Symmetrical systems Cryptanalysis cont d Ciphertext: DJFKRIOPEPWPEPS Key 1: Key 2: ajfkjrisdfkjsdd jfjreieifkdjdjf PT 1: PT 2: attack at eight no attack today

Diffusion Symmetrical systems Diffusion Confusion Changing one symbol in the plaintext affects many symbols in the ciphertext Changing one symbol in the key affects many symbols in the ciphertext Confusion The ciphertext must depend on the plaintext and the key in a complicated way so that the derivation of statistical relations is hard to do

Symmetrical systems Product ciphers Product ciphers gives good diffusion and confusion S 1 P S 2 P S 3 P is a permutation, possibly the same in every step. S i are general, different, non-linear substitutions.

Symmetrical systems Example of system: DES Data Encryption Standard Encrypts blocks of 64 bits, 56-bit key Developed by IBM and NSA, American standard since 1977 NSAs involvement is discussed Suspicion of back-doors has not been confirmed Rather, NSA seems to have strengthened the algorithm Status: Algorithm is considered very strong, but the key is too short Development: Triple DES (3DES), 112 bits Since 2000: Advanced Encryption Standard (AES)

Symmetrical systems Example of system: AES Advanced Encryption Standard International competition (NIST) Call for candidates (1997) Winners from Belgium (Rijndael) Standard made official 2001 Based on Permutations & Substitutions Not completely symmetric (encryption versus decryption) 128 bit data blocks Supports 128, 192 and 256 bit key length (with 10, 12, 14 rounds, respectively) Has become the standard! 10G Ethernet, ZigBee, SSL, IPSec, WiMAX

Symmetrical systems Key lengths Based on computational complexity Comparison for exhaustive search: Key length Possible keys Time a Time b Asymm. RSA 40 bits 2 40 1.1 10 12 1 week (9 s) 56 bits 2 56 7.2 10 16 1200 yrs 1 week 100 bits 2048 bits 2 100 1.3 10 30 2 10 16 yrs 3 10 11 yrs 3072 bits 128 bits 2 128 3.4 10 38 6 10 24 yrs 9 10 19 yrs (100 million combinations correspond to 27 bits) See Table 2.1 and 21.2

Asymmetrical systems Principle was discovered in 1976 Two keys, one public key, k PUB for encryption and one secret key k PRIV for decryption (thus: public-key-systems) The public key, k PUB, distributed openly to everybody (as a matter of fact: this is the basic idea) Slow encryption, primarily used for signing and distribution of symmetrical keys

Asymmetrical systems Model Sender A Cryptanalyst Receiver B Cryptanalysis Encryption Decryption B s public key No secure channel needed! B s secret key

One-way functions Asymmetrical systems Basic Principles y = f(x) easy to calculate, but finding x for a given y, so that y = f(x), i.e. x = f -1 (y) is very hard (impossible in practice) Example: Multiplication of two 100-character primes is easy, but finding the two primes for a given product is hard Trap-door one-way functions y = f P (x) easy, but x = f P -1 (y) hard to calculate, unless you know the parameter P

Asymmetrical systems Characteristics No secure channel needed Communication between n units, requires 2n keys (cp symmetrical system: about ~n 2 ) Authentication important If a false public key is used, the intruder can read the message The sender is unknown to me (since the public key is available to everybody) Solution: signatures

Asymmetrical systems Signatures In principle the system goes backwards Encryption with k PRIV everybody can decrypt with k PUB Note! No confidentiality! Signing and encryption: Send A: calculates E(k PUB-B, E(k PRIV-A, M)) = C Rec B: calculates D(k PUB-A, D(k PRIV-B, C)) = M

Asymmetrical systems : Signing Receiver B Sender A B s secret key Decryption A s public key Check of signature Signing Encryption B A s secret key B B s public key

Asymmetrical systems Example of system: Diffie-Hellman A way to distribute the key to a symmetrical system without a secure channel One-way function: f(x) = a x (modulo p) Basic principle: A and B choose a number b (not secret) A: Chooses x 1 and calculates y 1 = b x 1 A sends y 1 to B. A calculates y 2 x 1 = b x 1 x 2 B: Chooses x 2 and calculates y 2 = b x 2 B sends y 2 to A. B calculates y 1 x 2 = b x 1 x 2

Asymmetrical systems Example of system: RSA RSA (Rivest, Shamir, Adleman) 1978 Uses a trap-door function that is based on the multiplication of big primes Security depends on the development of 1) Algorithms for factoring 2) Computers with high computational power Most well-known and most commonly-used asymmetrical system

Hybrid systems Example of system: PGP PGP (Pretty Good Privacy) GnuPG Application for encryption and signing of emails Uses RSA and IDEA (originally) Large-scale test of the management of asymmetrical keys (signing, publication etc) Disadvantages: Certain lack of compatibility (different versions) Hard to protect the secret key

PGP Encryption

PGP Decryption

Key Management Protocols Combinations of symmetrical and asymmetrical systems are used for key distribution Hard to design good protocols Key escrow Users are forced to deposit main keys so that authorities (police, customs etc) can interpret secret communications Fiercely debated in the USA, to some extent also within the EU Organisationally questionnable

Problems with cryptography Based on computational complexity, which is theoretically hard. Therefore it is easy to find a bad system that looks good. It is considerably harder to show that it really is bad. Requires profound knowledge to make good designs. Electronic commerce is based on the difficulty to factorize big numbers Non-cryptological issues is the real problem!

Problems with Cryptography Block Cipher Modes In Electronic Codebook (ECB) mode, a message is split into blocks and each is encrypted separately. (from Wikipedia)

The Future The Advanced Encryption Standard (AES) is replacing DES. New methods required to build robust applications The need for commercial IT-services is a driving force, e.g. Internet B2B and B2C applications Political decisions slow down progress(?) Quantum Cryptography