Cryptography. and Network Security. Lecture 0. Manoj Prabhakaran. IIT Bombay

Similar documents
Computer Security: Principles and Practice

Randomness Extractors. Secure Communication in Practice. Lecture 17

Secure Multiparty Computation

CSC/ECE 774 Advanced Network Security

CSC 774 Network Security

Cryptography MIS

Introduction to Cryptography. Lecture 6

Lecture 20 Public key Crypto. Stephen Checkoway University of Illinois at Chicago CS 487 Fall 2017 Slides from Miller and Bailey s ECE 422

CSE 127: Computer Security Cryptography. Kirill Levchenko

Study Guide for the Final Exam

Secrets & Lies, Knowledge & Trust. (Modern Cryptography) COS 116 4/20/2006 Instructor: Sanjeev Arora

Cryptographic Systems

Lecture 4: Authentication and Hashing

BCA III Network security and Cryptography Examination-2016 Model Paper 1

Cryptographic Hash Functions

Applied Cryptography and Computer Security CSE 664 Spring 2018

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III

Computer Security CS 526

Intro to Public Key Cryptography Diffie & Hellman Key Exchange

CS408 Cryptography & Internet Security

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Encryption 2. Tom Chothia Computer Security: Lecture 3

Lecture 18 Message Integrity. Stephen Checkoway University of Illinois at Chicago CS 487 Fall 2017 Slides from Miller & Bailey s ECE 422

CSC 5930/9010 Modern Cryptography: Public Key Cryptography

CS573 Data Privacy and Security. Cryptographic Primitives and Secure Multiparty Computation. Li Xiong

Crypto-systems all around us ATM machines Remote logins using SSH Web browsers (https invokes Secure Socket Layer (SSL))

Cryptography CS 555. Topic 16: Key Management and The Need for Public Key Cryptography. CS555 Spring 2012/Topic 16 1

Introduction. Cambridge University Press Mathematics of Public Key Cryptography Steven D. Galbraith Excerpt More information

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Data Integrity. Modified by: Dr. Ramzi Saifan

Unit 8 Review. Secure your network! CS144, Stanford University

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Research Statement. Yehuda Lindell. Dept. of Computer Science Bar-Ilan University, Israel.

Some Stuff About Crypto

Foundations of Cryptography CS Shweta Agrawal

COMP4109 : Applied Cryptography

Paper presentation sign up sheet is up. Please sign up for papers by next class. Lecture summaries and notes now up on course webpage

HOST Cryptography I ECE 525. Cryptography Handbook of Applied Cryptography &

Part VI. Public-key cryptography

Lecture 6 - Cryptography

Cryptographic Primitives A brief introduction. Ragesh Jaiswal CSE, IIT Delhi

symmetric cryptography s642 computer security adam everspaugh

Symmetric Encryption 2: Integrity

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Introduction and Overview. Why CSCI 454/554?

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

Cipher Suite Configuration Mode Commands

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

Concrete cryptographic security in F*

CSC 5930/9010 Modern Cryptography: Cryptographic Hashing

Encryption. INST 346, Section 0201 April 3, 2018

CSC 474/574 Information Systems Security

Garantía y Seguridad en Sistemas y Redes

More crypto and security

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Key Exchange. Secure Software Systems

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018

Winter 2011 Josh Benaloh Brian LaMacchia

n-bit Output Feedback

Cryptographic Concepts

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Cryptography Today. Ali El Kaafarani. Mathematical Institute Oxford University. 1 of 44

CS 161 Computer Security

Introduction to Cryptography. Vasil Slavov William Jewell College

Information Security CS526

Crypto Background & Concepts SGX Software Attestation

Public-Key Cryptography

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

Data Security and Privacy. Topic 14: Authentication and Key Establishment

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic.

Practical Aspects of Modern Cryptography

Ref:

Introduction to Public-Key Cryptography

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Overview of Cryptography

Security. Communication security. System Security

Appendix A: Introduction to cryptographic algorithms and protocols

Cryptography. Lecture 12. Arpita Patra

Cryptography (Overview)

Notes for Lecture 14

Key Protection for Endpoint, Cloud and Data Center

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

David Wetherall, with some slides from Radia Perlman s security lectures.

Hash Function. Guido Bertoni Luca Breveglieri. Fundations of Cryptography - hash function pp. 1 / 18

CS Computer Networks 1: Authentication

Elements of Cryptography and Computer and Networking Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy

CS155. Cryptography Overview

Cryptography and Network Security

S. Erfani, ECE Dept., University of Windsor Network Security

Cryptographic hash functions and MACs

Public Key Algorithms

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

The evolving storage encryption market

Solutions to exam in Cryptography December 17, 2013

Refresher: Applied Cryptography

Module: Cryptographic Protocols. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security

A hash function is strongly collision-free if it is computationally infeasible to find different messages M and M such that H(M) = H(M ).

VPN Overview. VPN Types

Transcription:

Cryptography and Network Security Lecture 0 Manoj Prabhakaran IIT Bombay

Security In this course: Cryptography as used in network security Humans, Societies, The World Network Hardware OS Libraries Programs

Cryptography & Security In this course: Cryptography as used in network security Crypto Network Security

In the News Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that [the adversary] can frequently find ways around it.

What is Cryptography? It s all about controlling access to information A tool for enforcing policies on who can learn and/or influence information Do we know what we are talking about?

What is information? Rudolf Clausius Or rather the lack of it? Uncertainty Ludwig Boltzmann Claude Shannon Measured using Entropy Borrowed from thermodynamics An inherently probabilistic notion

What is information? Information Theory: ways to quantify information Application 1: to study efficiency of communication (compression, error-correction) Application 2: to study the possibility of secret communication The latter turned out to be a relatively easy question! Secret communication possible only if (an equally long) secret key is shared ahead of time Claude Shannon

Access to Information A second look Information at hand may still not be accessible if it is hard to work with it Computation! Shannon s information may reduce uncertainty only for computationally all-powerful parties

Computational Complexity Alan Turing A systematic study of what computationally bounded parties can and cannot do Stephen Cook A young and rich field Much known, much more unknown Much believed Leonid Levin Richard Karp Basis of the Modern Theory of Cryptography

Compressed Secret-Keys Impossible in the information-theoretic sense: a truly random string cannot be compressed But possible against computationally bounded players: use pseudo-random strings! Pseudo-random number generator a.k.a Stream Cipher Manuel Blum Andy Yao Generate a long string of random-looking bits from a short random seed

The Public-Key Revolution Non-Secret Encryption No a priori shared secrets James Ellis Malcolm Williamson Clifford Cocks Instead, a public key. Anyone can create encryptions, only the creator of the key can decrypt! Publicly verifiable digital signatures Merkle, Hellman, Diffie Forms the backbone of today s secure communication Shamir, Rivest, Adleman

Crypto-Mania Public-Key cryptography and beyond! Secret computation: collaboration among mutually distrusting parties Compute on distributed data, without revealing their private information to each other Compute on encrypted data And other fancy things... with sophisticated control over more complex access to information Do it all faster, better, more conveniently and more securely (or find out if one cannot). And also make sure we know what we are trying to do.

Turing Awards For theoretical cryptographers: (Merkle) Hellman & Diffie Turing Award 15 Goldwasser & Micali Turing Award 12 Manuel Blum Turing Award 95 Andrew Yao Turing Award 00 Shamir, Rivest & Adleman Turing Award 02

SSL, TSL Stream ciphers, Block ciphers Identity-Based Encryption e-cash, e-voting, Fair Exchange, Privacy Preserving Datamining,... Secure Multi-Party Computation ZK proofs Universal composition Hybrid encryption Obfuscation, Leakage resilient crypto, Imperfect randomness,... Pseudorandomness generators, PRF,... one-way functions, collision-resistant hash functions,... Secret sharing, Verifiable Secret sharing Blind signatures, Mix-nets, DC-nets,... PK Encryption, Signatures Semantic security, nonmalleability, existential unforgeability... Encryption, Authentication DES, AES, SHA, HMAC Concrete cryptanalysis (Birthday attacks, differential cryptanalysis,...) Random Oracle Model, Generic group model Signcryption Algorithms, Reductions Formal methods RSA, elliptic curve groups, lattices,... Malware, DDoS, Side-channels Independence, Indistinguishability, Infeasibility, Zero-Knowledge,...

In This Course (Petting the Elephant) Fundamental notions: secrecy, infeasibility Secure communication Shared-Key Public-Key Encryption SKE PKE Authentication MAC Signature Mathematical content: Some Probability A little bit of Groups and Number Theory Definitions and proofs

Also a Glimpse of Security Security involves many (f)actors other than crypto Crypto is a tool that when correctly used can help us greatly enhance (and understand) security

Network Security How to use cryptography to achieve security goals in a real-life scenario? Several new issues: More complex (often informal/ill-specified) security goals Complexity due to support for extra efficiency/backward compatibility/new features Buggy implementations (software & hardware) Gap between abstract and real-life models: side-channels Human factors, trust, identity, current and legacy technology,

Bigger Picture Number Theory, Algebra Information Theory Cryptography Network Security Formal Methods Complexity Theory Cryptography is just one of the tools used in information security Information Security Cryptography studies several problems which may Combinatorics, not be of immediate use in information security, but is important Graph in theory building its own foundations/in establishing links with other areas Many powerful cryptographic tools remain un(der)utilised in practice!

Course Logistics Lectures Attendance counts! [ 3-4 pop quizzes! 5% ] Grading: Two Quizzes (60%) One during the mid-semester exam week 3 HW assignments (15%) Course project (20%) Theory course: no programming requirement, but course project could be a programming project

Course Logistics Office hours when assignments are out schedule TBA Online forum: piazza.com/iitb.ac.in/spring2018/cs406 Course webpage: see cse.iitb.ac.in/~mp/teach/

Puzzle #1 Alice and Bob hold secret numbers x and y in {0,..,n} resp. Carol wants to learn x+y. Alice and Bob are OK with that. But they don t want Carol/each other to learn anything else! i.e., Alice should learn nothing about y, nor Bob about x. Carol shouldn t learn anything else about x,y other than x+y Can they do it, just by talking to each other (using private channels between every pair of parties)?

Puzzle #2 Alice and Bob hold secret bits x and y Carol wants to learn x y. Alice and Bob are OK with that. But they don t want Carol/each other to learn anything else! i.e., Alice should learn nothing about y, nor Bob about x. Carol shouldn t learn anything else about x,y other than x y Can they do it, just by talking to each other (using private channels between every pair of parties)?