Lecture 5 - Cryptography

2y ago
19 Views
3 Downloads
1.39 MB
20 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Gideon Hoey
Transcription

Lecture 5 - CryptographyCSE497b - Spring 2007Introduction Computer and Network SecurityProfessor Jaegerwww.cse.psu.edu/ tjaeger/cse497b-s07/CSE497b Introduction to Computer and Network Security - Spring 2007 - Professors Jaeger

A historical moment .The enigma machine was usedto secure communication ofgerman military throughout thesecond world war . and it changed the course ofhuman history.CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor JaegerPage2

Intuition Cryptography is the art (and sometimes science) ofsecret writing– Less well know is that it is also used to guarantee otherproperties, e.g., authenticity of data– This is an enormously deep and important field– However, much of our trust in these systems is based onfaith (particularly in efficient secret key algorithms) Cryptographers create ciphers - Cryptography Cryptanalyst break ciphers - CryptanalysisThe history of cryptography is an arms race betweencryptographers and cryptanalysts.CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor JaegerPage

CryptosystemA cryptosystem is a 5-tuple consisting of(E, D, M, K,C)Where,E is an encryption algorithmD is an decryption algorithmM is the set of plaintextsK is the set of keysC is the set of ciphertextsE : M K CCSE497b Introduction to Computer and Network Security - Spring 2007 - Professor JaegerD :C K MPage4

What is a key? A key is an input to a cryptographic algorithm used toobtain confidentiality, integrity, authenticity or otherproperty over some data.– The security of the cryptosystem often depends on keepingthe key secret to some set of parties.– The keyspace is the set of all possible keys– Entropy is a measure of the variance in keys typically measured in bits Keys are often stored in some secure place:– passwords, on disk keyrings, .– TPM, secure co-processor, smartcards, . . and sometimes not, e.g., certificatesCSE497b Introduction to Computer and Network Security - Spring 2007 - Professor JaegerPage5

Transposition Ciphers Scrambles the symbols to produce output The key is the permutation of symbolsBULBULEECSE497b Introduction to Computer and Network Security - Spring 2007 - Professor JaegerPage

Substitution Ciphers Substitutes one symbol for another (codebook) The key is the permutationBB/AALL/NNUU/ZZEE/OOCSE497b Introduction to Computer and Network Security - Spring 2007 - Professor JaegerPage

Encryption algorithm Algorithm used to make content unreadable by all butthe intended receiversE(key,plaintext) ciphertextD(key,ciphertext) plaintext Algorithm is public, key is private Block vs. Stream Ciphers– Block: input is fixed blocks of same length– Stream: stream of inputCSE497b Introduction to Computer and Network Security - Spring 2007 - Professor JaegerPage

Example: Caesar Cipher Substitution cipher Every character is replaced with the character threeslots to the rightA B C D E F G H I J K L MN O P Q R S T U VWX Y ZD E F G H I J K L MN O P Q R S T U VWX Y Z A B C Q: What is the key?S E C U R I T Y A N D P R I V A C YV H F X U L W B D Q G S U L Y D F BCSE497b Introduction to Computer and Network Security - Spring 2007 - Professor JaegerPage

Cyptanalyze this .“ AVGGNALYVBAF”CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor JaegerPage

Cryptanalysis of ROTx Ciphers Goal: to find plaintext of encoded message Given: ciphertext How: simply try all possible keys– Known as a brute force attack1 T F D2 U G E3 W H FS E CVWXUSTURJKLIUVWTZABYBCDACSE497b Introduction to Computer and Network Security - Spring 2007 - Professor JaegerMNQNEFGDQRSPSTURJHLIWXYVBCDADEFCZABYPage

Shared key cryptography Traditional use of cryptography Symmetric keys, where A single key (k) is used isused for E and DD( k, E( k, p ) ) p All (intended) receivers have access to key Note: Management of keys determines who hasaccess to encrypted data– E.g., password encrypted email Also known as symmetric key cryptographyCSE497b Introduction to Computer and Network Security - Spring 2007 - Professor JaegerPage

The one-time pad (OTP) Assume you have a secret bit string s of length nknown only to two parties, Alice and Bob– Alice sends a message m of length of n to bob– Alice uses the following encryption function to generateciphertext cforall i 1 to n : ci mi si– E.g., XOR the data with the secret bit string– An adversary Mallory cannot retrieve any part of the data Simple version of the proof of security:– Assume for simplicity that value of each bit in m is equallylikely, then you have no information to work with.CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor JaegerPage

Data Encryption Standard (DES) Introduced by the US NBS(now NIST) in 1972 Signaled the beginning ofthe modern area ofcryptography Block cipher– Fixed sized input 8-byte input and a 8-bytekey (56-bits 8 parity bits)CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor JaegerPage

DES Round Initial round permutes input, then 16 rounds Each round key (ki) is 48 bits of input key Function f is a substitution table (s-boxes)liki fli 1CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaegerriri 1Page

Cryptanalysis of DES DES has an effective 56-bit key length– Wiener: 1,000,000 - 3.5 hours (never built)– July 17, 1998, the EFF DES Cracker, which was built forless than 250,000 3 days– January 19, 1999, Distributed.Net (w/EFF), 22 hours and15 minutes (over nearly 100,000 machines)– We all assume that NSA and agencies like it around theworld can crack (recover key) DES in milliseconds What now? Give up on DES?CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor JaegerPage

Variants of DESDESX (two additional keys 118-bits)Triple DES (three DES keys 112-bits)Keys k1, k2, k3c E( k3, D( k2, E( k1, p)))pk1k2k3EDECSE497b Introduction to Computer and Network Security - Spring 2007 - Professor JaegercPage

Advanced Encryption Standard (AES) Result of international NIST bakeoff betweencryptographers– Intended as replacement for DES– Rijndael (pronounced “Rhine-dall”)– Currently implemented in many devices and software, butnot yet fully embraced– Cryptography community is actively vetting the the theoryand implementations (stay tuned)CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor JaegerPage

Hardness Functions––––Plaintext PCiphertext CEncryption key keDecryption key kdD(kd, E(ke, P)) P Computing C from P is hard, computing C from Pwith ke is easy Computing P from C is hard, computing P from Cwith kd is easyCSE497b Introduction to Computer and Network Security - Spring 2007 - Professor JaegerPage

Key size and algorithm strength Key size is an oft-cited measure of the strength of analgorithm, but is strength strongly correlated (orperfectly correlated with key length)?– Say we have two algorithms, A and B with key sizes of 128and 160 bits (the common measure)– Is A less secure than B?– What if A B (for variable key-length algorithms)?CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor JaegerPage

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page Intuition Cryptography is the art (and sometimes science) of secret writing – Less well know is that it is also used to g

Related Documents:

Introduction of Chemical Reaction Engineering Introduction about Chemical Engineering 0:31:15 0:31:09. Lecture 14 Lecture 15 Lecture 16 Lecture 17 Lecture 18 Lecture 19 Lecture 20 Lecture 21 Lecture 22 Lecture 23 Lecture 24 Lecture 25 Lecture 26 Lecture 27 Lecture 28 Lecture

of public-key cryptography; providing hands-on experience with some of the most common encryption algorithms that are used on the internet today. Modern Cryptography Introduction Outline 1 Introduction 2 Historical Cryptography Caesar Cipher 3 Public{Key Cryptography

Cryptography with DNA binary strands and so on. In terms of DNA algorithms, there are such results as A DNA-based, bimolecular cryptography design, Public-key system using DNA as a one-way function for key distribution, DNASC cryptography system and so on. However, DNA cryptography is an

Cryptography and Java Java provides cryptographic functionality using two APIs: JCA - Java Cryptography Architecture - security framework integrated with the core Java API JCE - Java Cryptography Extension - Extensions for strong encryption (exported after 2000 US export policy)

Lecture 1: A Beginner's Guide Lecture 2: Introduction to Programming Lecture 3: Introduction to C, structure of C programming Lecture 4: Elements of C Lecture 5: Variables, Statements, Expressions Lecture 6: Input-Output in C Lecture 7: Formatted Input-Output Lecture 8: Operators Lecture 9: Operators continued

sensitive information. Even though both cryptography and steganography has its own advantages and disadvantages, we can combine both the techniques together. This paper presents a comparative study of both cryptography and steganography. KEYWORDS: Cryptography, Steganography, Encryptio

integrating together cryptography and Steganography through image processing. In particular, we present a system able to perform Steganography and cryptography at the same time. In this paper, both Cryptography and Steganography methods are used for data security over the network. IRIS i

Cryptography in Java The Java Cryptography Architecture (JCA) is a set of APIs to implement concepts of modern cryptography such as digital signatures, message digests, certificates, encryption, key generation and management, and secure random number generation, etc. Using JCA, developers c