Cryptography
where security engineering meets mathematics. It gives us the tools that underlie most modern security protocols
Encryption
The process of transforming information (plain text) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key: the result of encryption is termed cipher text
Information Security Concerns
Confidentiality, Integrity, Availability, Auditability
Elements of Access Control
Cryptography components: hash function:
generate unique number; easy; non-traceable
•e.g. Hash(m) = mod(m, n), remainder after dividing by n, for n prime Hash(‘hello’) = mod(8 5 12 12 15, 127) = 100
•If message changes, so does the hash. E.g. Hash(‘hallo’) = 92
Cryptography components: Symmetric key algorithms:
Parties have the same key
Symmetric key like (DES, 3DES, AES)
Public key algorithms:
Parties have complementary key values
Public key ciphers (like RSA); digital signatures
Symmetric Key Cryptography
In conventional cryptography, key k is used both for encryption (E) of plain text m and for decryption (D) of cipher text c
Key management
Refers to mechanisms to bind a person to a key. Mechanisms for generation, maintenance and revocation of keys.
Problems:
Key distribution, secrecy, usability, storage (2-factor authentication)
Public key cryptography
Advantages of PK Cryptography
•Communication partners who do not know each other can send secure messages to each other, provided
1.the secret key is really kept secret by its owner
2.the public key is unambiguously linked to its owner.
•This can be established by a chain of trust(compare procedures for collecting a passport)
•Messages can be electronically signed enabling implementation of authentication and non-repudiation
Usage of Public key cryptography
Confidentiality: Only Bob has SKb to decrypt cipher text
•Authentication:(1) Use secure key distribution to uniquely link PKB to Alice. e.g. chain of trust, using certificate authorities (CA). or (2) Use SKA to encrypt (signature) Anyone with PKAcan test. •Integrity:Alice makes a unique ‘hash’ of the message, encrypts the message and sends it all securely along. Bob decrypts and recalculates the hash himself; Bob compares to find differences (SHA-1 algorithm)
Strength of RSA
Usage of Public key cryptography (double key pair)
Same as public key cryptography, however besides PKb encrypted and SKb decrypted;
PKbSKa encrypts, and SKbPKa decrypts
Purpose of a signature
to authenticate a message
Governance of PKI
-PKI (Public Key Infrastructure)
*Weaknesses are often in key management and governance structure
Protocols
Rules for interaction
Evaluation a protocol:
E.g. parking garage lets regular users authenticate and open barriers.
Garage G sends a nonce N; Token T sends return message to garage G, with name T, and T,N encrypted with key KT
G -> T : N
T -> G : T {T,N}KT
Two-factor authentication
Use two factors out of:
SP networks
Substitution - Permutation Networks
Block ciphers: use confusion (adding unknown key values) and diffusion (spreading plaintext information through the cipher text)
S-box: scrambles bits in an entire block, according to a predefined pattern
Advanced Encryption Standard (AES)
NSA has since 2005 approved AES with 128-bit keys for protecting information up to ‘secret’ level and with 192-bit or 256-bit keys for ‘top secret’.
AES is an SP-Network
Feistal cipher (DES)
Has a ladder structure, input is split up into two blocks, left half and a right half
DES continued
3DES
Solution to the problem of DES’ key length: use DES multiple times on message M
Heavily used by banks, still. Most new systems use AES, but banking technology still relies on 8-byte blocks
Overview Algorithms
Symmetric (parties have the same key):
Asymmetric (public-private key) (parties have complementary key values)