1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r...

28
1 Hello World and Welcome to The simple crypt Key=23 _r{{x 7@xe{ s7vys 7@r{t xzr7c x7Cr7 d~zg{ r7ten gc Private-key Cryptography

Transcript of 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r...

Page 1: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

1

Hello World and Welcome to The simple crypt

Key=23

_r{{x7@xe{s7vys7@r{txzr7cx7Cr7d�~zg{r7tengc

Private-key Cryptography

Page 2: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

2

ALICE BOB

Eve

Page 3: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

3

ALICEBOB

Eve

Bob’s Public Key

Bob’s Private Key

Alice’s Public Key

Alice’s Public Key

Bob’s Public Key

Bob’s Public Key

Alice’s Public Key

Alice’s Private Key

Page 4: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

4

Bob’s Public Key

Locked for Bob

Encryption

Page 5: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

5

Locked for Bob

Decryption

Bob’s Private Key

Page 6: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

6Bob’s Public Key

Signed by Alice &Locked for Bob

Encryption

Singed by Alice

Signing

Alice’s Private Key

Singed by Alice

Alice’s Private Key

Page 7: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

7

Signed by Alice&Locked for Bob

Decryption

Bob’s Private Key

Singed by Alice

Alice’s Public Key

Verification

Singed by Alice

Yes/No!

Page 8: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

8

MessageThis is a big secret

MessageI?~jhYUWEKUia

The Internet

MessageThis is a big secret

MessageI?~jhYUWEKUia

Recipient’s private key

Recipient’s PUBLIC key

Page 9: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

9PGP,Version 6.5.1 Manual, NetworkAssociates, 1999.

Page 10: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

10

PGP,Version 6.5.1 Manual, NetworkAssociates, 1999.

Page 11: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

11

Certificate Authorities

• The Certificate Authority (CA) is a trusted third party

• Provides the necessary authentication and security infrastructure

• The CA creates and issues certificates

Page 12: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

12

PGP,Version 6.5.1 Manual, NetworkAssociates, 1999.

Page 13: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

13Sondra Schneider, IFsec, June 11, 1999.

Page 14: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

14

Using the CA to Establish Trust

Customer Merchant

The CA1- Establisha Certificate

2- send signed requestand certificate

3- CheckSignature

4-Merchant can trust customerand may continue with trade

Page 15: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

15Sondra Schneider, IFsec, June 11, 1999.

Page 16: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

16

Sondra Schneider, IFsec, June 11, 1999.

Page 17: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

17

Authentication Protocols

• General-purpose secure messaging protocols include:– SSL– S/MIME

• Secure protocols for electronic commerce include:– EDI/MIME. – SET

Page 18: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

18

SET

Byte, June 1997

Page 19: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

19

June 1997

Page 20: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

20

June 1997

Page 21: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

21

The Use of Smartcards

Byte, June 1997

Page 22: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

22Minimal Key Lengths for Symmetric Ciphers, Matt Blaze and others, 1996.

Page 23: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

23

Avoiding bogus encryption products, Matt Curtin, 1998.

Page 24: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

24

RSAfrom the RSA FAQ

• RSA is a public-key cryptosystem– take two large primes, p and q,– find their product n = pq; (n is called the

modulus)– Choose, e, less than n and relatively prime to (p-

1)(q-1), and find its inverse, d, mod (p-1)(q-1), which means that:

ed = 1 mod (p-1)(q-1);– e and d are called the public and private

exponents, respectively.– The public key is the pair (n,e);– the private key is d.– The factors p and q must be kept secret, or

destroyed.

Page 25: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

25

Two numbers are relatively prime when they share no factors in common other than 1. In other words, if the greatest common divisor of a and n is equal to 1. This is written:

gcd(a,n) = 1

Page 26: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

26

• It is difficult (presumably) to obtain the private key d from the public key (n,e).

• If one could factor n into p and q, however, then one could obtain the private key d.

• Thus the entire security of RSA is predicated on the assumption that factoring is difficult.

Page 27: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

27

RSA encryption:• suppose Alice wants to send a private

message, m, to Bob.• Alice creates the ciphertext

c = m^e mod n,• e and n are Bob's public key.• To decrypt, Bob computes:

m = c^d mod n, • and recovers the original message m; the

relationship between e and d ensures that Bob correctly recovers m. Since only Bob knows d, only Bob can decrypt.

Page 28: 1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.

28

• public-key operations take O(k^2) steps,

• private key operations take O(k^3) steps,

• key generation takes O(k^4) steps

• where k is the number of bits in the modulus