Cryptography* Introduction - Brigham Young University · Introduction! Last Updated: Aug 20, 2013 ....
Transcript of Cryptography* Introduction - Brigham Young University · Introduction! Last Updated: Aug 20, 2013 ....
![Page 1: Cryptography* Introduction - Brigham Young University · Introduction! Last Updated: Aug 20, 2013 . Terminology5 • Access Control ... o Vigenere cipher – polyalphabetic substitution](https://reader030.fdocuments.us/reader030/viewer/2022040621/5d0eba9288c9937f3b8bbe35/html5/thumbnails/1.jpg)
Cryptography Introduction
Last Updated: Aug 20, 2013
![Page 2: Cryptography* Introduction - Brigham Young University · Introduction! Last Updated: Aug 20, 2013 . Terminology5 • Access Control ... o Vigenere cipher – polyalphabetic substitution](https://reader030.fdocuments.us/reader030/viewer/2022040621/5d0eba9288c9937f3b8bbe35/html5/thumbnails/2.jpg)
Terminology • Access Control
o Authentication • Assurance that entities are who they claim to be
o Authorization • Assurance that entities have permission to perform an action
• Confidentiality o Prevent the disclosure of sensitive data to unauthorized entities
• Integrity o Prevent modification of sensitive data by unauthorized entities
• Non-repudiation o The ability to prevent participants from later denying that took part in a
transaction o Usually involves cryptographic evidence that will stand up in court
![Page 3: Cryptography* Introduction - Brigham Young University · Introduction! Last Updated: Aug 20, 2013 . Terminology5 • Access Control ... o Vigenere cipher – polyalphabetic substitution](https://reader030.fdocuments.us/reader030/viewer/2022040621/5d0eba9288c9937f3b8bbe35/html5/thumbnails/3.jpg)
What is Encryption? • Transforming information so that its true meaning is
hidden o Requires “special knowledge” to retrieve
• Modern encryption algorithms use transposition and substitution in complex ways that are hard to reverse
• Examples from history that are easy to break o ROT-13 (aka Caesar Cipher) is easy to break, simple substitution cipher o Vigenere cipher – polyalphabetic substitution cipher
• Examples of strong encryption o AES o 3DES o RC4
![Page 4: Cryptography* Introduction - Brigham Young University · Introduction! Last Updated: Aug 20, 2013 . Terminology5 • Access Control ... o Vigenere cipher – polyalphabetic substitution](https://reader030.fdocuments.us/reader030/viewer/2022040621/5d0eba9288c9937f3b8bbe35/html5/thumbnails/4.jpg)
Cipher
Classical
Substitution Steganography Transposition
Rotor Machines Modern
Public Key Secret Key
Types of Encryption Schemes
Hierarchy & Examples based on: http://en.wikipedia.org/wiki/Cipher
GOOD DOG PLLX XLP PLSX TWF
GOOD DOG DGOGDOO
![Page 5: Cryptography* Introduction - Brigham Young University · Introduction! Last Updated: Aug 20, 2013 . Terminology5 • Access Control ... o Vigenere cipher – polyalphabetic substitution](https://reader030.fdocuments.us/reader030/viewer/2022040621/5d0eba9288c9937f3b8bbe35/html5/thumbnails/5.jpg)
Symmetric Encryption • Also known as
o Conventional encryption o Secret-key encryption o Single-key encryption
![Page 6: Cryptography* Introduction - Brigham Young University · Introduction! Last Updated: Aug 20, 2013 . Terminology5 • Access Control ... o Vigenere cipher – polyalphabetic substitution](https://reader030.fdocuments.us/reader030/viewer/2022040621/5d0eba9288c9937f3b8bbe35/html5/thumbnails/6.jpg)
Encryption Algorithm Decryption Algorithm
Symmetric Encryption Model
Alice Bob
Plaintext
Key Key
Ciphertext Plaintext
![Page 7: Cryptography* Introduction - Brigham Young University · Introduction! Last Updated: Aug 20, 2013 . Terminology5 • Access Control ... o Vigenere cipher – polyalphabetic substitution](https://reader030.fdocuments.us/reader030/viewer/2022040621/5d0eba9288c9937f3b8bbe35/html5/thumbnails/7.jpg)
Requirements • Two requirements for strong symmetric encryption
1. Strong algorithm (cipher) • Attacker is unable to decrypt ciphertext or discover the key even if attacker
has samples of ciphertext/plaintext created using the secret key
2. Sender and receiver must securely obtain and store the secret key
![Page 8: Cryptography* Introduction - Brigham Young University · Introduction! Last Updated: Aug 20, 2013 . Terminology5 • Access Control ... o Vigenere cipher – polyalphabetic substitution](https://reader030.fdocuments.us/reader030/viewer/2022040621/5d0eba9288c9937f3b8bbe35/html5/thumbnails/8.jpg)
Kerckhoffs’ Principle • The security of the symmetric encryption depends on the
secrecy of the key, not the secrecy of the algorithm
Dr. Auguste Kerckhoffs (1835-1903) Dutch linguist and cryptographer
![Page 9: Cryptography* Introduction - Brigham Young University · Introduction! Last Updated: Aug 20, 2013 . Terminology5 • Access Control ... o Vigenere cipher – polyalphabetic substitution](https://reader030.fdocuments.us/reader030/viewer/2022040621/5d0eba9288c9937f3b8bbe35/html5/thumbnails/9.jpg)
Types of Ciphers • Block cipher (3DES, AES)
o Plaintext is broken up into fixed-size blocks o Typical block size (64, 128 bits)
• Stream cipher (RC4) o Process plaintext continuously o Usually one byte at a time
![Page 10: Cryptography* Introduction - Brigham Young University · Introduction! Last Updated: Aug 20, 2013 . Terminology5 • Access Control ... o Vigenere cipher – polyalphabetic substitution](https://reader030.fdocuments.us/reader030/viewer/2022040621/5d0eba9288c9937f3b8bbe35/html5/thumbnails/10.jpg)
• Algorithm o Relying on the secrecy of the algorithm
• Example: Substitution ciphers o Using an algorithm incorrectly
• Example: WEP used RC4 incorrectly
• Key o Too big
• Slow • Storage
o Too small • Vulnerable to compromise
What can go wrong?
![Page 11: Cryptography* Introduction - Brigham Young University · Introduction! Last Updated: Aug 20, 2013 . Terminology5 • Access Control ... o Vigenere cipher – polyalphabetic substitution](https://reader030.fdocuments.us/reader030/viewer/2022040621/5d0eba9288c9937f3b8bbe35/html5/thumbnails/11.jpg)
123 • Cryptography uses REALLY big numbers
o 1 in 261 odds of winning the lotto and being hit by lightning on the same day
o 292 atoms in the average human body o 2128 possible keys in a 128-bit key o 2170 atoms in the planet o 2190 atoms in the sun o 2233 atoms in the galaxy o 2256 possible keys in a 256-bit key
Big Numbers
![Page 12: Cryptography* Introduction - Brigham Young University · Introduction! Last Updated: Aug 20, 2013 . Terminology5 • Access Control ... o Vigenere cipher – polyalphabetic substitution](https://reader030.fdocuments.us/reader030/viewer/2022040621/5d0eba9288c9937f3b8bbe35/html5/thumbnails/12.jpg)
123 • Physics: To set or clear a bit requires no less than kT
o k is the Boltzman constant (1.38*10-16 erg/ºK) o T is the absolute temperature of the system
• Assuming T = 3.2ºK (ambient temperature of universe) o kT = 4.4*10-16 ergs
• Annual energy output of the sun 1.21*1041 ergs o Enough to cycle through a 187-bit counter
• Build a Dyson sphere around the sun and collect all energy for 32 years o Enough energy to cycle through a 192-bit counter.
• Supernova produces in the neighborhood of 1051 ergs o Enough to cycle through a 219-bit counter
Thermodynamic Limitations*
*From Applied Cryptography (Schneier)
![Page 13: Cryptography* Introduction - Brigham Young University · Introduction! Last Updated: Aug 20, 2013 . Terminology5 • Access Control ... o Vigenere cipher – polyalphabetic substitution](https://reader030.fdocuments.us/reader030/viewer/2022040621/5d0eba9288c9937f3b8bbe35/html5/thumbnails/13.jpg)
• One-Time Pad (XOR message with key) • Example*:
o Message: ONETIMEPAD o Key: TBFRGFARFM o Ciphertext: IPKLPSFHGQ
o The key TBFRGFARFM decrypts the message to ONETIMEPAD o The key POYYAEAAZX decrypts the message to SALMONEGGS o The key BXFGBMTMXM decrypts the message to GREENFLUID
Perfect Encryption Scheme?
*From Applied Cryptography (Schneier)
![Page 14: Cryptography* Introduction - Brigham Young University · Introduction! Last Updated: Aug 20, 2013 . Terminology5 • Access Control ... o Vigenere cipher – polyalphabetic substitution](https://reader030.fdocuments.us/reader030/viewer/2022040621/5d0eba9288c9937f3b8bbe35/html5/thumbnails/14.jpg)
Cryptographic Hash Function
Source: http://en.wikipedia.org/wiki/Cryptographic_hash_function
![Page 15: Cryptography* Introduction - Brigham Young University · Introduction! Last Updated: Aug 20, 2013 . Terminology5 • Access Control ... o Vigenere cipher – polyalphabetic substitution](https://reader030.fdocuments.us/reader030/viewer/2022040621/5d0eba9288c9937f3b8bbe35/html5/thumbnails/15.jpg)
Message Authentication Code (MAC)
Source: Network Security Essentials (Stallings)
![Page 16: Cryptography* Introduction - Brigham Young University · Introduction! Last Updated: Aug 20, 2013 . Terminology5 • Access Control ... o Vigenere cipher – polyalphabetic substitution](https://reader030.fdocuments.us/reader030/viewer/2022040621/5d0eba9288c9937f3b8bbe35/html5/thumbnails/16.jpg)
Public Key Cryptography • Terminology
o Public Key o Private Key o Digital Signature
• Confidentiality o You encrypt with a public key, and you decrypt with a private key
• Integrity/Authentication o You sign with a private key, and you verify the signature with the corresponding
public key
• Examples o Diffie-Hellman, o RSA, o Elliptic Curve Cryptography (ECC) o Identity-based Encryption (IBE)
![Page 17: Cryptography* Introduction - Brigham Young University · Introduction! Last Updated: Aug 20, 2013 . Terminology5 • Access Control ... o Vigenere cipher – polyalphabetic substitution](https://reader030.fdocuments.us/reader030/viewer/2022040621/5d0eba9288c9937f3b8bbe35/html5/thumbnails/17.jpg)
Encryption Algorithm Decryption Algorithm
Model for Encryption with Public Key Cryptography
Alice Bob
Plaintext
Bob’s Public Key Bob’s Private Key
Ciphertext Plaintext
![Page 18: Cryptography* Introduction - Brigham Young University · Introduction! Last Updated: Aug 20, 2013 . Terminology5 • Access Control ... o Vigenere cipher – polyalphabetic substitution](https://reader030.fdocuments.us/reader030/viewer/2022040621/5d0eba9288c9937f3b8bbe35/html5/thumbnails/18.jpg)
Signing Algorithm Verification Algorithm
Model for Digital Signature with Public Key Cryptography
Alice Bob
Plaintext
Alice’s Private Key Alice’s Public Key
Ciphertext Plaintext