an introduc on to applied cryptography
play

An Introduc+on to Applied Cryptography Chester Rebeiro IIT Madras - PowerPoint PPT Presentation

An Introduc+on to Applied Cryptography Chester Rebeiro IIT Madras CR CR Connected and Stored Everything is connected! Everything is stored! CR CR 2 Increased Security Breaches 81% more in 2015 CR CR


  1. An Introduc+on to Applied Cryptography Chester Rebeiro IIT Madras CR CR

  2. Connected and Stored Everything is connected! Everything is stored! CR CR 2

  3. Increased Security Breaches 81% more in 2015 CR CR h9p://www.pwc.co.uk/assets/pdf/2015-isbs-execuGve- 3 summary-02.pdf

  4. Security Threats (why difficult to prevent?) Networks / CommunicaGon links Hardware System SoPware (OperaGng Systems / Hypervisor) ApplicaGons A9ackers need to target the weakest link in the chain Peripherals CR CR 4

  5. Security Studies (Research) Networks / CommunicaGon links Network Security Hardware Hardware Security System Security System SoPware (OperaGng Systems / Hypervisor) OS Security ApplicaGons Cloud Security Web Security Cryptography DBMS Security Embedded Security Peripherals CR CR 5

  6. Cryptography • A crucial component in all security systems • Fundamental component to achieve – Confiden+ality Allows only authorized users access to data CR CR 6

  7. Cryptography (its use) • A crucial component in all security systems • Fundamental component to achieve – ConfidenGality – Data Integrity Cryptography can be used to ensure that only authorized users can make modificaGons (for instance to a bank account number) CR CR 7

  8. Cryptography (its use) • A crucial component in all security systems • Fundamental component to achieve – ConfidenGality – Data Integrity – Authen+ca+on Cryptography helps prove idenGGes CR CR 8

  9. Cryptography (its use) • A crucial component in all security systems • Fundamental component to achieve – ConfidenGality I did not send that – Data Integrity – AuthenGcaGon – Non-repudia+on The sender of a message cannot claim that she did not send it CR CR 9

  10. Scheme for Confiden+ality untrusted communicaGon link Alice Bob message A9ack at Dawn!! Problem : Alice wants to send a message Mallory to Bob (and only to Bob) through an untrusted communicaGon link CR CR 10

  11. Encryp+on K D K E untrusted communicaGon link Alice Bob E D #%AR3Xf34^$ “ A9ack at Dawn!! ” decrypGon encrypGon (ciphertext) message “ A9ack at Dawn!! ” Secrets • Only Alice knows the encrypGon key K E Mallory • Only Bob knows the decrypGon key K D Only sees ciphertext. cannot get the plaintext message CR CR because she does not know the keys 11

  12. Encryp+on Algorithms K E K D untrusted communicaGon link Alice Bob E D #%AR3Xf34($ “ A9ack at Dawn!! ” decrypGon encrypGon (ciphertext) • Should be easy to compute for Alice / Bob (who know the key ) • Should be difficult to compute for Mallory (who does not know the key ) • What is ‘ difficult ’ ? • Ideal case : Prove that the probability of Mallory determining the encrypGon / decrypGon key is no be&er than a random guess • Computa+onally : Show that it is difficult for Mallory to determine the keys even if she has massive computaGonal power CR CR 12

  13. Ciphers E D • Symmetric Algorithms – EncrypGon and DecrypGon use the same key – i.e. K E = K D – Examples: • Block Ciphers : DES, AES, PRESENT, etc. • Stream Ciphers : A5, Grain, etc. • Asymmetric Algorithms – EncrypGon and DecrypGon keys are different – K E ≠ K D – Examples: • RSA • ECC CR CR 13

  14. Encryp+on Keys K E K D untrusted communicaGon link Alice Bob E D #%AR3Xf34($ “ A9ack at Dawn!! ” decrypGon encrypGon (ciphertext) • How are keys managed – How does Alice & Bob select the keys? – Need algorithms for key exchange CR CR 14

  15. Algorithmic ARacks • Can Mallory use tricks to break the algorithm E • There by reducing the ‘ difficulty ’ of gemng the key. CR CR 15

  16. Cipher Implementa+ons Cryptography is always an overhead !! E • For security, the algorithms need to be computaGon intensive. • OPen require large numbers, complex mathemaGcal operaGons. • Design Challenges: Performance, Size, Power. • Algorithms to achieve this CR CR 16

  17. Implementa+on ARacks (Side Channel Analysis) K E K D untrusted communicaGon link Alice Bob E D “ A9ack at Dawn!! ” #%AR3Xf34($ decrypGon encrypGon (ciphertext) message “ A9ack at Dawn!! ” side channels Side Channels Eg. Power consump+on / radia+on Mallory of device, execu+on +me, etc. Gets informaGon about the keys by monitoring Side channels of the device CR CR 17

  18. Side Channel Analysis 00111 Alice E encrypGon message “ A9ack at Dawn!! ” Radia+on from Device Secret informa+on 0 0 1 1 1 1 CR CR 18

  19. Ciphers Design Challenges Tradeoffs between Security , Speed, Side-Channel ARacks We want crypto algorithms to be fast and small For security, the algorithms are Need to protect against side computaGonally intensive. Typically use large numbers, channel a9acks. complex operaGons CR CR

  20. Cryptography Study • MathemaGcs + Engineering MathemaGcs Electrical Engg. cryptography Physics Computer Sc. CR CR 20

  21. Some Hot Research Trends efficient implementaGons cryptanalysis privacy enhancing security post-quantum cryptography light weight cryptography cloud security Leakage resilient cryptography homomorphic encrypGon side channel analysis CR CR 21

  22. The Plan Ahead • How are ciphers designed? – Ideal security vs ComputaGonal security – Block ciphers / Stream ciphers – Asymmetric Key ciphers – Trade offs between security and implementaGon • ARacks – Algorithmic / ImplementaGon based A9acks • Applica+ons – How are they used to achieve confidenGality, integrity, authenGcaGon, non-repudiaGon • Case Studies – Key Establishments, Digital Signatures, Bitcoins CR CR 22

  23. Course Structure • Classical Cryptography • Shannon ’ s Theory • Block Ciphers – DES, AES, their implementaGons and their a9acks • Stream Ciphers • Digital Signatures and AuthenGcaGon – Hash funcGons • Public key ciphers – RSA, implementaGons, and a9acks – ECC • Side channel analysis • Case Studies : Bitcoins CR CR 23

  24. Expected Learning Outcomes • What you would learn by the end of the course? § DisGnguish between cipher algorithms - Where to use what algorithm? § Evaluate ciphers and their implementaGons for security - MathemaGcal cryptanalysis of some algorithms - Side channel based a9acks on cipher implementaGons § Apply algorithms to solve security problems in real-world systems CR CR 24

  25. Books / References Textbooks (STINSON) ''Cryptography: Theory and Practice", Third Edition, by Douglas R. Stinson, CRC Press, Taylor and Francis Group References (STALLINGS) ''Cryptography and Network Security: Principles and Practices'', Sixth Edition, by William Stallings (HANDBOOK) ''Handbook of Applied Cryptography'', Fifth Printing, by Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, CRC Press CR CR 25

  26. Grading • Quiz 1 : 20% on (18/2/2016) • Quiz 2 : 20% on (25/3/2016) • End semester : 30% on (28/4/2016) • Assignments : 15% • Tutorials : 15% CR CR 26

  27. Course Webpages • For slides / syllabus / schedule etc. h9p://www.cse.iitm.ac.in/~chester/courses/17e_ac/index.html • For discussions / announcements / submissions CSE Moodle Google Groups (aciitm_2017) CR CR 27

  28. Logis+cs • CS36 • Time: – Tuesdays : 11:00 - 11:50 AM – Wednesdays : 10:00 - 10:50 AM – Thursdays : 8:00 - 8:50 AM – Fridays : 4:50 – 5:40 PM CR CR 28

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend