Computer Security DD2395
http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasakh10/
Fall 2010 Sonja Buchegger buc@kth.se Lecture 2, Oct. 27, 2010 Cryptography
- Oct. 27, 2010
1 KTH DD2395 Sonja Buchegger
Computer Security DD2395 - - PowerPoint PPT Presentation
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasakh10/ Fall 2010 Sonja Buchegger buc@kth.se Lecture 2, Oct. 27, 2010 Cryptography Oct. 27, 2010 KTH DD2395 Sonja Buchegger 1 Questionnaire Results Prior
1 KTH DD2395 Sonja Buchegger
KTH DD2395 Sonja Buchegger 2
Prior security
Expectations:
Some questions:
KTH DD2395 Sonja Buchegger 3
cryptographic algorithms important element in
review various types of elements
example is use to encrypt stored data
KTH DD2395 Sonja Buchegger 4
KTH DD2395 Sonja Buchegger 5
cryptanalysis
brute-force attack
KTH DD2395 Sonja Buchegger 6
KTH DD2395 Sonja Buchegger 7
KTH DD2395 Sonja Buchegger 8
Data Encryption Standard (DES) is the most
Triple-DES
KTH DD2395 Sonja Buchegger 9
needed a better replacement for DES NIST called for proposals in 1997 selected Rijndael in Nov 2001 published as FIPS 197 symmetric block cipher uses 128 bit data & 128/192/256 bit keys now widely available commercially
KTH DD2395 Sonja Buchegger 10
KTH DD2395 Sonja Buchegger 11
protects against active attacks verifies received message is authentic
can use conventional encryption
or separate authentication mechanisms
KTH DD2395 Sonja Buchegger 12
KTH DD2395 Sonja Buchegger 13
KTH DD2395 Sonja Buchegger 14
KTH DD2395 Sonja Buchegger 15
KTH DD2395 Sonja Buchegger 16
applied to any size data H produces a fixed-length output. H(x) is relatively easy to compute for any given x one-way property
weak collision resistance
strong collision resistance
KTH DD2395 Sonja Buchegger 17
two attack approaches
exploit logical weakness in alg
trial many inputs strength proportional to size of hash code (2n/2)
SHA most widely used hash algorithm
KTH DD2395 Sonja Buchegger 18
KTH DD2395 Sonja Buchegger 19
KTH DD2395 Sonja Buchegger 20
KTH DD2395 Sonja Buchegger 21
RSA (Rivest, Shamir, Adleman)
Diffie-Hellman key exchange algorithm
Digital Signature Standard (DSS)
Elliptic curve cryptography (ECC)
KTH DD2395 Sonja Buchegger 22
KTH DD2395 Sonja Buchegger 23
KTH DD2395 Sonja Buchegger 24
random numbers have a range of uses requirements: randomness
unpredictability
KTH DD2395 Sonja Buchegger 25
often use algorithmic technique to create
true random number generators use a
KTH DD2395 Sonja Buchegger 26
common to encrypt transmitted data much less common for stored data
approaches to encrypt stored data:
KTH DD2395 Sonja Buchegger 27
introduced cryptographic algorithms symmetric encryption algorithms for
message authentication & hash functions public-key encryption digital signatures and key management random numbers
now look at technical detail concerning:
28 KTH DD2395 Sonja Buchegger
a one-way or secure hash function used in
all hash functions process input a block at a
one of simplest hash functions is the bit-by-bit
29 KTH DD2395 Sonja Buchegger
SHA originally developed by NIST/NSA in 1993 was revised in 1995 as SHA-1
NIST issued revised FIPS 180-2 in 2002
NIST intend to phase out SHA-1 use
30 KTH DD2395 Sonja Buchegger
most based on iterated hash function design
MD5 (RFC1321)
Whirlpool (NESSIE endorsed hash)
31 KTH DD2395 Sonja Buchegger
by Rivest, Shamir & Adleman of MIT in 1977 best known & widely used public-key alg uses exponentiation of integers modulo a prime encrypt:
decrypt:
both sender and receiver know values of n and e only receiver knows value of d public-key encryption algorithm with
32 KTH DD2395 Sonja Buchegger
33 KTH DD2395 Sonja Buchegger
34 KTH DD2395 Sonja Buchegger
brute force
mathematical attacks (factoring n)
timing attacks (on implementation)
chosen ciphertext attacks (on RSA props)
35 KTH DD2395 Sonja Buchegger
first public-key type scheme proposed by Diffie & Hellman in 1976 along with the
practical method to exchange a secret key used in a number of commercial products security relies on difficulty of computing discrete
have
A and B each compute their public keys
then exchange and compute secret key:
attacker must solve:
Digital Signature Standard (DSS)
elliptic curve cryptography (ECC)
discussed technical detail concerning: