-
CSE543 - Introduction to Computer and Network Security Page
CSE543 - Introduction to Computer and Network Security Module: Cryptography
Professor Trent Jaeger
1
CSE543 - Introduction to Computer and Network Security Module: - - PowerPoint PPT Presentation
CSE543 - Introduction to Computer and Network Security Page
Professor Trent Jaeger
1
CSE543 - Introduction to Computer and Network Security Page
by Queen Elizabeth …
conspirators encrypted.
complicity.
2
CSE543 - Introduction to Computer and Network Security Page
secret writing
properties, e.g., authenticity of data
specifics of modern cryptography, seek others for additional details (Menezes et. al.).
3
CSE543 - Introduction to Computer and Network Security Page
between cryptographers and cryptanalysts
4
CSE543 - Introduction to Computer and Network Security Page
the intended receivers
E(plaintext,key) = ciphertext D(ciphertext,key) = plaintext
5
CSE543 - Introduction to Computer and Network Security Page
6
CSE543 - Introduction to Computer and Network Security Page
slots to the right
S E C U R I T Y A N D P R I V A C Y V H F X U L W B D Q G S U L Y D F B
A B C D E F G H I J K L M N O P Q R S T V W X Y Z A B C D E F G H I J K L M N O P Q R S T V W X Y Z U U
7
CSE543 - Introduction to Computer and Network Security Page
8
CSE543 - Introduction to Computer and Network Security Page
1 T F D V S J U Z B M E Q S J W B D Z 2 U G E W T K V A C N F R T H X C E A 3 W H F X U L W B D Q G S U L Y D F B S E C U R I T Y A N D P R I V A C Y
9
CSE543 - Introduction to Computer and Network Security Page
in the alphabet
10
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
CSE543 - Introduction to Computer and Network Security Page
Why are substitution ciphers breakable?
breakable because they don’t hide the underlying frequency of characters. You can use this information if you know the target language frequency count.
b,v,k,x,q,j,z
11
2 4 6 8 10 12 14 E T A O I N S R H D L U C M F Y W G P B V K X Q J ZEnglish Character Frequency (in %)
CSE543 - Introduction to Computer and Network Security Page
fjrng naq grnef gb trg gb jurer jr ner gbqnl,
Gbqnl jr ortva va rnearfg gur jbex bs znxvat fher gung gur jbeyq jr yrnir bhe puvyqera vf whfg n yvggyr ovg orggre guna gur bar jr vaunovg gbqnl.
12
CSE543 - Introduction to Computer and Network Security Page
fjrng naq grnef gb trg gb jurer jr ner gbqnl,
Gbqnl jr ortva va rnearfg gur jbex bs znxvat fher gung gur jbeyq jr yrnir bhe puvyqera vf whfg n yvggyr ovg orggre guna gur bar jr vaunovg gbqnl.
sweat and tears to get to where we are today, but we have just begun. Today we begin in earnest the work of making sure that the world we leave our children is just a little bit better than the one we inhabit today.
13
‘r’ appears very frequently so very likely is one of the top frequency letters.
CSE543 - Introduction to Computer and Network Security Page
fjrng naq grnef gb trg gb jurer jr ner gbqnl,
Gbqnl jr ortva va rnearfg gur jbex bs znxvat fher gung gur jbeyq jr yrnir bhe puvyqera vf whfg n yvggyr ovg orggre guna gur bar jr vaunovg gbqnl.
sweat and tears to get to where we are today, but we have just begun. Today we begin in earnest the work of making sure that the world we leave our children is just a little bit better than the one we inhabit today.
14
Repeat this process, picking
common words, e.g., ‘the’ ... which gives (e to r), (g to t), and (u to h)
CSE543 - Introduction to Computer and Network Security Page
for E and D
to encrypted data
15
CSE543 - Introduction to Computer and Network Security Page
algorithm, but is strength strongly correlated (or perfectly correlated with key length)?
and 160 bits (the common measure)
16
Implication: references to key length in advertisements are often meaningless.
CSE543 - Introduction to Computer and Network Security Page
17
CSE543 - Introduction to Computer and Network Security Page
known only to two parties, Alice and Bob
ciphertext bits:
likely, then you have no information to work with.
18
n
ci = mi ⊕ ki
CSE543 - Introduction to Computer and Network Security Page
as possible
complex as possible
19
CSE543 - Introduction to Computer and Network Security Page
(now NIST) in 1972
modern area of cryptography
(56-bits+8 parity bits)
substitution, initial and final permutation
20
CSE543 - Introduction to Computer and Network Security Page
relationship between the key and the ciphertext
key and ciphertext is as complex as possible.
21
Example: Given a 6-bit input, the 4-bit output is found by selecting the row using the
has outer bits "01" and inner bits "1101"; the corresponding output would be "1001".
CSE543 - Introduction to Computer and Network Security Page
relationship between the plaintext and the ciphertext
plaintext and ciphertext is as complex as possible.
cryptanalysis
22
CSE543 - Introduction to Computer and Network Security Page
than $250,000 < 3 days
minutes (over many machines)
world can crack (recover key) DES in milliseconds
23
CSE543 - Introduction to Computer and Network Security Page
24
k1, k2, k3
CSE543 - Introduction to Computer and Network Security Page
25
CSE543 - Introduction to Computer and Network Security Page
information is available to the adversary
available and wants to determine the plaintext
to determine plaintext based on a different ciphertext
encryption of any plaintext, tries to determine the plaintext for a different ciphertext
decrypt
26
CSE543 - Introduction to Computer and Network Security Page
pairs of ciphertext/plaintext encrypted under the same key, tries to determine plaintext based on a different ciphertext
use them to extract the key material
cryptographic modes to prevent such detection
27
CSE543 - Introduction to Computer and Network Security Page
cipher text
28
CSE543 - Introduction to Computer and Network Security Page
29
CSE543 - Introduction to Computer and Network Security Page
space optimization)
compute h-1(y), where y=h(d)
h(x1) == h(x2)
30
CSE543 - Introduction to Computer and Network Security Page
31
CSE543 - Introduction to Computer and Network Security Page
lecture.
student through Mallory, her evil TA.
– If does not cancel class, she does nothing – If Bob receives the token t, he knows that Alice sent it
32
CSE543 - Introduction to Computer and Network Security Page
– t acts as an authenticated value (authenticator) because Mallory could not have produced t without inverting h() – Note: Mallory can convince Bob that class is occurring when it is not by simply not delivering t (but we assume Bob is smart enough to come to that conclusion when the room is empty)
good as (single bit) authenticators.
value h(t) from Alice directly (was provably authentic)
33
CSE543 - Introduction to Computer and Network Security Page
same protocol, only for all 26 classes (the semester)
1.Alice invents a secret t 2.Alice gives Bob h26(t), where h26() is 26 repeated uses of h(). 3.If she cancels class on day d, she gives h(26-D)(t) to Mallory, e.g.,
If cancels on day 1, she gives Mallory h25(t) If cancels on day 2, she gives Mallory h24(t) ……. If cancels on day 25, she gives Mallory h1(t) If cancels on day 26, she gives Mallory t
4.If does not cancel class, she does nothing – If Bob receives the token t, he knows that Alice sent it
34
CSE543 - Introduction to Computer and Network Security Page
(authenticator) because Mallory could not create h(26-d)(t) without inverting h(26-d-1)(t) because for any hk(t) she has hj(t) where 26>j>k
all days prior to today, but that provides no information on today’s value, as they are all post-images of today’s value
by not delivering h(26-d)(t)
Alice directly (was provably authentic)
35
CSE543 - Introduction to Computer and Network Security Page
hash chain as authenticators.
what i is expected, and authenticate the user.
time but learn nothing useful for later periods.
36
CSE543 - Introduction to Computer and Network Security Page
useless?
37
CSE543 - Introduction to Computer and Network Security Page
passwords more expensive. For example, you can repeat the salted hash many times ...
38
CSE543 - Introduction to Computer and Network Security Page
integrity for data d
39
CSE543 - Introduction to Computer and Network Security Page
algorithm X(d) that produces MAC(k,d) without k (assume d is known).
does not)
40
d = 0 then, X(d) = h(k ⊕ 0) = h(k)
CSE543 - Introduction to Computer and Network Security Page
attacker
41
CSE543 - Introduction to Computer and Network Security Page
important to hash functions?
people in a group of 23 share the same birthday is >than 50%
– function f() whose output is uniformly distributed – On repeated random inputs n = { n1, n2, , .., nk }
42
CSE543 - Introduction to Computer and Network Security Page
securely to another party (Bob)
distribution, later)
Bob can read it?
knows it is from Alice?
43
CSE543 - Introduction to Computer and Network Security Page
security problems
almost assuredly snake oil
44
CSE543 - Introduction to Computer and Network Security Page
failures
45
CSE543 - Introduction to Computer and Network Security Page
security
Verifies that PIN corresponds to encryption of account number with PIN key (offset can be used)
46
CSE543 - Introduction to Computer and Network Security Page
for everyone
47
CSE543 - Introduction to Computer and Network Security Page
48
CSE543 - Introduction to Computer and Network Security Page
don’t always work securely
followed
49
CSE543 - Introduction to Computer and Network Security Page
50
CSE543 - Introduction to Computer and Network Security Page
understood
51
CSE543 - Introduction to Computer and Network Security Page
52
CSE543 - Introduction to Computer and Network Security Page
Victor Shoup’s library, RSAREF, cryptolib
think of a package before using it
programmer
53
CSE543 - Introduction to Computer and Network Security Page
secrets onto disk)
prime length, using parameters from one algorithm in another
54