uses of cryptography
play

Uses of Cryptography What can we use cryptography for? Lots of - PowerPoint PPT Presentation

Uses of Cryptography What can we use cryptography for? Lots of things Secrecy Authentication Prevention of alteration Lecture 4 Page 1 CS 236 Online Cryptography and Secrecy Pretty obvious Only those knowing the


  1. Uses of Cryptography • What can we use cryptography for? • Lots of things – Secrecy – Authentication – Prevention of alteration Lecture 4 Page 1 CS 236 Online

  2. Cryptography and Secrecy • Pretty obvious • Only those knowing the proper keys can decrypt the message – Thus preserving secrecy • Used cleverly, it can provide other forms of secrecy Lecture 4 Page 2 CS 236 Online

  3. Cryptography and Authentication • How can I prove to you that I created a piece of data? • What if I give you the data in encrypted form? – Using a key only you and I know • Then only you or I could have created it – Unless one of us told someone else the key . . . Lecture 4 Page 3 CS 236 Online

  4. Using Cryptography for Authentication • If both parties cooperative, standard cryptography can authenticate – Problems with non-repudiation, though • What if three parties want to share a key? – No longer certain who created anything – Public key cryptography can solve this problem • What if I want to prove authenticity without secrecy? Lecture 4 Page 4 CS 236 Online

  5. Cryptography and Non- Alterability • Changing one bit of an encrypted message completely garbles it – For many forms of cryptography • If a checksum is part of encrypted data, that’s detectable • If you don’t need secrecy, can get the same effect – By encrypting only the checksum Lecture 4 Page 5 CS 236 Online

  6. Symmetric and Asymmetric Cryptosystems • Symmetric - the encrypter and decrypter share a secret key – Used for both encrypting and decrypting • Asymmetric – encrypter has different key than decrypter Lecture 4 Page 6 CS 236 Online

  7. Description of Symmetric Systems • C = E(K,P) • P = D(K,C) • E() and D() are not necessarily the same operations Lecture 4 Page 7 CS 236 Online

  8. Advantages of Symmetric Key Systems + Encryption and authentication performed in a single operation + Well-known (and trusted) ones perform faster than asymmetric key systems + Doesn’t require any centralized authority • Though key servers help a lot Lecture 4 Page 8 CS 236 Online

  9. Disadvantage of Symmetric Key Systems – Encryption and authentication performed in a single operation • Makes signature more difficult – Non-repudiation hard without servers – Key distribution can be a problem – Scaling Lecture 4 Page 9 CS 236 Online

  10. Scaling Problems of Symmetric Cryptography K 5 K 4 K 1 K 4 K 6 I m a K 2 s y e k e l y d n n a a m h o w t o ? d H ? e ? e n ? t o e n t r g e n t i n o I g e r i t n e e h K 5 t K 3 K 3 K 2 K 6 K 1 Lecture 4 Page 10 CS 236 Online

  11. Sample Symmetric Key Ciphers • The Data Encryption Standard • The Advanced Encryption Standard • There are many others Lecture 4 Page 11 CS 236 Online

  12. The Data Encryption Standard • Well known symmetric cipher • Developed in 1977, still much used – Shouldn’t be, for anything serious • Block encryption, using substitutions, permutations, table lookups – With multiple rounds – Each round is repeated application of operations • Only serious problem based on short key Lecture 4 Page 12 CS 236 Online

  13. The Advanced Encryption Standard • A relatively new cryptographic algorithm • Intended to be the replacement for DES • Chosen by NIST – Through an open competition • Chosen cipher was originally called Rijndael – Developed by Dutch researchers – Uses combination of permutation and substitution Lecture 4 Page 13 CS 236 Online

  14. Increased Popularity of AES • Gradually replacing DES – As was intended • Various RFCs describe using AES in IPsec • FreeS/WAN IPsec (for Linux) includes AES • Some commercial VPNs use AES • Used in modern Windows systems – Also recent versions of Mac OS Lecture 4 Page 14 CS 236 Online

  15. Is AES Secure? • No complete breaks discovered so far • But some disturbing problems – Attacks that work on versions of AES using fewer rounds – Attacks that get keys quicker than brute force • But not practical time (e.g. in 2 126 operations) • But unusable crypto flaws often lead to usable ones • Attacks on crypto only get better over time, never worse Lecture 4 Page 15 CS 236 Online

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend