Week 3 Flashcards
Cryptography
where security engineering meets mathematics. It gives us the tools that underlie most modern security protocols
Encryption
The process of transforming information (plain text) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key: the result of encryption is termed cipher text
Information Security Concerns
Confidentiality, Integrity, Availability, Auditability
Elements of Access Control
- Identification
- Authentication
- Authorization
- Nonrepudiation
Cryptography components: hash function:
generate unique number; easy; non-traceable
•e.g. Hash(m) = mod(m, n), remainder after dividing by n, for n prime Hash(‘hello’) = mod(8 5 12 12 15, 127) = 100
•If message changes, so does the hash. E.g. Hash(‘hallo’) = 92
Cryptography components: Symmetric key algorithms:
Parties have the same key
Symmetric key like (DES, 3DES, AES)
Public key algorithms:
Parties have complementary key values
Public key ciphers (like RSA); digital signatures
Symmetric Key Cryptography
In conventional cryptography, key k is used both for encryption (E) of plain text m and for decryption (D) of cipher text c
Key management
Refers to mechanisms to bind a person to a key. Mechanisms for generation, maintenance and revocation of keys.
Problems:
Key distribution, secrecy, usability, storage (2-factor authentication)
Public key cryptography
- Uses a pair of two related keys (PK, SK)
- Public key (PK): published and distributed
- Secret key (SK): private and unique
- It does not matter if someone intercepts PKb. It is public
Advantages of PK Cryptography
•Communication partners who do not know each other can send secure messages to each other, provided
1.the secret key is really kept secret by its owner
2.the public key is unambiguously linked to its owner.
•This can be established by a chain of trust(compare procedures for collecting a passport)
•Messages can be electronically signed enabling implementation of authentication and non-repudiation
Usage of Public key cryptography
Confidentiality: Only Bob has SKb to decrypt cipher text
•Authentication:(1) Use secure key distribution to uniquely link PKB to Alice. e.g. chain of trust, using certificate authorities (CA). or (2) Use SKA to encrypt (signature) Anyone with PKAcan test. •Integrity:Alice makes a unique ‘hash’ of the message, encrypts the message and sends it all securely along. Bob decrypts and recalculates the hash himself; Bob compares to find differences (SHA-1 algorithm)
Strength of RSA
- Encryption is based on numbers n and f, so the public key is a pair (f, n)
- The private key is the pair (d, n); n is publicly known
- Statement: anyone who knows the public key of RSA and is able to factor the number n, can also find d
- So the relative strength of RSA is based on the difficulty of factoring n in its two prime factors.
- Key distribution remains crucial. Consider a man-in-the-middle attack. Suppose Trudy can intercept messages between Alice and Bob. She receives PKB, makes a fake SKA’ and PKA’ and sends PKA’ to Bob. Bob will then communicate with Trudy as if it is Alice. This can be avoided by digital certificates from a public key infrastructure, and by regularly comparing certificates.
Usage of Public key cryptography (double key pair)
Same as public key cryptography, however besides PKb encrypted and SKb decrypted;
PKbSKa encrypts, and SKbPKa decrypts
Purpose of a signature
to authenticate a message