Upload
dipteshsinha
View
217
Download
0
Embed Size (px)
Citation preview
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
1/42
Submitted by :-
Ashish Harkare (08020541124)
Chetan Bhardwaj (08020541129)
Gaurav Wadhwa (08020541127)
Kartikya Pande (08020541128)
Samridhi Singla (08020541126)
1
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
2/42
Introduction
Originated from the greek words,Kryptos and Graphos
The first known use of this technique by
Julius caesar
2
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
3/42
What is Cryptography?
Cryptography is the science of using mathematics toencrypt and decrypt data.It enables you to store
sensitive information or transmit it across insecure
networks (like the Internet) so that it cannot be read by
anyone except the intended receiver.
It is used in applications present in technological
advanced societies eg. Security of ATM cards,
computer passwords and e-commerce.
Cryptanalysis is the source of analyzing and breaking
secure communication.
3
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
4/42
Encryption and Decryption
Plaintext or clear text.
Cipher
Key
Encryption
Ciphertext
Decryption
4
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
5/42
How does Cryptographywork?
Netprog: Cryptgraphy 5
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
6/42
Why Cryptography?
The main use of cryptography is to provide
the following :
(1) Privacy or confidentiality
(2) Data integrity
(3) Authentication
(4) Non-repudiation.
6
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
7/42
Secret Key Cryptography( Symmetric cryptography)
Single key used to encrypt and decrypt.
Key must be known by both parties.
Assuming we live in a hostileenvironment , it may be hard to share asecret key.
7
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
8/42
Secret Key Cryptography( Symmetric cryptography)
8
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
9/42
Advantage of SymmetricCryptography
The encryption process is simple
Each trading partner can use the same publiclyknown encryption algorithm - no need to develop
and exchange secret algorithms
Security is dependent on the length of the key
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
10/42
Disadvantage
If a user has n trading partners, then n secret keys
must be maintained, one for each trading partner
Authenticity of origin or receipt cannot be provedbecause the secret key is shared
Management of the symmetric keys becomes
problematic
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
11/42
Problems with Managementof Symmetric Keys
Partners must always use the exactsame key to decrypt the encryptedmessage
key exchange is difficult because theexchange itself must be secure with nointervening compromise of the key
management of keys is difficult as
numbers of trading partners increases,especially when multiple keys exist foreach trading partner
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
12/42
Public Key Cryptography -Solution for Managing Symmetric
Keys public key cryptography simplifies themanagement of symmetric keys to the point
whereby a symmetric key can be used not
only for each trading partner, but for eachexchange between trading partners
additionally, public key cryptography can be
used to unambiguously establish non-
repudiation of origin and receipt
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
13/42
Public Key Cryptography( Asymmetric cryptography)
Relatively new field - 1975
Each entity has 2 keys:private key (a secret)
public key (well known).
13
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
14/42
Private keys are used for decrypting.
Public keys are used for encrypting.
encryptionplaintext ciphertext
public key
decryptionciphertext plaintext
private key
14
Using Keys
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
15/42
Asymmetric Key Uses
confidentiality
digital signatures
both uses depend on the association of
a key pair with one, and only one owner
of the keys
both uses depend on one of the keys in
the key pair being secret from everyonebut the owner of the key
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
16/42
Real World Usage ofAsymmetric Encryption
public key encryption algorithms areconsiderably slower than symmetric keyalgorithms
rarely used as encryption methodology forbulk messages or parts of messages
normally used in conjunction with aMessage Integrity Check (MIC) or to encrypt
a symmetric key, where the MIC orsymmetric key is what is encrypted usingpublic key encryption algorithms
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
17/42
disadvantage
software encryption using DES (symmetric keyalgorithm) is 100 times faster than software
encryption using RSA (asymmetric key
algorithm) - estimate provided by RSA Data
Securities
hardware encryption using DES (symmetric
key algorithm) is anywhere from 1,000 to
10,000 times faster than hardware encryptionusing RSA (asymmetric key algorithm)
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
18/42
Digital Signature Public key cryptography is also used to
provide digital signatures.
signingplaintext signed message
private key
verificationsigned message plaintext
public key
18
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
19/42
Transmitting over an insecurechannel.
Alice wants to send Bob a private message.
Apublic
is Alices public key.
Aprivate is Alices private key.
Bpublic is Bobs public key.
Bprivate is Bobs private key.
19
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
20/4220
Hello Bob,
Wanna get together?
AliceAlice BobBob
encrypt using Bpublic decrypt using Bprivate
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
21/42
OK Alice,
Your place or mine?
21
AliceAlice BobBob
decrypt using Aprivate encrypt using Apublic
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
22/42
Bobs Dilemma
Nobody can read the message fromAlice, but anyone could produce it.
How does Bob know that the messagewas really sent from Alice?
Bob may be comforted to know that onlyAlice can read his reply.
22
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
23/42
Alice can sign hermessage! Alice can create a digital signature and
prove she sent the message (or
someone with knowledge of her private
key). The signature can be a message digest
encrypted with Aprivate.
23
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
24/42
Message Digest
Also known as hash function or one-way transformation.
Transforms a message of any lengthand computes a fixed length string.
We want it to be hard to guess.
24
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
25/42
Message Digest
25
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
26/42
Alices Signature
Alice feeds her original message through ahash function and encrypts the messagedigest with Aprivate.
Bob can decrypt the message digest usingApublic.
Bob can compute the message digesthimself.
If the 2 message digests are identical, Bobknows Alice sent the message.
26
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
27/42
27
AliceAlice BobBob
Sign with Aprivate check signature using Apublic
encrypt using Bpublic decrypt using Bprivate
Revised Scheme
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
28/42
Why the digest?
Alice could just encrypt her name, andthen Bob could decrypt it with Apublic.
Why wouldnt this be sufficient?
28
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
29/42
Implications
Suppose Alice denies she sent themessage?
Bob can prove that only someone withAlices key could have produced the
message.
29
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
30/42
Another possible problem
Suppose Bill receives a message from Aliceincludinga digital signature.meet me at the library tonight
Bill sends the same message to Joe so that itlooks like the message came from Alice.
Bill includes the digital signature from themessage Alice sent to him.
Joe is convinced Alice sent the message!
30
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
31/42
Solution?
Always start your messages with:Dear Bill,
Create a digest from the encryptedmessage and sign that digest.
There are many other schemes as well.
31
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
32/42
Speed
Secret key encryption/decryptionalgorithms are much faster than public
key algorithms.
Many times a combination is used:use public key cryptography to share a
secret key.
use the secret key to encrypt the bulk of thecommunication.
32
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
33/42
Secure Protocols
There are a growing number ofapplications for secure protocols:email
electronic commerceelectronic voting
homework submission
33
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
34/42
Secure Protocols
Many application protocols include theuse of cryptography as part of the
application level protocol.
The cryptographic scheme employed is partof the protocol.
If stronger cryptographic tools become
available we need to change the protocol.
34
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
35/42
SSL and TLS
Secure Sockets Layer (SSL) is adifferent approach - a new layer is
added that provides a secure channel
over a TCP only link.
TLS is Transport Layer Security (IETF
standard based on SSL).
35
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
36/42
SSL and TLS
Transport Layer Security (TLS)Protocol and its predecessor, Secure
Sockets Layer(SSL), are cryptographic
protocols that provide security and dataintegrity for communications over
TCP/IP networks such as the Internet
36
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
37/42
SSL layer
37
Application
SSL
TCP
IP
Application
SSL
TCP
IP
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
38/42
Advantages of SSL/TLS
Independent of application layer
Includes support for negotiatedencryption techniques.easy to add new techniques.
applications like web browsing,electronic mail, Internet faxing, instantmessaging and voice-over-IP (VoIP
38
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
39/42
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
40/42
Common Symmetric KeyAlgorithms
Data Encryption Standard - DES Triple DES
RC2 and RC5
IDEA
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
41/42
Data Encryption Standard -DES
most widely used commercial encryptionalgorithm
in the public domain, available to all
a U. S. government encryption standard
security is known and is dependent solely
on the key length
data sequenced into 64 bit blocks prior toencryption, each block encrypted
8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande
42/42
Triple DES
variant on DES which encrypts message
3 times with 2 independent 56 bit keys
effective key length is 112 bits
brute force attack on Triple DES is not
feasible