Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

Embed Size (px)

Citation preview

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    1/42

    Submitted by :-

    Ashish Harkare (08020541124)

    Chetan Bhardwaj (08020541129)

    Gaurav Wadhwa (08020541127)

    Kartikya Pande (08020541128)

    Samridhi Singla (08020541126)

    1

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    2/42

    Introduction

    Originated from the greek words,Kryptos and Graphos

    The first known use of this technique by

    Julius caesar

    2

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    3/42

    What is Cryptography?

    Cryptography is the science of using mathematics toencrypt and decrypt data.It enables you to store

    sensitive information or transmit it across insecure

    networks (like the Internet) so that it cannot be read by

    anyone except the intended receiver.

    It is used in applications present in technological

    advanced societies eg. Security of ATM cards,

    computer passwords and e-commerce.

    Cryptanalysis is the source of analyzing and breaking

    secure communication.

    3

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    4/42

    Encryption and Decryption

    Plaintext or clear text.

    Cipher

    Key

    Encryption

    Ciphertext

    Decryption

    4

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    5/42

    How does Cryptographywork?

    Netprog: Cryptgraphy 5

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    6/42

    Why Cryptography?

    The main use of cryptography is to provide

    the following :

    (1) Privacy or confidentiality

    (2) Data integrity

    (3) Authentication

    (4) Non-repudiation.

    6

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    7/42

    Secret Key Cryptography( Symmetric cryptography)

    Single key used to encrypt and decrypt.

    Key must be known by both parties.

    Assuming we live in a hostileenvironment , it may be hard to share asecret key.

    7

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    8/42

    Secret Key Cryptography( Symmetric cryptography)

    8

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    9/42

    Advantage of SymmetricCryptography

    The encryption process is simple

    Each trading partner can use the same publiclyknown encryption algorithm - no need to develop

    and exchange secret algorithms

    Security is dependent on the length of the key

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    10/42

    Disadvantage

    If a user has n trading partners, then n secret keys

    must be maintained, one for each trading partner

    Authenticity of origin or receipt cannot be provedbecause the secret key is shared

    Management of the symmetric keys becomes

    problematic

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    11/42

    Problems with Managementof Symmetric Keys

    Partners must always use the exactsame key to decrypt the encryptedmessage

    key exchange is difficult because theexchange itself must be secure with nointervening compromise of the key

    management of keys is difficult as

    numbers of trading partners increases,especially when multiple keys exist foreach trading partner

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    12/42

    Public Key Cryptography -Solution for Managing Symmetric

    Keys public key cryptography simplifies themanagement of symmetric keys to the point

    whereby a symmetric key can be used not

    only for each trading partner, but for eachexchange between trading partners

    additionally, public key cryptography can be

    used to unambiguously establish non-

    repudiation of origin and receipt

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    13/42

    Public Key Cryptography( Asymmetric cryptography)

    Relatively new field - 1975

    Each entity has 2 keys:private key (a secret)

    public key (well known).

    13

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    14/42

    Private keys are used for decrypting.

    Public keys are used for encrypting.

    encryptionplaintext ciphertext

    public key

    decryptionciphertext plaintext

    private key

    14

    Using Keys

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    15/42

    Asymmetric Key Uses

    confidentiality

    digital signatures

    both uses depend on the association of

    a key pair with one, and only one owner

    of the keys

    both uses depend on one of the keys in

    the key pair being secret from everyonebut the owner of the key

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    16/42

    Real World Usage ofAsymmetric Encryption

    public key encryption algorithms areconsiderably slower than symmetric keyalgorithms

    rarely used as encryption methodology forbulk messages or parts of messages

    normally used in conjunction with aMessage Integrity Check (MIC) or to encrypt

    a symmetric key, where the MIC orsymmetric key is what is encrypted usingpublic key encryption algorithms

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    17/42

    disadvantage

    software encryption using DES (symmetric keyalgorithm) is 100 times faster than software

    encryption using RSA (asymmetric key

    algorithm) - estimate provided by RSA Data

    Securities

    hardware encryption using DES (symmetric

    key algorithm) is anywhere from 1,000 to

    10,000 times faster than hardware encryptionusing RSA (asymmetric key algorithm)

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    18/42

    Digital Signature Public key cryptography is also used to

    provide digital signatures.

    signingplaintext signed message

    private key

    verificationsigned message plaintext

    public key

    18

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    19/42

    Transmitting over an insecurechannel.

    Alice wants to send Bob a private message.

    Apublic

    is Alices public key.

    Aprivate is Alices private key.

    Bpublic is Bobs public key.

    Bprivate is Bobs private key.

    19

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    20/4220

    Hello Bob,

    Wanna get together?

    AliceAlice BobBob

    encrypt using Bpublic decrypt using Bprivate

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    21/42

    OK Alice,

    Your place or mine?

    21

    AliceAlice BobBob

    decrypt using Aprivate encrypt using Apublic

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    22/42

    Bobs Dilemma

    Nobody can read the message fromAlice, but anyone could produce it.

    How does Bob know that the messagewas really sent from Alice?

    Bob may be comforted to know that onlyAlice can read his reply.

    22

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    23/42

    Alice can sign hermessage! Alice can create a digital signature and

    prove she sent the message (or

    someone with knowledge of her private

    key). The signature can be a message digest

    encrypted with Aprivate.

    23

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    24/42

    Message Digest

    Also known as hash function or one-way transformation.

    Transforms a message of any lengthand computes a fixed length string.

    We want it to be hard to guess.

    24

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    25/42

    Message Digest

    25

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    26/42

    Alices Signature

    Alice feeds her original message through ahash function and encrypts the messagedigest with Aprivate.

    Bob can decrypt the message digest usingApublic.

    Bob can compute the message digesthimself.

    If the 2 message digests are identical, Bobknows Alice sent the message.

    26

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    27/42

    27

    AliceAlice BobBob

    Sign with Aprivate check signature using Apublic

    encrypt using Bpublic decrypt using Bprivate

    Revised Scheme

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    28/42

    Why the digest?

    Alice could just encrypt her name, andthen Bob could decrypt it with Apublic.

    Why wouldnt this be sufficient?

    28

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    29/42

    Implications

    Suppose Alice denies she sent themessage?

    Bob can prove that only someone withAlices key could have produced the

    message.

    29

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    30/42

    Another possible problem

    Suppose Bill receives a message from Aliceincludinga digital signature.meet me at the library tonight

    Bill sends the same message to Joe so that itlooks like the message came from Alice.

    Bill includes the digital signature from themessage Alice sent to him.

    Joe is convinced Alice sent the message!

    30

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    31/42

    Solution?

    Always start your messages with:Dear Bill,

    Create a digest from the encryptedmessage and sign that digest.

    There are many other schemes as well.

    31

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    32/42

    Speed

    Secret key encryption/decryptionalgorithms are much faster than public

    key algorithms.

    Many times a combination is used:use public key cryptography to share a

    secret key.

    use the secret key to encrypt the bulk of thecommunication.

    32

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    33/42

    Secure Protocols

    There are a growing number ofapplications for secure protocols:email

    electronic commerceelectronic voting

    homework submission

    33

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    34/42

    Secure Protocols

    Many application protocols include theuse of cryptography as part of the

    application level protocol.

    The cryptographic scheme employed is partof the protocol.

    If stronger cryptographic tools become

    available we need to change the protocol.

    34

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    35/42

    SSL and TLS

    Secure Sockets Layer (SSL) is adifferent approach - a new layer is

    added that provides a secure channel

    over a TCP only link.

    TLS is Transport Layer Security (IETF

    standard based on SSL).

    35

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    36/42

    SSL and TLS

    Transport Layer Security (TLS)Protocol and its predecessor, Secure

    Sockets Layer(SSL), are cryptographic

    protocols that provide security and dataintegrity for communications over

    TCP/IP networks such as the Internet

    36

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    37/42

    SSL layer

    37

    Application

    SSL

    TCP

    IP

    Application

    SSL

    TCP

    IP

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    38/42

    Advantages of SSL/TLS

    Independent of application layer

    Includes support for negotiatedencryption techniques.easy to add new techniques.

    applications like web browsing,electronic mail, Internet faxing, instantmessaging and voice-over-IP (VoIP

    38

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    39/42

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    40/42

    Common Symmetric KeyAlgorithms

    Data Encryption Standard - DES Triple DES

    RC2 and RC5

    IDEA

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    41/42

    Data Encryption Standard -DES

    most widely used commercial encryptionalgorithm

    in the public domain, available to all

    a U. S. government encryption standard

    security is known and is dependent solely

    on the key length

    data sequenced into 64 bit blocks prior toencryption, each block encrypted

  • 8/14/2019 Submitted by :Ashish Harkare Chetan Bhardwaj Gaurav Wadhwa Kartikya Pande

    42/42

    Triple DES

    variant on DES which encrypts message

    3 times with 2 independent 56 bit keys

    effective key length is 112 bits

    brute force attack on Triple DES is not

    feasible