1. Trang chủ
  2. » Công Nghệ Thông Tin

Security in Information Systems: Chapter 4 - Cryptography & Key Exchange Protocols

57 47 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 57
Dung lượng 1,83 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Security in Information Systems: Chapter 4 - Cryptography & Key Exchange Protocols includes CryptographyCryptography -related conceptsrelated concepts, Key channel for symmetric cryptosystems, Perfect encryption, Dolev-Yao threat model, Protocol “message authentication”, Protocol “challenge-response”, Public-key cryptosystems.

Trang 1

Cryptography &

Key Exchange Protocols

Faculty of Computer Science & Engineering

HCMC University of Technology

Trang 2

Dolev-Yao threat model 4

Public-key cryptosystems 7

Protocol “challenge-response”

6

Trang 3

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

Cryptography-related concepts

Plaintext is the original content which is readable as textual

material Plaintext needs protecting.

Ciphertext is the result of encryption performed on plaintext

using an algorithm Ciphertext is not readable.

Encryption is the process of turning plaintext into

ciphertext, decryption is the inverse of the encryption.

Cryptosystems = encryption + decryption algorithms

Trang 5

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

Cryptography-related concepts

Symmetric (shared-/secret-key) cryptosystem: the same

key for (en/de)cryption algorithms

Asymmetric (public-key) cryptosystem: public & private

keys for (en/de)cryption algorithms

k e = k d

k e ≠ k d

Trang 6

Cryptography-related concepts

 The same key is used for both encryption and decryption

 Faster than encryption and decryption in public-key (PK)

 Asymmetric technique: for the key encryption

 Symmetric technique: for the data encryption

 TLS/SSL protocols: how do they work? Homework

Trang 7

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

Symmetric encryption techniques

Tripple DES, AES

DES: Data Encryption Standard

 A message is divided into 64-bit blocks

 Key: 56 bits

 Brute-force or exhaustive key search attacks (now: some

hours).

Trang 8

Symmetric encryption techniques

Triple DES: run the DES algorithm a multiple number of

times using different keys

 Encryption: c  ε k3 ( D k2 ( ε k1 (m)))

 Decryption: m  D k1 ( ε k2 ( D k3 (c)))

 The triple DES can also use three different keys

Trang 9

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

Symmetric encryption techniques

AES: Advanced Encryption Standard (Rijndael)

 Jan 2, 1997, NIST announced the initiation of a new

symmetric-key block cipher algorithm, AES, as the new encryption standard to replace the DES

 Oct 2, 2000: Rijndael was selected

 Rijndael is designed by two Belgium cryptographers: Daemen and Rijmen

variable key size

specified to 128, 192 or 256 bits

Trang 10

Asymmetric encryption techniques

RSA: named after 3 inventors Rivest, Shamir và Adleman

 Two keys: public key and private key

 Public key is used for encrytion.

 Private key is used for decrytion

Trang 11

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

Digital signatures

Digital signatures is a message signed with a user's private

key can be verified by anyone who has access to the user's

public key, thereby proving that the user signed it and that

the message has not been tampered with

Public key digital signatures provide authentication and data

integrity

A digital signature also provides non-repudiation, which

means that it prevents the sender from claiming that he or she did not actually send the information

Trang 12

Digital Signatures

Trang 13

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

Digital Signatures

Trang 14

Digital certificates & PKI

CA (certificate authority) )

Trang 15

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

Digital certificates

 Name & URL of CA

Trang 16

Key channel for symmetric cryptosystems 2

Cryptography-related concepts 1

Protocol “message authentication”

5

Perfect encryption 3

Dolev-Yao threat model 4

Public-key cryptosystems 7

Protocol “challenge-response”

6

Trang 17

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

Key channel for symmetric cryptosystems

Trang 18

Key channel for symmetric cryptosystems

 Asymmetric technique: for the key encryption

 Symmetric technique: for data encryption

 Relying on an on-line authentication service

 This disadvantage limits the scalability of the technique for

any open systems applications

The Quantum Key Distribution Technique

Trang 19

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

Key channel for symmetric cryptosystems

cryptosystems:

1 Only Alice & Bob (also TTP) know secret key K.

2 Alice & Bob ensure that the other know the key K.

3 Alice & Bob ensure that K is new.

Trang 20

Cryptography-related concepts 1

Protocol “message authentication”

5

Perfect encryption 3

Dolev-Yao threat model 4

Public-key cryptosystems 7

Protocol “challenge-response”

6

Key channel for symmetric cryptosystems 2

Trang 21

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

Perfect encryption

key K, the ciphertext M’ is calculated as follows:

 Without the key K (in the case of a symmetric

cryptosystem), or the matching private key of K (in the case

of an asymmetric cryptosystem), the ciphertext {M} K does

not provide any cryptanalytic means for finding the plaintext message M

 The ciphertext {M} K and maybe together with some known information about the plaintext M do not provide any

cryptanalytic means for finding the key K (in the case of a

symmetric cryptosystem), or the matching private key of K (in the case of an asymmetric cryptosystem)

Trang 22

Cryptography-related concepts 1

Protocol “message authentication”

5

Dolev-Yao threat model 4

Perfect encryption 3

Public-key cryptosystems 7

Protocol “challenge-response”

6

Key channel for symmetric cryptosystems 2

Trang 23

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

Dolev-Yao threat model

Bob

Trent

Alice

Malice

Trang 24

Dolev-Yao threat model

 can obtain any message passing through the network

 is a legitimate user of the network, and thus in particular can

initiate a conversation with any other user

 will have the opportunity to become a receiver to any principal

 can send messages to any principal by impersonating any

other principal

Trang 25

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

Dolev-Yao threat model

 cannot guess a random number which is chosen from a

sufficiently large space

 without the correct secret (or private) key, cannot retrieve

plaintext from given ciphertext, and cannot create valid ciphertext from given plaintext, wrt the perfect encryption algorithm

Trang 26

Dolev-Yao threat model

 cannot find the private component, i.e., the private key,

matching a given public key

 while he may have control of a large public part of our

computing and communication environment, in general, he is not in control of many private areas of the computing

environment, such as accessing the memory of a principal's offline computing device

Trang 27

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

Dolev-Yao threat model

communicate with each other in a secure manner

they do not already share a secret key between them and do not already know for sure the other party's public key

 Then how can they communicate securely over completely

insecure networks?

Trang 28

“From Alice to Bob” protocol

Trang 29

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

“From Alice to Bob” protocol

 Bob is unhappy about this

Trang 30

“Session key from Trent” protocol

3

Trang 31

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

“Session key from Trent” protocol

Trang 32

“Session key from Trent” protocol

 Malice must be a legitimate user known to Trent

 Inside attackers are often more of a threat than outsiders

Why we do not encrypt Alice in step 1 ???

Trang 33

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

“Session key from Trent” protocol

1 Alice, {Bob} KAT

3 4

Trang 34

“Session key from Trent” protocol

 But:

1.Alice sends to Trent: Alice, {Bob} KAT ;

1’.Malice("Alice") sends to Trent: Alice, {Malice} KAT ;

 Why?

 Malice has {Malice} KAT

 Malice knows Bob is the user Alice wants to communicate with

1’

Trang 35

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

“Session key from Trent” protocol

 In previous legitimate conversation between Alice & Malice,

Malice saved K’ and {K'} KAT

Malice makes use of old {K'} KAT

1 Alice sends to Malice(“Trent”): Alice, {Bob} KAT

2 Malice(“Trent”) sends to Alice: {K'} KAT , …

Trang 36

“Session key from Trent” protocol

detected

against tampering of messages

 “ Message Authentication” protocol

Trang 37

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

Outline

Key channel for symmetric cryptosystems 2

Cryptography-related concepts 1

Protocol “message authentication”

5

Perfect encryption 3

Dolev-Yao threat model 4

Public-key cryptosystems 7

Protocol “challenge-response”

6

Trang 38

Protocol with message authentication

See 2.6.3.1 [5] for more details

Trang 39

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

Perfect encryption for message authentication

service

cryptosystem), or the matching private key of K (in the case

not provide any cryptanalytic means for finding the plaintext message M

information about the plaintext M do not provide any

cryptanalytic means for finding the key K (in the case of a

symmetric cryptosystem), or the matching private key of K (in the case of an asymmetric cryptosystem)

Trang 40

Perfect encryption for message authentication

service

 Without the key K, even with the knowledge of the plaintext

M, it should be impossible for someone to alter {M} K

without being detected by the recipient during the time of

decryption

 Malice can not edit the cipertexts {Bob, K} KAT and {Alice,

K} KBT without being detected by the recipient during the

time of decryption

Trang 41

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

“Message Authentication” protocol

1. Alice sends to Malice(“Trent”): Alice, Bob

2. Malice(“Trent”) sends to Alice:{Bob,K'}K AT ,{Alice,K'} K BT

messages which Malice has recorded from a previous run

of the protocol (between Alice and Bob)

key K'.

Trang 42

Key channel for symmetric cryptosystems 2

Cryptography-related concepts 1

Dolev-Yao threat model 4

Public-key cryptosystems 7

Trang 43

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

Protocol “challenge-response"

 Nonce : a n umber used once

Trang 44

Giao thức “Challenge-response”

1 Alice creates N A at random and sends

to Trent: Alice, Bob, N A

2 Trent generates K at random and sends to Alice: {N A , K, Bob, {K, Alice} KBT } KAT

3 Alice decrypts, checks her N a and Bob

‘s identity, sends to Bob: Trent, {K, Alice} KBT

4 Bob decrypts, checks Alice’s ID, creates N B randomly and sends to Alice: {I’m Bob! N B } K

3 4 5

N A /N B : Nonce created by

Alice/Bob

Trang 45

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

Protocol “challenge-response"

authentication protocol:

 Bob thinks he is sharing a new session key with Alice while

actually the key is an old one and may be known to Malice

Trang 46

“Challenge-response” protocol

1 Alice sends to Trent: Alice, Bob, N A

2 Trent sends to Alice: {N A , K, Bob, {K, Alice} KBT } KAT

3 Alice sends to Malice(“Bob”): Trent, {K, Alice} KBT

3’ Malice(“Alice”) sends to Bob: Trent,

{K’, Alice} KBT

4 Bob decrypts, checks Alice’s ID, creates N B randomly and sends to Malice(“Alice”): {I’m Bob! N B } K’

5 Malice(“Alice”) sends to Bob: {I’m

3’

4 5

3

Trang 47

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

Trang 48

Protocol “Challenge-response” with Timestamps

1 Alice sends to Trent: Alice, Bob

2 Trent sends to Alice: {Bob, K, T , {Alice, K, T } KBT } KAT

3 Alice checks T and sends to Bob: {Alice, K, T } KBT

4 Bob checks T and sends to Alice: {I’m Bob! N B } K

5 Alice sends to Bob: {I’m Alice!N B -1} K

 Clock: local clock

 T: timestamp at Trent

Trang 49

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

Outline

Key channel for symmetric cryptosystems 2

Cryptography-related concepts 1

Public-key cryptosystems 7

Protocol “message authentication”

5

Perfect encryption 3

Dolev-Yao threat model 4

Protocol “challenge-response”

6

Trang 51

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

Public-key Cryptosystems

1 Alice sends to Trent: Alice, Bob

2 Trent sends to Alice: {K B , Bob} K -1

T

3 Alice verifies Trent’s signature, creates N A at random and sends to Bob: {N A , Alice} KB

4 Bob decrypts, checks Alice’s ID and sends to Trent: Bob, Alice

5 Trent sends to Bob: {K A , Alice} K -1 T

6 Bob verifies Trent’s signature, creates

N B and sends to Alice: {N A , N B } KA

7 Alice decrypts and sends to Bob:

3

4 5 6

7

Trang 52

Public-key Cryptosystems

 Found after 17 years

 Result: Bob thinks he is sharing secrets N A , N B with Alice

while actually sharing them with Malice

 Method: Malice makes use of Alice as she is trying to

establish a connection with him (Alice provides an oracle service)

Trang 53

Ho Chi Minh City University of Technology

Faculty of Computer Science and Engineering

Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols

Ngày đăng: 30/01/2020, 11:11

TỪ KHÓA LIÊN QUAN

w