Security in Information Systems: Chapter 4 - Cryptography & Key Exchange Protocols includes CryptographyCryptography -related conceptsrelated concepts, Key channel for symmetric cryptosystems, Perfect encryption, Dolev-Yao threat model, Protocol “message authentication”, Protocol “challenge-response”, Public-key cryptosystems.
Trang 1Cryptography &
Key Exchange Protocols
Faculty of Computer Science & Engineering
HCMC University of Technology
Trang 2Dolev-Yao threat model 4
Public-key cryptosystems 7
Protocol “challenge-response”
6
Trang 3Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
Cryptography-related concepts
Plaintext is the original content which is readable as textual
material Plaintext needs protecting.
Ciphertext is the result of encryption performed on plaintext
using an algorithm Ciphertext is not readable.
Encryption is the process of turning plaintext into
ciphertext, decryption is the inverse of the encryption.
Cryptosystems = encryption + decryption algorithms
Trang 5Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
Cryptography-related concepts
Symmetric (shared-/secret-key) cryptosystem: the same
key for (en/de)cryption algorithms
Asymmetric (public-key) cryptosystem: public & private
keys for (en/de)cryption algorithms
k e = k d
k e ≠ k d
Trang 6Cryptography-related concepts
The same key is used for both encryption and decryption
Faster than encryption and decryption in public-key (PK)
Asymmetric technique: for the key encryption
Symmetric technique: for the data encryption
TLS/SSL protocols: how do they work? Homework
Trang 7Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
Symmetric encryption techniques
Tripple DES, AES
DES: Data Encryption Standard
A message is divided into 64-bit blocks
Key: 56 bits
Brute-force or exhaustive key search attacks (now: some
hours).
Trang 8Symmetric encryption techniques
Triple DES: run the DES algorithm a multiple number of
times using different keys
Encryption: c ε k3 ( D k2 ( ε k1 (m)))
Decryption: m D k1 ( ε k2 ( D k3 (c)))
The triple DES can also use three different keys
Trang 9Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
Symmetric encryption techniques
AES: Advanced Encryption Standard (Rijndael)
Jan 2, 1997, NIST announced the initiation of a new
symmetric-key block cipher algorithm, AES, as the new encryption standard to replace the DES
Oct 2, 2000: Rijndael was selected
Rijndael is designed by two Belgium cryptographers: Daemen and Rijmen
variable key size
specified to 128, 192 or 256 bits
Trang 10Asymmetric encryption techniques
RSA: named after 3 inventors Rivest, Shamir và Adleman
Two keys: public key and private key
Public key is used for encrytion.
Private key is used for decrytion
Trang 11Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
Digital signatures
Digital signatures is a message signed with a user's private
key can be verified by anyone who has access to the user's
public key, thereby proving that the user signed it and that
the message has not been tampered with
Public key digital signatures provide authentication and data
integrity
A digital signature also provides non-repudiation, which
means that it prevents the sender from claiming that he or she did not actually send the information
Trang 12Digital Signatures
Trang 13Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
Digital Signatures
Trang 14Digital certificates & PKI
CA (certificate authority) )
Trang 15Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
Digital certificates
Name & URL of CA
Trang 16Key channel for symmetric cryptosystems 2
Cryptography-related concepts 1
Protocol “message authentication”
5
Perfect encryption 3
Dolev-Yao threat model 4
Public-key cryptosystems 7
Protocol “challenge-response”
6
Trang 17Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
Key channel for symmetric cryptosystems
Trang 18Key channel for symmetric cryptosystems
Asymmetric technique: for the key encryption
Symmetric technique: for data encryption
Relying on an on-line authentication service
This disadvantage limits the scalability of the technique for
any open systems applications
The Quantum Key Distribution Technique
Trang 19Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
Key channel for symmetric cryptosystems
cryptosystems:
1 Only Alice & Bob (also TTP) know secret key K.
2 Alice & Bob ensure that the other know the key K.
3 Alice & Bob ensure that K is new.
Trang 20Cryptography-related concepts 1
Protocol “message authentication”
5
Perfect encryption 3
Dolev-Yao threat model 4
Public-key cryptosystems 7
Protocol “challenge-response”
6
Key channel for symmetric cryptosystems 2
Trang 21Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
Perfect encryption
key K, the ciphertext M’ is calculated as follows:
Without the key K (in the case of a symmetric
cryptosystem), or the matching private key of K (in the case
of an asymmetric cryptosystem), the ciphertext {M} K does
not provide any cryptanalytic means for finding the plaintext message M
The ciphertext {M} K and maybe together with some known information about the plaintext M do not provide any
cryptanalytic means for finding the key K (in the case of a
symmetric cryptosystem), or the matching private key of K (in the case of an asymmetric cryptosystem)
Trang 22Cryptography-related concepts 1
Protocol “message authentication”
5
Dolev-Yao threat model 4
Perfect encryption 3
Public-key cryptosystems 7
Protocol “challenge-response”
6
Key channel for symmetric cryptosystems 2
Trang 23Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
Dolev-Yao threat model
Bob
Trent
Alice
Malice
Trang 24Dolev-Yao threat model
can obtain any message passing through the network
is a legitimate user of the network, and thus in particular can
initiate a conversation with any other user
will have the opportunity to become a receiver to any principal
can send messages to any principal by impersonating any
other principal
Trang 25Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
Dolev-Yao threat model
cannot guess a random number which is chosen from a
sufficiently large space
without the correct secret (or private) key, cannot retrieve
plaintext from given ciphertext, and cannot create valid ciphertext from given plaintext, wrt the perfect encryption algorithm
Trang 26Dolev-Yao threat model
cannot find the private component, i.e., the private key,
matching a given public key
while he may have control of a large public part of our
computing and communication environment, in general, he is not in control of many private areas of the computing
environment, such as accessing the memory of a principal's offline computing device
Trang 27Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
Dolev-Yao threat model
communicate with each other in a secure manner
they do not already share a secret key between them and do not already know for sure the other party's public key
Then how can they communicate securely over completely
insecure networks?
Trang 28“From Alice to Bob” protocol
Trang 29Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
“From Alice to Bob” protocol
Bob is unhappy about this
Trang 30“Session key from Trent” protocol
3
Trang 31Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
“Session key from Trent” protocol
Trang 32“Session key from Trent” protocol
Malice must be a legitimate user known to Trent
Inside attackers are often more of a threat than outsiders
Why we do not encrypt Alice in step 1 ???
Trang 33Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
“Session key from Trent” protocol
1 Alice, {Bob} KAT
3 4
Trang 34“Session key from Trent” protocol
But:
1.Alice sends to Trent: Alice, {Bob} KAT ;
1’.Malice("Alice") sends to Trent: Alice, {Malice} KAT ;
Why?
Malice has {Malice} KAT
Malice knows Bob is the user Alice wants to communicate with
1’
Trang 35Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
“Session key from Trent” protocol
In previous legitimate conversation between Alice & Malice,
Malice saved K’ and {K'} KAT
Malice makes use of old {K'} KAT
1 Alice sends to Malice(“Trent”): Alice, {Bob} KAT
2 Malice(“Trent”) sends to Alice: {K'} KAT , …
Trang 36“Session key from Trent” protocol
detected
against tampering of messages
“ Message Authentication” protocol
Trang 37Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
Outline
Key channel for symmetric cryptosystems 2
Cryptography-related concepts 1
Protocol “message authentication”
5
Perfect encryption 3
Dolev-Yao threat model 4
Public-key cryptosystems 7
Protocol “challenge-response”
6
Trang 38Protocol with message authentication
See 2.6.3.1 [5] for more details
Trang 39Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
Perfect encryption for message authentication
service
cryptosystem), or the matching private key of K (in the case
not provide any cryptanalytic means for finding the plaintext message M
information about the plaintext M do not provide any
cryptanalytic means for finding the key K (in the case of a
symmetric cryptosystem), or the matching private key of K (in the case of an asymmetric cryptosystem)
Trang 40Perfect encryption for message authentication
service
Without the key K, even with the knowledge of the plaintext
M, it should be impossible for someone to alter {M} K
without being detected by the recipient during the time of
decryption
Malice can not edit the cipertexts {Bob, K} KAT and {Alice,
K} KBT without being detected by the recipient during the
time of decryption
Trang 41Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
“Message Authentication” protocol
1. Alice sends to Malice(“Trent”): Alice, Bob
2. Malice(“Trent”) sends to Alice:{Bob,K'}K AT ,{Alice,K'} K BT
messages which Malice has recorded from a previous run
of the protocol (between Alice and Bob)
key K'.
Trang 42Key channel for symmetric cryptosystems 2
Cryptography-related concepts 1
Dolev-Yao threat model 4
Public-key cryptosystems 7
Trang 43Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
Protocol “challenge-response"
Nonce : a n umber used once
Trang 44Giao thức “Challenge-response”
1 Alice creates N A at random and sends
to Trent: Alice, Bob, N A
2 Trent generates K at random and sends to Alice: {N A , K, Bob, {K, Alice} KBT } KAT
3 Alice decrypts, checks her N a and Bob
‘s identity, sends to Bob: Trent, {K, Alice} KBT
4 Bob decrypts, checks Alice’s ID, creates N B randomly and sends to Alice: {I’m Bob! N B } K
3 4 5
N A /N B : Nonce created by
Alice/Bob
Trang 45Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
Protocol “challenge-response"
authentication protocol:
Bob thinks he is sharing a new session key with Alice while
actually the key is an old one and may be known to Malice
Trang 46“Challenge-response” protocol
1 Alice sends to Trent: Alice, Bob, N A
2 Trent sends to Alice: {N A , K, Bob, {K, Alice} KBT } KAT
3 Alice sends to Malice(“Bob”): Trent, {K, Alice} KBT
3’ Malice(“Alice”) sends to Bob: Trent,
{K’, Alice} KBT
4 Bob decrypts, checks Alice’s ID, creates N B randomly and sends to Malice(“Alice”): {I’m Bob! N B } K’
5 Malice(“Alice”) sends to Bob: {I’m
3’
4 5
3
Trang 47Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
Trang 48Protocol “Challenge-response” with Timestamps
1 Alice sends to Trent: Alice, Bob
2 Trent sends to Alice: {Bob, K, T , {Alice, K, T } KBT } KAT
3 Alice checks T and sends to Bob: {Alice, K, T } KBT
4 Bob checks T and sends to Alice: {I’m Bob! N B } K
5 Alice sends to Bob: {I’m Alice!N B -1} K
Clock: local clock
T: timestamp at Trent
Trang 49Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
Outline
Key channel for symmetric cryptosystems 2
Cryptography-related concepts 1
Public-key cryptosystems 7
Protocol “message authentication”
5
Perfect encryption 3
Dolev-Yao threat model 4
Protocol “challenge-response”
6
Trang 51Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols
Public-key Cryptosystems
1 Alice sends to Trent: Alice, Bob
2 Trent sends to Alice: {K B , Bob} K -1
T
3 Alice verifies Trent’s signature, creates N A at random and sends to Bob: {N A , Alice} KB
4 Bob decrypts, checks Alice’s ID and sends to Trent: Bob, Alice
5 Trent sends to Bob: {K A , Alice} K -1 T
6 Bob verifies Trent’s signature, creates
N B and sends to Alice: {N A , N B } KA
7 Alice decrypts and sends to Bob:
3
4 5 6
7
Trang 52Public-key Cryptosystems
Found after 17 years
Result: Bob thinks he is sharing secrets N A , N B with Alice
while actually sharing them with Malice
Method: Malice makes use of Alice as she is trying to
establish a connection with him (Alice provides an oracle service)
Trang 53Ho Chi Minh City University of Technology
Faculty of Computer Science and Engineering
Information Systems Security Chapter 2: Cryptography & Key Exchange Protocols