Computer Security and Cryptography A Simple Presentation
Computer Security and Cryptography A Simple Presentation
Virus ?
Firewalls ?
Hacker ?
●
Confidentiality
Ensuring that information is accessible only to those authorized to have access" (ISO definition excerpt)
● Integrity
● Availability
Means that the information, the computing systems used to process the information, and the security
controls used to protect the information are all available and functioning correctly when the information is
needed.
Availability
Integrity
Confidentiality
Cryptographic Techniques
Simple? Yes!
but I am in the details
This device was used around 3rd century BC
This machine, used in World War II, uses as its base the XOR cipher
For example, the string "Wiki" (01010111 01101001 01101011 01101001 in
8-bit ASCII) can be encrypted with the key 11110011 using this method as
follows:
encrypt decrypt
Symmetric-key algorithms can be divided into stream ciphers and block ciphers. Stream ciphers encrypt the bits
of the message one at a time, and block ciphers take a number of bits
Advanced Encryption Standard (AES): This is the next version of DES and is a 128-bit block cipher employing a 128-, 192-, or 256-bit key
Other schemes -Twofish, Serpent, AES (aka Rijndael), Blowfish, CAST5, RC4, TDES, and IDEA.
encrypt decrypt
Note - The mathematical "trick" in PKC is to find a trap door in the one-way function so that the inverse calculation
becomes easy given knowledge of some item of information.
Bob’s Bob’s
Public Private
key key
(144) (9,16)
Alice writes secret message to Bob & encrypts with Bob’s public
key and gives to mutual friend Dave to deliver to Bob
Curious boy Dave tries to read the letter using Bobs public key –
He can’t
Bob’s Bob’s
Public key Private
key
Bob writes message to Alice & encrypts with Bob’s private key
Hi ! Bob ? Can
you give me
your public
Hi key
Bob
177
Hi !
Contd…
Then Dave sends a message to Alice “Hi Alice – Our Date is off, too busy – Bob”
Then Dave meets Alice and asks her for a date
1
Verisign
4 +
=
Certified by
Verisign
Verisign Private
Key
More details at How SSL Works also see browser settings for safe browsing
▪ Establish identity: Associate, or bind, a public key to an individual, organization, corporate position, or other entity.
▪ Assign authority: Establish what actions the holder may or may not take based upon this certificate.
▪ Secure confidential information (e.g., encrypting the session's symmetric key for data confidentiality).
Typically, a certificate contains a public key, a name, an expiration date, the name of the authority that issued the certificate
The public key is transmitted as part of a certificate. The digital certificate is used to ensure that the submitted
public key is, in fact, the public key that belongs to the submitter. The client checks that the certificate has
been digitally signed by a certification authority (CA) that the client explicitly trusts.
A CA is a trusted authority that verifies the validity of the combination of entity name and public key in a certificate.
PGP Web of Trust
Is a widely used private e-mail scheme based on public key methods. A PGP user maintains a local key ring of all their known and trusted public keys.
The user makes their own determination about the trustworthiness of a key using what is called a "web of trust.“
If Alice needs Bob's public key, Alice can ask Bob for it in another e-mail or, in many cases, download the public key from an advertised server; this
server might be a well-known PGP key repository or a site that Bob maintains himself. Alice is prepared to believe that Bob's public key, as stored at these locations, is
valid.
Kerberos
Kerberos is a commonly used authentication scheme on the Internet . Kerberos employs a client/server architecture and provides user-to-server
authentication rather than host-to-host authentication. In this model, security and authentication will be based on secret key technology where every host on the network
has its own secret key.
RSA: Invented by Ronald Rivest, Adi Shamir, and Leonard Adleman of MIT.
RSA uses a variable size encryption block and a variable size key The key-pair is derived from a very large number, n, that is the
product of two prime numbers chosen according to special rules; these primes may be 100 or more digits in length each, yielding an
n with roughly twice as many digits as the prime factors. The public key information includes n and a derivative of one of the
factors of n; an attacker cannot determine the prime factors of n (and, therefore, the private key) from this information alone and
that is what makes the RSA algorithm so secure.
Diffie-Hellman: After the RSA algorithm was published, Diffie and Hellman came up with their own
algorithm. D-H is used for secret-key key exchange only, and not for authentication or digital signatures.
Popular Algorithms
Message Digest (MD) algorithms:MD2, MD4, MD5 A series of byte-oriented algorithms that produce a 128-bit hash
value from an arbitrary-length message.
Secure Hash Algorithm (SHA):. SHA-1 produces a 160-bit hash value
Hash algorithms are typically used to provide a digital fingerprint of a file's contents, often used to ensure that the file has not been altered
by an intruder or virus.
Compare
Compare calculated and received tokens
encryption
(xor-ing the instructions with the key)
Antivirus Scanner
Technology of granular execution control, backed by strong cryptographic digital signatures, will go a
long way toward increasing the security of our systems in general.
A functioning granular execution control the LoveLetter virus would not have spread, because a piece of code would not have
been allowed to send out hundreds of copies of itself in electronic mail.
Similarly, a Win32 Trojan horse arriving at a victim's system would fail to install, since a random program signed by a stranger, or not signed
at all, would not be allowed to alter the registry, or install itself in the TCP/IP stack.
Downloading programs and comparing it with the MD5 values also helps in safeguarding.
Message Digest Cipher (MDC) uses a one-way hash function into a block cipher.
PGP 5.x uses Diffie-Hellman for key management and digital signatures;
Pretty Good Privacy (PGP) IDEA, CAST, or 3DES for message encryption; and MD5 or SHA for computing
the message's hash value.
Secure Sockets Layer (SSL) -Developed by Netscape Communications to RSA is used during negotiation to exchange keys and identify the actual
provide application-independent security and privacy over the Internet. SSL is cryptographic algorithm (DES, IDEA, RC2, RC4, or 3DES) to use for the session.
designed so that protocols such as HTTP, FTP (File Transfer Protocol), and Telnet SSL also uses MD5 for message digests and X.509 public-key certificates.
can operate over it transparently. (Found to be breakable soon after the IETF announced formation of group to
work on TLS.)
Transport Layer Security (TLS) -IETF specification (RFC 2246) intended to Employs Triple-DES (secret key cryptography), SHA (hash), Diffie-Hellman (key
replace SSL. exchange), and DSS (digital signatures).
X.509 TU-T recommendation for the format of certificates for the public key
infrastructure. Certificates map (bind) a user identity to a public key. The IETF
application of X.509 certificates is documented in RFC 2459.
Secure Shell or SSH is a network protocol that allows data to be exchanged over Uses Diffie-Hellman key exchange and strong integrity checking via message
a secure channel between two computers. Encryption provides confidentiality and authentication codes. (something like a hash function)
integrity of data. SSH uses public-key cryptography to authenticate the remote
computer and allow the remote computer to authenticate the user, if necessary.