W7-Encryption Fundamentals. Mis
W7-Encryption Fundamentals. Mis
Secure Communication
Confidentiality
Authentication
Message Integrity
Anti-Replay Protection
Client PC with Server with
Cryptographic Cryptographic
System System
Software Provided Software
Automatically
Confidentiality: Protection against eavesdroppers understanding intercepted messages
Authentication: Assurance that senders are who they claim to be
Message Integrity: Assurance that the message has not been changed on route
Anti-Replay Protection: Assurance that if an attacker captures a message and transmit it again later;
the receiver will not accept the message 2
Terminology IS
3
Terminology IS
Different keys produce different ciphertext from the same plaintext even when the same method is used
Encryption Note:
Key Interceptor Cannot Read
Ciphertext Without the
Decryption Key
Plaintext Encryption Ciphertext “11011101”
“Hello” Method &
Key Interceptor
Network
Decryption
Key
Party B 4
Cryptographic Algorithms-1 IS
Examples: Data Encryption Standard (DES), Triple DES (3DES), Advanced Encryption
Standard (AES)
5
Cryptographic Algorithms-2 IS
– Uses two different but related keys; either key can encrypt or decrypt message
6
Symmetric Encryption IS
Symmetric Note:
Key A single key is used to
encrypt and decrypt
in both directions.
Plaintext Encryption Ciphertext “11011101”
“Hello” Method &
Key Interceptor
Network Same
Symmetric
Key
Party B
7
Asymmetric (Public Key) Encryption IS
Encrypted
Encrypt with Decrypt with
Message
Party B’s Public Key Party B’s Private Key
Party A Party B
Decrypt with Encrypt with
Party A’s Private Key Encrypted Party A’s Public Key
Message
8
Key Length and Number of Possible Keys-1 IS
Key Length
Number of Possible Keys
in Bits
1 2
2 4
4 16
8 256
16 65,536
40 1,099,511,627,776
56 72,057,594,037,927,900
112 5,192,296,858,534,830,000,000,000,000,000,000
9
Key Length and Number of Possible Keys-2 IS
Key Length
Number of Possible Keys
in Bits
112 5.1923E+33
168 3.74144E+50
256 1.15792E+77
512 1.3408E+154
Shaded keys, with lengths of more than 100 bits, are considered strong symmetric keys today.
Unshaded keys, with lengths of less than 100 bits, are considered weak symmetric keys today.
Public key/private key pairs must be much longer to be strong because of the disastrous
consequences of learning someone’s private key and because private keys cannot be changed
rapidly.
10
Strong Keys for Symmetric and Public Key Encryption
IS
• Hashing is repeatable
If two parties apply the same hashing method to the same bit string, they
will get the same hash
12
Encryption vs Hashing IS
Encryption Hashing
Output is of a fixed
Length of Output is similar in
short length,
Result length to input
regardless of input
13
Digital Signature-1 IS
14
Digital Signature-2 IS
DS Plaintext
4. Encrypted with
Session Key
Sender Receiver
15
Digital Signature-3 IS
16
Certificate Authority (CA) IS
A certificate authority (CA), is a company or organization that acts to validate the
identities of entities (such as websites, email addresses, companies, or individual
persons) and bind them to cryptographic keys through the issuance of electronic
documents known as digital certificates.
17
Certificate Authority (CA) IS
18
Public Key Distribution for Symmetric Session Keys
IS
1. Create
Symmetric
Session Key
Party A Party B
19
Public Key Distribution for Symmetric Session Keys
IS
Party A Party B