NS 4
NS 4
An Introduction
Sender
Raymond R. Panko
Time Required For Decryption
Key Size (bits) Number of Alternative Keys Time required at 1 decryption
Raymond R. Panko
3.1.2 Kerckhoffs’ Principle
• Auguste Kerckhoffs published a paper in 1883
stating that the only secrecy involved with a
cryptography system should be the key. He
claimed that the algorithm should be publicly
known.
• He asserted that if security were based on too
many secrets, there would be more
vulnerabilities to possibly exploit
Remarks on Kerckhoff’s principle
• Cryptographers in the private and academic
sectors agree with Kerckhoffs’ principle,
– because making an algorithm publicly available means
that many more people can view the source code,
test it, and uncover any type of flaws or weaknesses
• It is the attitude of “many heads are better than
one.”
– Once someone uncovers some type of flaw, the
developer can fix the issue, and provide society with a
much stronger algorithm
Remarks on Kerckhoff’s principle
• But, not everyone agrees with this philosophy.
• Governments around the world create their own
algorithms that are not released to the public.
– Their stance is that if a smaller number of people know
how the algorithm actually works, then a smaller number
of people will know how to possibly break it
• Cryptographers in the private sector do not agree with
this practice and do not trust algorithms they cannot
examine
• It is basically the same as the open-source versus
compiled software debate that is in full force today.
The Strength of the Cryptosystem
• The strength of an encryption method comes
from
– the algorithm, the secrecy of the key, the length of
the key, the initialization vectors, and
– how they all work together within the
cryptosystem.
• When strength is discussed in encryption,
– it refers to how hard it is to figure out the
algorithm or key, whichever is not made public.
The Strength of the Cryptosystem
• The strength of an encryption method correlates to
the
– amount of necessary processing power,
– resources, and
– time required to break the cryptosystem or
– to figure out the value of the key.
• Breaking a cryptosystem can be accomplished by
– a brute force attack, which means trying every possible
key value until the resulting plaintext is meaningful
• Depending on the algorithm and length of the key,
– this can be an easy task or one that is close to impossible
The Strength of the Cryptosystem
• The goal when designing an encryption
method is to make compromises
– too expensive or too time-consuming
• Another name for cryptography strength is
work factor,
– which is an estimate of the effort and resources it
would take an attacker to penetrate a
cryptosystem
The Strength of the Cryptosystem
• Important elements of encryption are to
– use an algorithm without flaws,
– use a large key size,
– use all possible values within the keyspace,
– and to protect the actual key.
• If one element is weak, it could be the link
that dooms the whole process.
What if I share the key after taking care of all mentioned
points???
Services of Cryptosystems
• Confidentiality
Renders the information unintelligible except by authorized entities
• Integrity
Data has not been altered in an unauthorized manner since it was
created, transmitted, or stored
• Authentication
Verifies the identity of the user or system that created information
• Authorization
Upon proving identity, the individual is then provided with the key or
password that will allow access to some resource
• Nonrepudiation
Ensures that the sender cannot deny sending the message.
If David sends a message and then later
claims he did not send it, this is an act of
repudiation.
When a cryptography mechanism
provides nonrepudiation, the sender
cannot later deny he sent the message.
(He can try to deny it, but the
cryptosystem proves otherwise)
Suppose your boss sends you a message
telling you that you will be receiving a raise
that doubles your salary.
•The message is encrypted, so you can be
sure it really came from your boss
(authenticity)
•Someone did not alter it before it arrived at
your computer (integrity)
•No one else was able to read it as it
traveled over the network (confidentiality)
•Your boss cannot deny sending it later
when he comes to his senses
(nonrepudiation)
Services of Cryptosystems
• Military and intelligence agencies are very concerned about
keeping information confidential,
– so they would choose encryption mechanisms that provide a
high degree of secrecy
• Financial institutions care about confidentiality, but they
also care about the integrity of the data being transmitted,
– so the encryption mechanism they would choose may differ
from the military’s encryption methods
• If messages were accepted that had a misplaced decimal
point or zero,
– the ramifications could be far reaching in the financial world
Services of Cryptosystems