Computer Security and Cryptography A simple Presentation

Published on February 2017 | Categories: Documents | Downloads: 22 | Comments: 0 | Views: 135
of 22
Download PDF   Embed   Report

Comments

Content

Computer Security and Cryptography A very simple presentation : ) Alex.C.P

10/01/10

Technical presentation - Alex.C.P

1

Computer Security

Virus ? Firewalls ? Hacker ?
10/01/10 Technical presentation - Alex.C.P 2

Computer Security
Concerns itself with


Confidentiality

Ensuring that information is accessible only to those authorized to have access" (ISO definition excerpt)



Integrity

It is the accuracy, consistency and reliability of the information content



Availability

Means that the information, the computing systems used to process the information, and the security controls used to protect the information are all available and functioning correctly when the information is needed.

10/01/10

Technical presentation - Alex.C.P

3

The Role of Cryptography
in Computer Security
Availability

Confidentiality

Integrity

Cryptographic Techniques
10/01/10 Technical presentation - Alex.C.P 4

Cryptography The Basics
A two step process
Simple? Yes! but I am in the details

10/01/10

Technical presentation - Alex.C.P

5

Cryptography History
Cryptography or cryptology; derived from Greek kryptós "hidden," and the verb gráfo "write" or λεγειν legein "to speak")

 

This device was used around 3rd century BC

                            

An ancient greek scytale (3rd BC)

This machine, used in World War II, uses as its base the XOR cipher For example, the string "Wiki" (01010111 01101001 01101011 01101001 in 8-bit ASCII) can be encrypted with the key 11110011 using this method as follows:

The German Lorenz cipher machine (1940’s)
10/01/10 Technical presentation - Alex.C.P 6

Cryptography - Types of algorithms

10/01/10

Technical presentation - Alex.C.P

7

Cryptography – Secret Key Cryptography

encrypt

decrypt

Symmetric-key algorithms can be divided into stream ciphers and block ciphers. Stream ciphers encrypt the bits of the message one at a time, and block ciphers take a number of bits

Popular SKC schemes
Data Encryption Standard (DES): The most common SKC scheme used today, DES was designed by IBM in the 1970s and adopted by the National Bureau of
Standards (NBS) in 1977 for commercial and unclassified government applications. DES is a block-cipher employing a 56-bit key that operates on 64-bit blocks.

Advanced Encryption Standard (AES): This is the next version of DES and is a 128-bit block cipher employing a 128-, 192-, or 256-bit key Other schemes -Twofish, Serpent, AES (aka Rijndael), Blowfish, CAST5, RC4, TDES, and IDEA.

10/01/10

Technical presentation - Alex.C.P

8

Cryptography – Public Key Cryptography

encrypt

decrypt

PKC depends upon the existence of so-called one-way functions •Multiplication vs. Factorization 9*16= 144 (can be calculated extremely fast) But from 144 (2*2*2*2*3*9) it takes more time and effort to guess the correct key (9&16) •Exponentiation vs. logarithms 3^6 (3 raised to 6) = 729 But the solution to logx 729

=y

is non trivial ( note x= 3, y =6)

Note - The mathematical "trick" in PKC is to find a trap door in the one-way function so that the inverse calculation
becomes easy given knowledge of some item of information.

10/01/10

Technical presentation - Alex.C.P

9

Cryptography – Public Key Cryptography Contd

Bob’s Public key (144)
Alice writes secret message to Bob & encrypts with Bob’s public key and gives to mutual friend Dave to deliver to Bob

Bob’s Private key (9,16)

Curious boy Dave tries to read the letter using Bobs public key – He can’t

Bob decrypts the letter using his private key

10/01/10

Technical presentation - Alex.C.P

10

Cryptography: Ensuring Identity -Digital Signature

Bob’s Public key Bob writes message to Alice & encrypts with Bob’s private key

Bob’s Private key

Alice uses Bob’s public key to decrypt it. If it gets decrypted it means message is from Bob

10/01/10

Technical presentation - Alex.C.P

11

Role of Trust
Secure use of cryptography requires trust.
Hi ! Hi Bob

Bob ? Can you give me your public key

177

Hi !



Impersonator Dave tricks Alice into believing that she has Bob Key – Read on to see what Dave can do next --

Contd… Then Dave sends a message to Alice “Hi Alice – Our Date is off, too busy – Bob” Then Dave meets Alice and asks her for a date

10/01/10

Technical presentation - Alex.C.P

12

Role of Trust
Digital Certificate
Hi , Here is my Public Key and my name is Bob can you certify it pls

Ok, Can you prove your ID

2 1
Verisign

3 Bob Shows his Driving License

4
Certified by Verisign

+
Verisign Private Key

=

10/01/10

Technical presentation - Alex.C.P

13

Cryptography against Hackers
SSL, the e-commerce trust engine SSL does two things: • First, it encrypts the communication between client and server, so there
is no use in tapping the line and wait for the user to type in his secret password. But - how can the user know that the web site, which asks him to type in his secret password actually belongs to you and isn't an imitation meant to seduce him to disclose his password? That's where the other purpose of SSL comes into play.

• The certificate, which is installed on the server in order to enable SSL is supposed to be signed by a neutral 3rd party who vouches for your identity
More details at How SSL Works also see browser settings for safe browsing

10/01/10

Technical presentation - Alex.C.P

14

Trust Models used by cryptographic schemes
Public Key Certificates and Certificate Authorities
Widely used in e-commerce applications. For purposes of electronic transactions, certificates are digital documents. The specific functions of the certificate include:
▪ ▪ ▪
Establish identity: Associate, or bind, a public key to an individual, organization, corporate position, or other entity. Assign authority: Establish what actions the holder may or may not take based upon this certificate. Secure confidential information (e.g., encrypting the session's symmetric key for data confidentiality).

Typically, a certificate contains a public key, a name, an expiration date, the name of the authority that issued the certificate The public key is transmitted as part of a certificate. The digital certificate is used to ensure that the submitted public key is, in fact, the public key that belongs to the submitter. The client checks that the certificate has been digitally signed by a certification authority (CA) that the client explicitly trusts. A CA is a trusted authority that verifies the validity of the combination of entity name and public key in a certificate.
PGP Web of Trust Is a widely used private e-mail scheme based on public key methods. A PGP user maintains a local key ring of all their known and trusted public keys. The user makes their own determination about the trustworthiness of a key using what is called a "web of trust.“ If Alice needs Bob's public key, Alice can ask Bob for it in another e-mail or, in many cases, download the public key from an advertised server; this server might be a well-known PGP key repository or a site that Bob maintains himself. Alice is prepared to believe that Bob's public key, as stored at these locations, is valid. Kerberos Kerberos is a commonly used authentication scheme on the Internet . Kerberos employs a client/server architecture and provides user-to-server authentication rather than host-to-host authentication. In this model, security and authentication will be based on secret key technology where every host on the network has its own secret key.

10/01/10

Technical presentation - Alex.C.P

15

Cryptography – Enabling Confidentiality
Confidentiality

Confidentiality is the most common use of cryptographic algorithms – protecting
data from prying eyes while in transit over an insecure communications channel like the Internet.
Once the sender has encrypted the message with the recipient's public key no one (not even the sender) can decrypt it without access to the recipient's private key.

Popular PKA Algorithms
RSA: Invented by Ronald Rivest, Adi Shamir, and Leonard Adleman of MIT.
RSA uses a variable size encryption block and a variable size key The key-pair is derived from a very large number, n, that is the product of two prime numbers chosen according to special rules; these primes may be 100 or more digits in length each, yielding an n with roughly twice as many digits as the prime factors. The public key information includes n and a derivative of one of the factors of n; an attacker cannot determine the prime factors of n (and, therefore, the private key) from this information alone and that is what makes the RSA algorithm so secure.

Diffie-Hellman: After the RSA algorithm was published, Diffie and Hellman came up with their own
algorithm. D-H is used for secret-key key exchange only, and not for authentication or digital signatures.

10/01/10

Technical presentation - Alex.C.P

16

Cryptography- Ensuring Integrity
Ensuring Integrity is the second most common use of cryptographic algorithms – ensuring that the data
Integrity transmitted between two parties is not tampered with intentionally or unintentionally.

Popular Algorithms Message Digest (MD) algorithms:MD2, MD4, MD5 A series of byte-oriented algorithms that produce a 128-bit hash value from an arbitrary-length message. Secure Hash Algorithm (SHA):. SHA-1 produces a 160-bit hash value

10/01/10

Technical presentation - Alex.C.P

17

Cryptography – Hash function Cryptography

Hash algorithms are typically used to provide a digital fingerprint of a file's contents, often used to ensure that the file has not been altered by an intruder or virus.

Compute hash token

Send Msg + token to Bob

Compare
Compare calculated and received tokens

Bob computes token again from Msg

10/01/10

Technical presentation - Alex.C.P

18

Computer Virus & Cryptography
encryption
(xor-ing the instructions with the key)

10/01/10

Antivirus Scanner

Technical presentation - Alex.C.P

19

Cryptography against Virus
Technology of granular execution control, backed by strong cryptographic digital signatures, will go a long way toward increasing the security of our systems in general.
LoveLetter virus (LOVE-LETTER-FOR-YOU.vbs) A functioning granular execution control the LoveLetter virus would not have spread, because a piece of code would not have been allowed to send out hundreds of copies of itself in electronic mail.  Similarly, a Win32 Trojan horse arriving at a victim's system would fail to install, since a random program signed by a stranger, or not signed at all, would not be allowed to alter the registry, or install itself in the TCP/IP stack.  Downloading programs and comparing it with the MD5 values also helps in safeguarding.

10/01/10

Technical presentation - Alex.C.P

20

Wrap up of popular algorithms
IP Security Protocol (IPsec) (Psec was first proposed for use with IP version 6 (IPv6), but can also be employed with the current IP version, IPv4. ) Kerberos -A secret-key encryption and authentication system, designed to authenticate requests for network resources within a user domain rather than to authenticate messages. Kerberos also uses a trusted third-party approach; a client communications with the Kerberos server to obtain "credentials" so that it may access services at the application server Message Digest Cipher (MDC) Pretty Good Privacy (PGP) This is actually a bunch of RFC’s written in order to overcome the security limitations of IPv4 uses DES to generate keys and encrypt message

uses a one-way hash function into a block cipher. PGP 5.x uses Diffie-Hellman for key management and digital signatures; IDEA, CAST, or 3DES for message encryption; and MD5 or SHA for computing the message's hash value. An extension to HTTP to provide secure exchange of documents over the World Wide Web. Supported algorithms include RSA and Kerberos for key exchange, DES for encryption RSA is used during negotiation to exchange keys and identify the actual cryptographic algorithm (DES, IDEA, RC2, RC4, or 3DES) to use for the session. SSL also uses MD5 for message digests and X.509 public-key certificates. (Found to be breakable soon after the IETF announced formation of group to work on TLS.) Employs Triple-DES (secret key cryptography), SHA (hash), Diffie-Hellman (key exchange), and DSS (digital signatures). TU-T recommendation for the format of certificates for the public key infrastructure. Certificates map (bind) a user identity to a public key. The IETF application of X.509 certificates is documented in RFC 2459. Uses Diffie-Hellman key exchange and strong integrity checking via message authentication codes. (something like a hash function)

Secure Hypertext Transfer Protocol (S-HTTP) Secure Sockets Layer (SSL) -Developed by Netscape Communications to provide application-independent security and privacy over the Internet. SSL is designed so that protocols such as HTTP, FTP (File Transfer Protocol), and Telnet can operate over it transparently.

Transport Layer Security (TLS) -IETF specification (RFC 2246) intended to replace SSL. X.509

Secure Shell or SSH is a network protocol that allows data to be exchanged over a secure channel between two computers. Encryption provides confidentiality and integrity of data. SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary.

10/01/10

Technical presentation - Alex.C.P

21

References
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13.
An Overview of Cryptography-http://www.garykessler.net/library/crypto.html#dhmath Wikipedia -http://en.wikipedia.org/wiki/Main_Page Cryptography basics for infosecurity managers-http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci936670,00.html DAME -http://ftp.fortunaty.net/text/textfiles/virus/datut006.txt Can Cryptography Prevent Computer Viruses? -http://www.research.ibm.com/antivirus/SciPapers/VB2000JFM.htm The History of Computer Viruses -http://www.virus-scan-software.com/virus-scan-help/answers/the-history-of-computer-viruses.shtml Linux vs. Windows Viruses -http://www.theregister.co.uk/2003/10/06/linux_vs_windows_viruses/ How SSL works -https://www.securetrust.com/resources/how-ssl-works How SSL works - http://www.askdavetaylor.com/how_does_ssl_work.html Cryptography Law Survey (in difft countries)- http://rechten.uvt.nl/koops/cryptolaw/ Digital Signature Law Survey -https://dsls.rechten.uvt.nl/ Practical Quantum Cryptography - http://www.youtube.com/watch?v=CKkqUR7FY0o&feature=related Emerging Security Vulnerabilities & the Impact to Business -http://www.youtube.com/watch?v=QTfFCr4G0qA

10/01/10

Technical presentation - Alex.C.P

22

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close