cryptography & network security...
TRANSCRIPT
![Page 1: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/1.jpg)
Cryptography & Network Security
Introduction
CR
Introduction
Chester Rebeiro
IIT Madras
![Page 2: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/2.jpg)
The Connected World
CR 2
![Page 3: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/3.jpg)
Information Storage
CR 3
![Page 4: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/4.jpg)
Increased Security Breaches
CR
81% more in 2015
http://www.pwc.co.uk/assets/pdf/2015-isbs-executive-summary-02.pdf 4
![Page 5: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/5.jpg)
Security Threats
(why difficult to prevent?)Networks / Communication links
Hardware
System Software
CR
Attackers need to target the weakest link in the chain
Peripherals
System Software
(Operating Systems / Hypervisor)
Applications
5
![Page 6: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/6.jpg)
Security Studies (Research)
(an ocean)Networks / Communication links
Hardware
System Software
Network Security
Hardware Security
System Security
CRPeripherals
System Software
(Operating Systems / Hypervisor)
Applications
System Security
OS Security
Cloud Security
Web Security
DBMS Security
Embedded Security
Cryptography
6
![Page 7: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/7.jpg)
Cryptography
• A crucial component in all security systems
• Fundamental component to achieve
– Confidentiality
CR
Allows only authorized users access to data
7
![Page 8: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/8.jpg)
Cryptography
(its use)
• A crucial component in all security systems
• Fundamental component to achieve
– Confidentiality
– Data Integrity
CR
– Data Integrity
Cryptography can be used to ensure that only
authorized users can make modifications
(for instance to a bank account number)
8
![Page 9: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/9.jpg)
Cryptography
(its use)
• A crucial component in all security systems
• Fundamental component to achieve
– Confidentiality
– Data Integrity
CR
– Data Integrity
– Authentication
Cryptography helps prove identities
9
![Page 10: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/10.jpg)
Cryptography
(its use)
• A crucial component in all security systems
• Fundamental component to achieve
– Confidentiality
– Data Integrity
I did not
send that
CR
– Data Integrity
– Authentication
– Non-repudiation
The sender of a message cannot
claim that she did not send it
send that
10
![Page 11: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/11.jpg)
Scheme for Confidentiality
Alice Bob
message
Attack at Dawn!!
untrusted communication link
CR
Attack at Dawn!!
MalloryProblem : Alice wants to send a message
to Bob (and only to Bob) through an untrusted
communication link
11
![Page 12: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/12.jpg)
Encryption
Alice Bob
message
untrusted communication linkE D
KE KD
“Attack at Dawn!!”encryption decryption
#%AR3Xf34^$
(ciphertext)
CR
message
“Attack at Dawn!!”
Mallory
Secrets
• Only Alice knows the encryption key KE
• Only Bob knows the decryption key KD Only sees ciphertext.
cannot get the plaintext message
because she does not know the keys12
![Page 13: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/13.jpg)
Encryption Algorithms
Alice Bobuntrusted communication linkE D
KE KD
“Attack at Dawn!!”encryption decryption
#%AR3Xf34($
(ciphertext)
CR
• Should be easy to compute for Alice / Bob (who know the key)
• Should be difficult to compute for Mallory (who does not know the key)
• What is ‘difficult’?
• Ideal case : Prove that the probability of Mallory determining the encryption / decryption key is no better than a random guess
• Computationally : Show that it is difficult for Mallory to determine the keys even if she has massive computational power
13
![Page 14: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/14.jpg)
Algorithmic Attacks
• Can Mallory use tricks to break the algorithm
CR
• There by reducing the ‘difficulty’ of getting the
key.
14
E
![Page 15: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/15.jpg)
Encryption Keys
Alice Bobuntrusted communication linkE D
KE KD
“Attack at Dawn!!”encryption decryption
#%AR3Xf34($
(ciphertext)
CR
• How are keys managed
– How does Alice & Bob select the keys?
– Need algorithms for key exchange
15
![Page 16: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/16.jpg)
Ciphers
• Symmetric Algorithms– Encryption and Decryption use the same key
– i.e. KE = KD
– Examples:• Block Ciphers : DES, AES, PRESENT, etc.
• Stream Ciphers : A5, Grain, etc.
CR
• Stream Ciphers : A5, Grain, etc.
• Asymmetric Algorithms– Encryption and Decryption keys are different
– KE ≠ KD
– Examples: • RSA
• ECC
16
![Page 17: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/17.jpg)
Cipher Implementations
Cryptography is always an overhead !!
• For security, the algorithms need to be computation intensive.
CR
intensive.
• Often require large numbers, complex mathematical operations.
• Design Challenges: Performance, Size, Power.
• Algorithms to achieve this
17
![Page 18: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/18.jpg)
Encryption Devices
Alice Bob
message
untrusted communication linkE D
KE KD
“Attack at Dawn!!”
encryption decryption#%AR3Xf34($
(ciphertext)
CR
message
“Attack at Dawn!!”
Mallory
Side Channels
Eg. Power consumption / radiation
of device, execution time, etc. Gets information about the keys by monitoring
Side channels of the device
18
![Page 19: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/19.jpg)
Side Channel Analysis
Alice
message
E
00111
encryption
CR 19
Radiation from
Device
0 1 1 1Secret information 0 1
message
“Attack at Dawn!!”
![Page 20: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/20.jpg)
Ciphers Design Challenges
We want crypto algorithms to be fast and small
Tradeoffs between Security , Speed, Side-Channel Attacks
CR
For security, the algorithms are
computationally intensive.
Typically use large numbers,
complex operations
Need to protect against side
channel attacks.
![Page 21: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/21.jpg)
Cryptography Study
• Mathematics + Engineering Mathematics Electrical Engg.
CRComputer Sc.
cryptography
21
Physics
![Page 22: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/22.jpg)
Some Hot Research Trends
light weight cryptographypost-quantum cryptography
efficient implementations
cryptanalysis privacy enhancing security
CR 22
light weight cryptographypost-quantum cryptography
Leakage resilient cryptography
side channel analysis
cloud security
homomorphic encryption
![Page 23: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/23.jpg)
The Plan Ahead
• How are ciphers designed?– Ideal security vs Computational security
– Block ciphers / Stream ciphers
– Asymmetric key ciphers
– Trade offs between security and implementation
CR
– Trade offs between security and implementation
• Attacks– Algorithmic / Side Channel Analysis
• Applications– How are they used to achieve confidentiality, integrity,
authentication, non-repudiation
• Case Studies– Network security aspects, Bitcoins
23
![Page 24: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/24.jpg)
Course Structure
• Classical Cryptography
• Shannon’s Theory
• Block Ciphers– DES, AES, their implementations and their attacks
• Stream Ciphers
CR
Stream Ciphers
• Digital Signatures and Authentication– Hash functions
• Public key ciphers– RSA, implementations, and attacks
• Side channel analysis
• Network Security aspects
• Case Studies : Bitcoins
24
![Page 25: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/25.jpg)
Expected Learning Outcomes
• What you would learn by the end of the course
� Distinguish between cipher algorithms
- Where to use what algorithm?
� Evaluate ciphers and their implementations for security
CR 25
� Evaluate ciphers and their implementations for security
- Mathematical cryptanalysis of some algorithms
- Side channel based attacks on cipher implementations
� Apply algorithms to solve security problems in networks and real-world systems
![Page 26: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/26.jpg)
Books / References
Textbooks
(STINSON) ''Cryptography: Theory and Practice", Third Edition, by Douglas R.
Stinson, CRC Press, Taylor and Francis Group
References
CR 26
References
(STALLINGS) ''Cryptography and Network Security: Principles and Practices'',
Sixth Edition, by William Stallings
(HANDBOOK) ''Handbook of Applied Cryptography'', Fifth Printing, by Alfred J.
Menezes, Paul C. van Oorschot, and Scott A. Vanstone, CRC Press
(HARDSEC) ''Hardware Security : Design, Threats, and Safeguards", by
Debdeep Mukhopadhyay and Rajat Subhra Chakraborty, CRC Press, Taylor
and Francis Group
![Page 27: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/27.jpg)
Grading
• Quiz 1 : 20%
• Quiz 2 : 20%
• End semester : 40%
• Assignments : 20%
CR
• Assignments : 20%
– Surprise tests / Tutorials / Programming assignments /
minute papers / Google groups / etc.
27
Self Study vs Attending Classes
• Same tutorials / assignments / quizzes / etc.
• Grading policy is different
![Page 28: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/28.jpg)
Course Webpages
• For slides / syllabus / schedule etc.
• For discussions / announcements / submissions
http://www.cse.iitm.ac.in/~chester/courses/16e_cns/index.html
CR
• For discussions / announcements / submissions
CSE Moodle
Google Groups (cnsiitm_2016)
28
![Page 29: Cryptography & Network Security Introductioncse.iitm.ac.in/~chester/courses/16e_cns/slides/01... · 2016. 1. 12. · (STINSON) ''Cryptography: Theory and Practice", Third Edition,](https://reader036.vdocument.in/reader036/viewer/2022071611/614a6ebb12c9616cbc696978/html5/thumbnails/29.jpg)
Logistics
• CS26
• Time:
– Tuesdays : 11:00 - 11:50 AM
– Wednesdays : 10:00 - 10:50 AM
CR
– Wednesdays : 10:00 - 10:50 AM
– Thursdays : 8:00 - 8:50 AM
– Fridays : 2:00 – 2:50 PM
29