1 20 January 2006 Cryptographic Tools • Three basic tools are used – Encryption is used to provide confidentiality – Digital signatures are used to provide authentication, integrity protection, and non- repudiation – Checksums/hash algorithms are used to provide integrity protection • However, if the underlying system is unsecure, no amount of cryptography will help.
25
Embed
120 January 2006 Cryptographic Tools Three basic tools are used – Encryption is used to provide confidentiality – Digital signatures are used to provide.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
1 20 January 2006
Cryptographic Tools• Three basic tools are used
– Encryption is used to provide confidentiality
– Digital signatures are used to provide authentication, integrity protection, and non-repudiation
– Checksums/hash algorithms are used to provide integrity protection
• However, if the underlying system is unsecure, no amount of cryptography will help.
2 20 January 2006
Cryptographic Keys• A long series of binary digits used in various ways to transform a message
from its original form, into a stream of seemingly random numbers, and back again.
• The strength of a key is roughly based upon the number of bits it has – known as its “length”.
–Here, strength is used to mean how long it would take an attacker to guess the key used to transform or obscure a message.
–This is similar to how the number of teeth in your house key determines the total number of keys there are and, thus, how many keys a burglar might have to try before guessing yours.
3 20 January 2006
In Encryption, Most Folks Say “Key Size Matters!”
• In general, the longer the secret key, the harder it will be for an adversary to guess the key’s value and decrypt the secret.
• It’s the same as the “teeth” on your house key– The more teeth your house key has, the longer it would
take for persistent criminal to cut various combinations of teeth into test keys in order to find yours.
– e.g., a house key with 8 teeth, each having 3 cut positions, yields 6,500 different keys
4 20 January 2006
Unfortunately, It’s Not That Simple
• Key size gets way too much attention, but it’s the easiest metric• So far, encryption failures have always been due to
• a.k.a. “I know more than all the world’s cryptographers”
6 20 January 2006
Would You Buy This?
Our unbreakable military-grade 10,240-bit bi-Gaussian encryption system, using a proprietary one-time pad algorithm, has recently been reviewed by the NSA and approved by a Fortune 500 customer and is available both inside and outside of the US.
Adapted from Peter Gutman’s crypto tutorial: http://www.cryptoapps.com/~peter/part6.pdf
7 20 January 2006
In Summary
If you take away anything from this part of today’s talk, it should be these 3 rules:
1. Cryptography is indeed rocket science.2. Proprietary cryptography must be assumed to be
broken, by definition3. Adding cryptography to an unsecure system is like
putting steel doors on a grass hut.
Auguste Kerckhoffs, ‘La cryptographie militaire’, 1883
1. The system must be substantially, if not mathematically, undecipherable;2. The system must not require secrecy and can be stolen by the enemy
without causing trouble;3. It must be easy to communicate and remember the keys without
requiring written notes, it must also be easy to change or modify the keys with different participants;
4. The system ought to be compatible with telegraph communication;5. The system must be portable, and its use must not require more than
one person;6. Finally, regarding the circumstances in which such system is applied, it
must be easy to use and must neither require stress of mind nor the knowledge of a long series of rules.
8
Monoalphabetic substitution cipher #1
• Pick some number of position to rotate the plaintext alphabet. Here, we use rot13 : Ac: NOPQRSTUVWXYZABCDEFGHIJKLM
• Then use Ac to encipher the plaintext P:Ap: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Ac: NOPQRSTUVWXYZABCDEFGHIJKLM
P: dont forget your towel
C: qbag sbetrg lbhe gbjry
9
Monoalphabetic substitution cipher #2
• Pick a keyword to initialize the ciphertext alphabet:Ac: CRYPTOISEZ ABDFGHJKLMNQUVWX
• Then use Ac to encipher the plaintext P:Ap: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Ac: CRYPTOISEZABDFGHJKLMNQUVWX
M: dont forget your towel
C: pgfm ogkitm wgnk mgutb
10
Polyalphabetic Substitution Cipher:
Vigenère Cipher
This is the Vignere Square, or Tabula Recta.
P =SAMBRADFORD
KEY=HEISMANHEIS
C= ZEUTDAQMSZV
11
Transposition cipher:Columnar transposition
THISISATESTOFTHEEARLYWARNINGSYSTEM
Becomes
TEENE HSAIM ITRNSOLGIF YSSTW YAHASTERT
12
ROTOR Machines
• Variation of Vigenère• Series of rotors each with an arbitrary
permutation of the alphabet.• Output of one rotor connected to inputs of
next
13
Rotor machines:ENIGMA
After the A is encrypted as a G, the rightmost rotor is advanced one position.
Then another A is encrypted, but this time as a C.
The breaking of the ENIGMA code is said to have ended the European war by two years (WWII).