Top Banner
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides taken from Dr Lawrie Brown (UNSW@ADFA) for “Computer Security: Principles and Practice”, 1/e, by William Stallings and Lawrie Brown Faisal Karim Shaikh DEWSNet Group Dependable Embedded Wired/Wireless Networks www.fkshaikh.com/dewsnet
26

Computer Security: Principles and Practice

Feb 23, 2016

Download

Documents

Quinto

Computer Security: Principles and Practice. Faisal Karim Shaikh DEWSNet Group Dependable Embedded Wired/Wireless Networks www.fkshaikh.com/dewsnet . - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Computer Security: Principles and Practice

© Neeraj SuriEU-NSF ICT March 2006

DEWSNetDependable Embedded Wired/Wireless Networks

MUET Jamshoro

Computer Security: Principles and Practice

Slides taken from Dr Lawrie Brown (UNSW@ADFA) for “Computer Security: Principles and Practice”, 1/e, by William Stallings and Lawrie Brown

Faisal Karim Shaikh

DEWSNet GroupDependable Embedded Wired/Wireless Networks

www.fkshaikh.com/dewsnet

Page 2: Computer Security: Principles and Practice

Computer Security 2

Cryptographic Tools cryptographic algorithms important element in

security services review various types of elements

symmetric encryption public-key (asymmetric) encryption digital signatures and key management secure hash functions

example is use to encrypt stored data

Page 3: Computer Security: Principles and Practice

Computer Security 3

Some Basic Terminology

plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext to ciphertext key - info used in cipher known only to sender/receiver encipher (encrypt) - converting plaintext to ciphertext decipher (decrypt) - recovering ciphertext from plaintext cryptography - study of encryption principles/methods cryptanalysis (codebreaking) - study of principles/

methods of deciphering ciphertext without knowing key cryptology - field of both cryptography and cryptanalysis

Page 4: Computer Security: Principles and Practice

Computer Security 4

Symmetric Encryption

Page 5: Computer Security: Principles and Practice

Computer Security 5

Attacking Symmetric Encryption

cryptanalysis rely on nature of the algorithm plus some knowledge of plaintext characteristics even some sample plaintext-ciphertext pairs exploits characteristics of algorithm to deduce specific

plaintext or key brute-force attack

try all possible keys on some ciphertext until get an intelligible translation into plaintext

Page 6: Computer Security: Principles and Practice

Computer Security 6

Exhaustive Key Search

Page 7: Computer Security: Principles and Practice

Computer Security 7

Symmetric Encryption Algorithms

Page 8: Computer Security: Principles and Practice

Computer Security 8

DES and Triple-DES

Data Encryption Standard (DES, 1977) is the most widely used encryption scheme uses 64 bit plaintext block and 56 bit key to produce a

64 bit ciphertext block concerns about algorithm & use of 56-bit key

Triple-DES (ANSI standard X9.17 in 1985) repeats basic DES algorithm three times using either two or three unique keys much more secure but also much slower

Page 9: Computer Security: Principles and Practice

Computer Security 9

Advanced Encryption Standard (AES)

needed a better replacement for DES NIST called for proposals in 1997 selected Rijndael in Nov 2001 published as FIPS 197 symmetric block cipher uses 128 bit data & 128/192/256 bit keys now widely available commercially

Page 10: Computer Security: Principles and Practice

Computer Security 10

Block verses Stream Ciphers

Page 11: Computer Security: Principles and Practice

Computer Security 11

Message Authentication

protects against active attacks verifies received message is authentic

contents unaltered from authentic source timely and in correct sequence

can use conventional encryption only sender & receiver have key needed

or separate authentication mechanisms append authentication tag to cleartext message

Page 12: Computer Security: Principles and Practice

Computer Security 12

Message Authentication Codes

Page 13: Computer Security: Principles and Practice

Computer Security 13

Secure Hash Functions

Page 14: Computer Security: Principles and Practice

Computer Security 14

Message Auth

Page 15: Computer Security: Principles and Practice

Computer Security 15

Hash Function Requirementsapplied to any size dataH produces a fixed-length output.H(x) is relatively easy to compute for any

given xone-way property

computationally infeasible to find x such that H(x) = h

weak collision resistance computationally infeasible to find y ≠ x such

that H(y) = H(x)strong collision resistance

computationally infeasible to find any pair (x, y) such that H(x) = H(y)

Page 16: Computer Security: Principles and Practice

Computer Security 16

Hash Functions

two attack approaches cryptanalysis

• exploit logical weakness in alg brute-force attack

• trial many inputs• strength proportional to size of hash code (2n/2)

SHA most widely used hash algorithm SHA-1 gives 160-bit hash more recent SHA-256, SHA-384, SHA-512 provide

improved size and security

Page 17: Computer Security: Principles and Practice

Computer Security 17

Public Key EncryptionDiffie and Hellman (1976)

Page 18: Computer Security: Principles and Practice

Computer Security 18

Public Key Authentication

Page 19: Computer Security: Principles and Practice

Computer Security 19

Public Key Requirements

1. computationally easy to create key pairs2. computationally easy for sender knowing public key to

encrypt messages3. computationally easy for receiver knowing private key to

decrypt ciphertext4. computationally infeasible for opponent to determine

private key from public key5. computationally infeasible for opponent to otherwise

recover original message6. useful if either key can be used for each role

Page 20: Computer Security: Principles and Practice

Computer Security 20

Public Key AlgorithmsRSA (Rivest, Shamir, Adleman)

developed in 1977 only widely accepted public-key encryption alg given tech advances need 1024+ bit keys

Diffie-Hellman key exchange algorithm only allows exchange of a secret key

Digital Signature Standard (DSS) (1991) provides only a digital signature function with

SHA-1Elliptic curve cryptography (ECC)

new, security like RSA, but with much smaller keys

Page 21: Computer Security: Principles and Practice

Computer Security 21

Public Key CertificatesX.509 standard

Page 22: Computer Security: Principles and Practice

Computer Security 22

Digital Envelopes

Page 23: Computer Security: Principles and Practice

Computer Security 23

Random Numbers

random numbers have a range of uses requirements: randomness

based on statistical tests for uniform distribution and independence

unpredictability successive values not related to previous clearly true for truly random numbers but more commonly use generator

Page 24: Computer Security: Principles and Practice

Computer Security 24

Pseudorandom verses Random Numbers often use algorithmic technique to create

pseudorandom numbers which satisfy statistical randomness tests but likely to be predictable

true random number generators use a nondeterministic source e.g. radiation, gas discharge, leaky capacitors increasingly provided on modern processors

Page 25: Computer Security: Principles and Practice

Computer Security 25

Practical Application: Encryption of Stored Data

common to encrypt transmitted data much less common for stored data

which can be copied, backed up, recovered approaches to encrypt stored data:

back-end appliance library based tape encryption background laptop/PC data encryption

Page 26: Computer Security: Principles and Practice

Computer Security 26

Summary introduced cryptographic algorithms symmetric encryption algorithms for confidentiality message authentication & hash functions public-key encryption digital signatures and key management random numbers