Security and Cryptography: Organization
Security and Cryptography: Organization
IN4191
2020-2021 Academic Year
Lecture 1: Introduction
Zeki Erkin
Organization
Zeki Erkin
Head lecturer
Building 28
Room: E6.060
2
Organisation: Student TAs in Delft
Diana Ion
4
IN4191-Course Details
• Lectures-recorded, tele-lectured
• Tuesdays: 13:45-15:30, online, collegerama
• Thursdays: 15:45-17:30, online, collegerama
• Practice session-not recorded
• Fridays: 8:45-10:30, online feedback, using queue.tudelft.nl
• Grading
• Written exam: 70%, simple calculators only, closed book, cheat sheet: A4,
hand-written, names on both sides.
• Assignments: 30%, 3 mandatory assignments (min grade 40%)
• COVID-19 measure:
• Online exam: multiple-choice and open questions
• Randomised and customised
House Rules
• Don’t be late for the lectures.
• Use Brightspace discussion forum for getting help from peers and
TAs (general check on Fridays)
• Important:
• Learn how to write technical reports:
• Formal language, references
• NO hand written text or scanned figures (not graded)
6
Communication
Course Material
8
Additional Materials
Topics
1) Introduction to Security and Cryptography Course
2) Classical Systems (Chapter 7)
3) Information Theoretic Security (Chapter 9)
4) Defining Security (Chapter 11)
5) Modern Stream Ciphers (Chapter 12)
6) Block Ciphers and Modes of Operation (Chapter 13)
7) Block Ciphers and Modes of Operation (Continued)
8) Hash Functions, MAC and Key Derivation Functions (Chapter 14)
9) Number Theory and Elliptic Curves (Chapters 1 and 4)
10) The RSA Algorithm (Chapter 15)
11) Public Key Encryption and Signature Algorithms (Chapter 16)
12) Public Key Encryption and Signature Algorithms (continued)
13) Certificates, Key Transport and Key Agreement (Chapter 18)
14) Secret Sharing Schemes (Chapter 19)
10
Requirements
11
Workload
• 5ECTS=140 hours
• Total=135 hours
12
Marketing
13
14
Security and cryptography
Gartner says
“By 2020, 60 Percent of Digital Businesses Will Suffer Major
Service Failures Due to the Inability of IT Security Teams to
Manage Digital Risk”
15
Security? Where?
16
17
18
Digital Systems built on
ICT
Security is a must!
19
Security
• Security means:
• Confidentiality: Access to systems or data is limited to authorised
parties
• Integrity: When you receive data, you get the “right” data
• Availability: The system or data is there when you want it
20
Who is the enemy?
• Murphy
• Amateurs
• “Script kiddies”
• Crackers
• Organised crime
• Government “cyberwarriors”
• Terrorists
21
Methods of Defence
22
How secure should we make it?
23
• Protect hardware/software/data
• Ways to do so:
• Cryptography
• Software Controls
• Hardware Controls
• Physical Controls
• Policies and Procedures
24
Cryptography
25
Cryptology
Cryptography Cryptanalysis
Blockchain Engineering
Secure Data Management
Systems Security
Software Security
26
Objectives of Cryptography
27
Kerkhoff’s principle
• The adversary knows all details about a crypto system except the
secret key.
28
Eve
eavesdropping
communication
Alice Bob
29
Encryption
key k key k’
m c m
Encryption Decryption
plaintext ciphertext plaintext
(message)
30
Encryption-definition
31
key k key k
m c m
Encryption Decryption
plaintext ciphertext plaintext
(message)
Deck(Enck(m))=m
32
Public Key Encryption
Asymmetric Encryption
key k key k’
m c m
Encryption Decryption
plaintext ciphertext plaintext
(message)
Deck’(Enck(m))=m
33
Classical Systems
34
Classical Systems
• Simple ciphers
• Relies on
• substitution
• permutation
• transposition
• Historical examples
• Caesar
• Vigenere
35
X
n
H(X) = − pi · log2 pi
i=1
36
Defining Security
• Pseudo-random functions
• One-way functions
• Trapdoor one-way functions
• Notions of security
37
Notions of Security
• Perfect secrecy
• Semantic security
38
Attacks on Encryption Schemes
• Attacks
• Objective: partial information, full deciphering or obtain secret
key
• Levels of computing power
• Amount of information available
39
• Ciphertext-only attack
• Known-plaintext attack
• Chosen-plaintext attack
• Chosen-ciphertext attack
• Adaptive attacks
40
Different Types of Adversaries
41
Security
42
“How to generate pseudo-random numbers?”
43
plaintext
…001010110101…
ciphertext
⊕
…11010011…
Key stream Generator
…01011001…
key stream
key
44
Modern Block Ciphers
45
Modes of Operation
original image
image source:wikipedia 46
Hash Functions, MACs and Key Derivation Functions
H(x) = y
• x is of arbitrary length
• y is of fixed length
• Collision resistance
• preimage resistance
• second preimage resistance
• Merkle-Damgard Construction
• MD-4 Family
• HMAC
• Key Derivation Functions
47
y3 = x2 + ax + b mod n
y
y Q
P = ( x1 , y1 )
•
•
P
x
x R = ( x3 , y3 ) •
48
RSA Algorithm
49
• Goldwasser-Micali Encryption
• ElGamal Encryption
• Paillier Encryption
50
Certificates, Key Transport and Key Agreement
• Static keys
• Ephemeral keys
• Physical distribution
• Distribution using symmetric key protocols
• Distribution using asymmetric key protocols
• Certificates
51
52
Summary
• A full program
53