Week 3 - 4 - CH02-Cryptographic Tools-2-3
Week 3 - 4 - CH02-Cryptographic Tools-2-3
Cryptographic Tools
Outline
• Confidentiality with symmetric encryption
• Public key encryption
• Message authentication and hash function
• Digital signature and key management
• Random and pseudorandom numbers
• Practical application
Confidentiality with
symmetric encryption
Symmetric Encryption
• The universal technique for providing
confidentiality for transmitted or stored data
• Also referred to as conventional encryption or
single-key encryption
Strength concerns:
Concerns about algorithm
DES is the most studied encryption
algorithm in existence
Use of 56-bit key
Electronic Frontier Foundation (EFF)
announced in July 1998 that it had broken
a DES encryption
Table 2.2
Significantly
3DES was not improved efficiency
Published as
reasonable for
long term use FIPS 197
Symmetric block
cipher
Stream
Cipher
• Processes the input elements continuously
• Produces output one element at a time
• Primary advantage is that they are almost always faster
and use far less code
• Encrypts plaintext one byte at a time
• Pseudorandom stream is one that is unpredictable
without knowledge of the input key
Public key encryption
Public-Key Encryption
Structure
Asymmetri
c
Publicly • Uses two Some form
proposed Based on separate of protocol
by Diffie mathemati keys is needed
and cal • Public key for
Hellman in functions and private distributio
1976 key n
• Public key
is made
public for
others to
use
Plaintext
Readable message or data that is fed into the algorithm as input
Encryption algorithm
Performs transformations on the plaintext
Public and private key
Pair of keys, one for encryption, one for decryption
Ciphertext
Scrambled message produced as output
Decryption key
Produces the original plaintext
User encrypts data using his or
her own private key
Anyone who knows the
corresponding public key will be
able to decrypt the message
Table 2.3
Computationally
Useful if either easy for sender
key can be used knowing public key
for each role to encrypt messages
Computationally
infeasible for Computationally easy
opponent to for receiver knowing
otherwise private key to
recover original decrypt ciphertext
message
Computationally
infeasible for opponent
to determine private key
from public key
Asymmetric Encryption
Algorithms
RSA (Rivest, Most widely accepted
Block cipher in which
the plaintext and
Shamir, Developed in 1977
and implemented
approach to public-key
ciphertext are integers
between 0 and n-1 for
Adleman) encryption
some n.
symmetric encryption
algorithm of messages
Digital
Signature Provides only a digital
signature function with
Cannot be used for
encryption or key
Standard SHA-1 exchange
(DSS)
Elliptic curve
cryptography Security like RSA, but
with much smaller keys
(ECC)
Message authentication
and hash function
Message
Authentication
Protects against
active attacks
• Contents have not been
Verifies received altered
message is • From authentic source
• Timely and in correct
authentic sequence
Can use
• Only sender & receiver
conventional share a key
encryption
Hash Function
Requirements
Can be applied to a block of data of any size
Cryptanalysis Passwords
• Exploit logical • Hash of a password is
weaknesses in the stored by an operating
algorithm system
Numbers algorithms
Stream key for symmetric
stream cipher
Symmetric key for use as
a temporary session key
or in creating a digital
envelope
Uses include Handshaking to prevent
generation of: replay attacks
Session key
Random Number
Requirements
Randomness Unpredictability
Criteria: Opponent should not
Uniform distribution be able to predict
Frequency of occurrence