Beruflich Dokumente
Kultur Dokumente
Last Class
Security problems/issues
Categories of security attacks
“Conventional” (symmetric) cryptography
Some techniques used in cryptography
Steganography
Permutation (various types)
Substitution
Mono-alphabetic
Poly-alphabetic
Today
Issues with symmetric encryption
Public-Key (asymmetric) encryption
Algorithms lab solution
Symmetric Key Encryption
Alice Bob
transmit key
Encrypt Decrypt
plaintext ciphertext plaintext
Symmetric Key Encryption
Goal: confidentiality
Issues/problems:
Key must be kept secret
Key distribution technique is critical
Many communicating pairs… in a network with
1000 nodes (communicating computers), may
require more than half million keys
Based on permutation and substitution
Symmetric Key Risks
How are the keys distributed?
Through mail?
Stolen/copied in the mail?
Properties
Based on mathematical functions (not
permutation or substitution)
Given crypto algorithm and encryption key,
computationally infeasible to determine
decryption key
Asymmetric Cryptosystem:
Alice
Encryption/Decryption Bob
1. transmit public key
1. Decrypt
1. Encrypt
1. Encrypt
1. Encrypt
Encryption: C = 45 mod 35 = 9
Decryption: M = 95 mod 35 = 59049 mod
35 = 4
Is Public Key Crypto Secure?
A 128 bit key would be a number between 1 and
340,282,366,920,938,000,000,000,000,000,000,000,000
How many prime numbers are between 1 and this number?
approximately n / ln(n) which is about 2^128 / ln( 2^128 ) =
3,835,341,275,459,350,000,000,000,000,000,000,000
How long would it take to find all of these prime numbers if you could
calculate one trillion of these numbers per second?
More than 121,617,874,031,562,000 years (i.e., about 10 million times
longer than the universe has existed so far.)
Reference: http://www.livinginternet.com/?i/is_crypt_pkc_inv.htm
Answer – Yes, but know its limitations (e.g. plaintext attacks, block
sizes, etc.)
Weakness of Public-key
System
Man-in-the-middle Attack
Communication of Alice’s public key is
intercepted and changed to a new public key
that matches interceptors private key
Interceptor decodes the message to read it
and re-encodes it using Alice’s public key
before sending on to her