Cryptography

Total Page:16

File Type:pdf, Size:1020Kb

Cryptography University of Indonesia Magister of Information Technology Cryptography Arrianto Mukti Wibowo University of Indonesia – University of Budi Luhur Magister of Information Technology Tujuan • Mempelajari berbagai metode dan teknik penyembunyian data menggunakan kriptografi. University of Indonesia – University of Budi Luhur Magister of Information Technology Topik • Symmetric & asymmetric cryptography, key strength, cryptosystems, public key infrastructure (PKI), one-way function, hash function, key management, cryptographic attacks University of Indonesia – University of Budi Luhur Magister of Information Technology Cryptography Issues (Schneier ‟96) • Kerahasiaan (confidentiality) dijamin dengan melakukan enkripsi (penyandian). • Keutuhan (integrity) atas data-data pembayaran dilakukan dengan fungsi hash satu arah. • Jaminan atas identitas dan keabsahan (authenticity) pihak-pihak yang melakukan transaksi dilakukan dengan menggunakan password atau sertifikat digital. Sedangkan keotentikan data transaksi dapat dilakukan dengan tanda tangan digital. • Transaksi dapat dijadikan barang bukti yang tidak bisa disangkal (non-repudiation) dengan memanfaatkan tanda tangan digital dan sertifikat digital. University of Indonesia – University of Budi Luhur Magister of Information Technology Makna Kriptografi • Krupto + Grafh = secret + writing • Cryptography: ilmu untuk membuat sebuah pesan menjadi aman University of Indonesia – University of Budi Luhur Magister of Information Technology Cryptographic algorithm & key • Cipher: fungsi matematika yang dipergunakan untuk enkripsi & dekripsi. • Key (kunci): Kenapa tidak pakai algoritma rahasia saja? Karena susah untuk membuat yang baru setiap kali akan mengirim pesan! Jadi pakai kunci saja • Analogi: Pernah lihat gembok yang menggunakan kode-kode angka untuk membuka gemboknya? – Cipher / algoritma: hampir semua orang tahu cara membuka/ mengunci gembok: putar saja kode-kode angkanya ke posisi yang tepat – Kuncinya: hanya bisa diputar oleh orang yang tahu urutan kode yang benar! University of Indonesia – University of Budi Luhur Magister of Information Technology Proses Kriptografis Key Key Plaintext Encryption Ciphertext Decryption Plaintext University of Indonesia – University of Budi Luhur Magister of Information Technology Monoalphabetic cipher • Jumlah kombinasi: 26! ( = 26x25x24x…x1 4 x 1026) kemungkinan kunci ABCDEFGHIJKLMNOPQRSTUVWXYZ PBUYMEVHXIJCLDNOGQRTKWZAFS • Jadi kalau plaintext-nya “FASILKOM” maka ciphertextnya adalah “EPRXCJNL” University of Indonesia – University of Budi Luhur Magister of Information Technology Beberapa sejarah kriptografi • Spartan roll • Atbash, kriptografi Ibrani monoalphabetic cipher • Julius Caesar cipher menggeser alphabet • Mesin rotor dipergunakan dalam Perang Saudara di A.S. abad ke-19 • Enigma, perang dunia II • Steganography? Menyembunyikan, bukan menyandikan! University of Indonesia – University of Budi Luhur Magister of Information Technology Symetric Cryptography • Sebuah kunci yang dipakai bersama-sama oleh pengirim pesan dan penerima pesan • Contoh: DES, TripleDES, AES, Blowfish, Rambutan, Twofish, RC4, RC5, RC6, Lucifer, IDEA (dalam PGP) • Ada problem “pendistribusian kunci rahasia”. University of Indonesia – University of Budi Luhur Magister of Information Technology Authentication dgn Symetric Key • Kalo agen 007 ingin ketemu agen 005, tapi mereka belom pernah kenal muka, gimana caranya? M (boss mereka) memberikan mereka password „Golden Gun‟. Tapi kalau mereka menyebutkan password itu di depan umum, nanti bisa terdengar orang lain! • Solusi, dengan „challenge & respons‟. Misalnya 007 mengotentikasi 005: – 007 memilih bilangan random – 007 mengirim bilangan random itu sebagai tantangan kepada 005 – 005 mengenkripsi bilangan random itu dengan kunci „Golden Gun‟ – 005 mengirim ciphertext kepada 007 – 007 mendekripsi ciphertext itu – Jika plaintextnya = bilangan random ybs, maka 007 dapat merasa pasti bahwa 005 itu benar-benar yang asli! 007 Bil random 005 mengenkripsi bil 007 mendekripsi random itu EK(Bil random) ciphertext University of Indonesia – University of Budi Luhur Magister of Information Technology Beberapa “black box” dasar untuk kriptrografi • XOR • Permutasi • Subtitusi University of Indonesia – University of Budi Luhur Magister of Information Technology XOR Input 1 Input 2 Output 0 0 0 0 1 1 1 0 1 1 1 0 Coba kalau dibalik…! University of Indonesia – University of Budi Luhur Magister of Information Technology Subtitution • Jika kita memiliki input k-bit dengan kemungkinan 2k, kita harus menentukan pasangan setiap k-bit tersebut yang lebarnya juga k-bit. 0000 0001 0010 0011 dst… 0101 1011 1000 0100 University of Indonesia – University of Budi Luhur Magister of Information Technology Permutasi • Untuk setiap bit dari input k-bit, tiap bit ditukar posisinya ke tempat lain. Misalnya bit ke-4 dari input menjadi bit ke-5. Lalu bit ke-7 dari input jadi bit ke 2, dst. Bit ke: 0 1 2 3 4 5 6 7 Bit ke: 0 1 2 3 4 5 6 7 • Why permute secara fixed? • Tak terlalu berguna kecuali untuk membuatnya tidak efisien pada software! University of Indonesia – University of Budi Luhur Magister of Information Technology Data Encryption Standard • Diciptakan tahun 1977 oleh National Bureau of Standard, AS. • Menggunakan kunci 56-bit dengan tambahan 8-bit parity untuk kunci ybs. • Termasuk „block cipher‟. Satu blok DES panjangnya 64- bit. • Menggunaan XOR, S-Box, dan P-Box • Memiliki sifat-sifat symetric key: – One-to-one mapping: hal ini diperlukan agar saat proses dekripsi dari ciphertext, hanya ada satu plaintext. – Cipertext dari plaintext harus tidak dapat diduga (random). Perfect secrecy berarti antara ciphertext dan plaintext secara statistik saling lepas. University of Indonesia – University of Budi Luhur Magister of Information Technology Beberapa metode DES • Electronic Code Book • Cipher Block Chaining University of Indonesia – University of Budi Luhur Magister of Information Technology Electronic Code Book Plaintext1 Plaintext2 Plaintext3 DES DES DES key key Encryption key Encryption Encryption Ciphertext1 Ciphertext2 Ciphertext3 University of Indonesia – University of Budi Luhur Magister of Information Technology Cipher Block Chaining Plaintext 1 Plaintext2 Plaintext3 random IV DES key DES DES Encryption key Encryption key Encryption Ciphertext 1 Ciphertext2 Ciphertext3 University of Indonesia – University of Budi Luhur Magister of Information Technology Triple DES • Kalau enkripsi 2 kali dengan kunci yang sama: search space –nya tetap sama, yakni 256. Jadi tidak bertambah secure. • Kalau enkripsi 2 kali dengan kunci yang berbeda bagaimana? Harusnya kalau kuncinya 2 maka panjangnya jadi 112-bit. Jadi faktor kesulitannya bertambah 256 kali. Ternyata Merkle & Hellman menemukan „celah‟ untuk membobol hanya dalam waktu kira-kira 2 kali DES 56 bit. Jadi seolah-oleh DES 57-bit. • Ada beberapa mode Triple DES (112 bit): – Umumnya menggunakan EncryptK1 lalu DecryptK2 lalu EncryptK1 --> EDE2 – Bisa juga EEE2, tapi less secure dari EDE2, karena permutasi akhir (pada blok pertama) dan permutas awal (pada blok berikutnya) akan saling meng-cancel • Kenapa enkripsi 3 kali? Karena belum ada yang menemukan kelemahannya… • Alasan EDE pakai 2 kunci adalah karena dianggap cukup aman dengan kunci 112-bit dan belum ada yang bisa menjebolnya (kecuali dengan brute force). Jadi tidak perlu bikin K3 56x3 bit (meskipun bisa, dan paling aman). University of Indonesia – University of Budi Luhur Magister of Information Technology Advanced Encryption Standard • Diinisiasikan oleh NIST thn 1997 • Syarat: – Tahan terhadap semua jenis serangan yg diketahui – Simpel – Code yang kecil – Cepat • Thn 1999 ada 5 finalis: Twofish (Counterpane), Rijndael (Daemen & Rijmen), RC6 (RSA), Serpent (Anderson, Biham, Knudsen), MARS (IBM Lucifer) • Thn 2000 diumumkan pemenangnya adalah Rijndael • AES bisa menggunakan kunci 128, 192 dan 256 bit • Jika sebuah mesin pemecah DES bisa memecahkan DES dalam waktu 1 detik, maka mesin yang sama perlu 149 trilyun tahun. University of Indonesia – University of Budi Luhur Magister of Information Technology One Time Pad • Meskipun ada yang mengatakan bahwa tidak ada skim enkripsi yang 100% secure, ada yang sebenarnya bisa dibuktikan 100% aman (secara matematis). • Caranya: kuncinya adalah deretan yang random yang tidak pernah berulang. Atau dengan kata lain, kuncinya sepanjang messagenya. • Dengan kata lain, sebuah ciphertext tanpa one-time pad-nya, dapat menghasilkan message (meskipun bukan message asli) apa saja! • Bisa pakai XOR…! • Termasuk jenis „stream cipher‟ University of Indonesia – University of Budi Luhur Magister of Information Technology Public Key Cryptography • Ada 2 kegunaan yang mendasar: – Menandatangani pesan – Mengirim surat rahasia dalam amplop yang tidak bisa dibuka orang lain • Ada sepasang kunci untuk setiap orang (entitas): – kunci publik (didistribusikan kepada khalayak ramai / umum) – kunci privat (disimpan secara rahasia, hanya diketahui diri sendiri) University of Indonesia – University of Budi Luhur Magister of Information Technology Membungkus pesan • Semua orang bisa (Anto, Chandra, Deni) mengirim surat ke “Penerima” (Badu) • Hanya “penerima” yang bisa membuka surat • (pada prakteknya tidak persis spt ini) Pengirim (Anto) Penerima (Badu) Kunci Enkripsi privat Kunci publik Dekripsi Pesan Sandi Pesan University of Indonesia – University of Budi Luhur Magister of Information Technology Menandatangani pesan dgn public-key cryptography • Hanya pemilik kunci privat (penandatangan, Anto) saja yang bisa membuat tanda tangan
Recommended publications
  • Foreword by Whitfield Diffie Preface About the Author Chapter 1
    Applied Cryptography: Second Edition - Bruce Schneier Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C by Bruce Schneier Wiley Computer Publishing, John Wiley & Sons, Inc. ISBN: 0471128457 Pub Date: 01/01/96 Foreword By Whitfield Diffie Preface About the Author Chapter 1—Foundations 1.1 Terminology 1.2 Steganography 1.3 Substitution Ciphers and Transposition Ciphers 1.4 Simple XOR 1.5 One-Time Pads 1.6 Computer Algorithms 1.7 Large Numbers Part I—Cryptographic Protocols Chapter 2—Protocol Building Blocks 2.1 Introduction to Protocols 2.2 Communications Using Symmetric Cryptography 2.3 One-Way Functions 2.4 One-Way Hash Functions 2.5 Communications Using Public-Key Cryptography 2.6 Digital Signatures 2.7 Digital Signatures with Encryption 2.8 Random and Pseudo-Random-Sequence Generation Chapter 3—Basic Protocols 3.1 Key Exchange 3.2 Authentication 3.3 Authentication and Key Exchange 3.4 Formal Analysis of Authentication and Key-Exchange Protocols 3.5 Multiple-Key Public-Key Cryptography 3.6 Secret Splitting 3.7 Secret Sharing 3.8 Cryptographic Protection of Databases Chapter 4—Intermediate Protocols 4.1 Timestamping Services 4.2 Subliminal Channel 4.3 Undeniable Digital Signatures 4.4 Designated Confirmer Signatures 4.5 Proxy Signatures 4.6 Group Signatures 4.7 Fail-Stop Digital Signatures 4.8 Computing with Encrypted Data 4.9 Bit Commitment 4.10 Fair Coin Flips 4.11 Mental Poker 4.12 One-Way Accumulators 4.13 All-or-Nothing Disclosure of Secrets Page 1 of 666 Applied Cryptography: Second Edition - Bruce
    [Show full text]
  • COURSE CODE COURSE TITLE L T P C 2161CS127 CYBER SECURITY PRINCIPLES 3 0 0 3 Course Category: Program Core A
    COURSE CODE COURSE TITLE L T P C 2161CS127 CYBER SECURITY PRINCIPLES 3 0 0 3 Course Category: Program Core A. Preamble : This course describes the concepts of network security and cyber security principles. B. Course Outcomes : Upon the successful completion of the course, students will be able to: Level of learning CO domain (Based on Course Outcomes Nos. revised Bloom’s taxonomy) CO1 Compare and contrast various cryptographic protocols K2 CO2 Demonstrate various ethical hacking and system hacking K3 CO3 Explain the various cyber threats and vulnerabilities. K2 Discuss the pseudo random sequence generators and stream CO4 K2 ciphers CO5 Design and implement secure applications K2 C. Correlation of COs with POs : COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 CO1 H L CO2 H H CO3 L L L CO4 M L M M CO5 M M H M H- High; M-Medium; L-Low D. Course Content : UNIT I Cryptographic Protocols (9) Introduction to Protocols-Communications Using Symmetric Cryptography-One-Way Functions- One-Way Hash Functions-Communications Using Public-Key Cryptography-Digital Signatures- Digital Signatures with Encryption-Random and Pseudo-Random-Sequence Generation-Basic Protocols-Key Exchange-Authentication-Authentication and Key Exchange. UNIT II Ethical Hacking and System Hacking (9) Introduction-Importance of Security-Elements of Security-Phase of an Attack- Hacker Attacks – Hacktivism –Ethical Hackers –Computer Crimes and Implication. Introduction–Cracking password–Password cracking websites–Password guessing Algorithms–Password cracking Tools Countermeasure–Escalating Privileges-Executing Applications –Key loggers and spywares. UNIT III Cyber Threats and Vulnerabilities (9) Cyber Threats-Cyber Activism-Cybercrime-Cyber Espionage-Cyber terrorism-Cyber Warfare- Cyber World Vulnerabilities-Cyber Operations-Cyber Weaponry-Society’s Critical Structures as Targets.
    [Show full text]
  • Two Dozen Short Lessons in Haskell a Participatory Textbook on Functional Programming
    Two Dozen Short Lessons in Haskell a participatory textbook on functional programming by Rex Page School of Computer Science University of Oklahoma Copyright © 1995, 1996, 1997 by Rex Page Permission to copy and use this document for educational or research purposes of a non-commercial nature is hereby granted, provided that this copyright notice is retained on all copies. All other rights reserved by author. Rex Page School of Computer Science University of Oklahoma 200 Felgar Street — EL114 Norman OK 73019 USA [email protected] Table of Contents 1.................................................................................................. How To Use This Book 5.................................................................................................... Hello World, Etc. 1 10..............................................................................................................Definitions 2 14...............................................................................How to Run Haskell Programs 3 17......................................... Computations on Sequences — List Comprehensions 4 21...................................................................... Function Composition and Currying 5 25.......................... Patterns of Computation — Composition, Folding, and Mapping 6 33......................................................................................................................Types 7 37........................................................ Function Types, Classes, and Polymorphism 8 42...........................................
    [Show full text]
  • The GCHQ Protocol and Its Problems
    The GCHQ Protocol and Its Problems Ross Anderson, Michael Roe Cambridge University Computer Laboratory Pembroke Street, Cambridge CB2 3QG Email: (rjal4,mrr)@cl. cam.ac .uk Abstract. The UK government is fielding an architecture for secure electronic mail based on the NSA’s Message Security Protocol, with a key escrow scheme inspired by Diffie-Hellman. Attempts have been made to have this protocol adopted by other governments and in various do- mestic applications. The declared policy goal is to entrench commercial key escrow while simultaneously creating a large enough market that software houses will support the protocol as a standard feature rather than charging extra for it. We describe this protocol and show that, like the ‘Clipper’ proposal of a few years ago, it has a number of problems. It provides the worst of both secret and public key systems, without delivering the advantages of ei- ther; it does not support nonrepudiation; a.nd there are serious problems with the replacement of compromised keys, the protection of security la- bels, and the support of complex or dynamic administrative structures. 1 Introduction Over the last two years, the British government’s crypto policy has changed completely. Whereas in 1994 the Primc Minister assured the House of Com- mons that no further restrictions on encryption were envisaged, we now find the government proposing to introduce a licensing scheme for ‘trusted third par- ties’, and licenses will only be granted to operators that escrow their customers’ confidentiality keys to the government’s satisfaction [ll,211. In March 1996, a document describing the cryptographic protocols to he used in government electronic mail systems was issued by CESG, the department of GCHQ concerned with the protection of government information; it has since been made available on the worldwide web [4].
    [Show full text]
  • Confidentiality Framework
    T/3522TL/2778/9 4 February 1997 CESG INFOSEC MEMORANDUM NO. 14 AN HMG PUBLIC KEY INFRASTRUCTURE TO SUPPORT CONFIDENTIALITY Issue 1.0 CESG ELECTRONIC INFORMATION SYSTEMS SECURITY MEMORANDUM NO. 14 AN HMG PUBLIC KEY INFRASTRUCTURE TO SUPPORT CONFIDENTIALITY Issue 1.0 February 1997 © Crown Copyright 1997 Communications-Electronics Security Group CESG Infosec Memorandum No. 14 FOREWORD This Memorandum is issued by the Communications-Electronics Security Group (CESG) of Government Communications Headquarters as part of its responsibility to advise HMG on Electronic Information Systems Security (Infosec). It suggests an architecture for a public key infrastructure (PKI) to support confidentiality between communicating systems. The Memorandum will eventually form part of a suite of documents which collectively provide advice on the implementation of a PKI, and the use of the services enabled by such an infrastructure (e.g. electronic mail). The architecture as described in this document is an initial attempt at defining a PKI, and CESG will take into account any comments on its feasibility. This Memorandum is intended for use by HMG, its contractors and suppliers. General correspondence in connection with this document, including requests for additional copies, should be addressed to: Communications-Electronics Security Group (X13) Government Communications Headquarters PO Box 144 Cheltenham GL52 5UE United Kingdom Technical correspondence in connection with this document should be sent to T27 at the above address. page ii Issue 1.0 February
    [Show full text]
  • M. Tech Information and Cyber Security- CBCS S. No Subject Code
    M. Tech Information and Cyber Security- CBCS Subject S. No CBCS R-16 L T P C Code Foundation Course 1. 2160MA103 Probability and Statistics FC 3 2 0 4 Program Core 2161IT108 Computer Oriented Optimization 2. PC 4 0 0 4 Techniques 3. 2161IT109 Modern Number Theory PC 4 0 0 4 4. 2161IT110 Foundations of Modern Networking PC 4 0 0 4 2161IT111 Hacking Techniques and Incidents 5. PC 4 0 0 4 Response 6. 2161IT112 Cloud Computing PC 4 0 0 4 7. 2161IT113 Modern Cryptography PC 4 0 0 4 8. 2161IT114 Principles of Information Security PC 3 0 0 3 9. 2161IT115 Cyber Security Principles PC 3 0 0 3 Total Credits 30 Specific Elective 10. 2162IT121 Principles of Cyber Physical Systems PE 3 0 0 3 11. 2162IT122 Intrusion Detection Systems PE 3 0 0 3 12. 2162IT123 Cyber Crimes and Laws PE 3 0 0 3 13. 2162IT124 Cyber Forensics PE 3 0 0 3 2162IT125 Bitcoin and Cryptocurrency 14. PE 3 0 0 3 Technologies Performance Evaluation of Computer 15. 2162IT126 PE 3 0 0 3 Systems 16. 2162IT127 Bio-Informatics PE 3 0 0 3 Independent Learning 17. 2163MG401 Research Methodology Independent Learning 2 18. 2163IT402 ICT Tools Independent Learning 2 19. 2163IT501 Research Seminar Independent Learning 20. 2163IT502 Field Study 2 (Anyone) 21. 2163IT801 Internship 22. 2163GE401 Business Communication Independent Learning 2 Project Work 23. 2164IT601 Project Phase 1 Project Work 10 24. 2164IT701 Project Phase 2 Project Work 16 L – Lecture; T – Tutorial; P – Practical; C – Credit COURSE CODE COURSE TITLE L T P C 2160MA102 PROBABILITY AND STATISTICS 3 2 0 4 Course Category: Foundation Course A.
    [Show full text]
  • APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Table of Contents
    To access the contents, click the chapter and section titles. Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth) (Publisher: John Wiley & Sons, Inc.) Author(s): Bruce Schneier ISBN: 0471128457 Publication Date: 01/01/96 Brief Full Advanced Search Search Tips Search this book: Foreword by Whitfield Diffie Preface About the Author Chapter 1—Foundations 1.1 Terminology 1.2 Steganography 1.3 Substitution Ciphers and Transposition Ciphers 1.4 Simple XOR 1.5 One-Time Pads 1.6 Computer Algorithms 1.7 Large Numbers Part I—Cryptographic Protocols Chapter 2—Protocol Building Blocks 2.1 Introduction to Protocols 2.2 Communications Using Symmetric Cryptography 2.3 One-Way Functions 2.4 One-Way Hash Functions 2.5 Communications Using Public-Key Cryptography 2.6 Digital Signatures 2.7 Digital Signatures with Encryption 2.8 Random and Pseudo-Random-Sequence Generation Chapter 3—Basic Protocols 3.1 Key Exchange 3.2 Authentication 3.3 Authentication and Key Exchange 3.4 Formal Analysis of Authentication and Key-Exchange Protocols 3.5 Multiple-Key Public-Key Cryptography 3.6 Secret Splitting 3.7 Secret Sharing 3.8 Cryptographic Protection of Databases Chapter 4—Intermediate Protocols 4.1 Timestamping Services 4.2 Subliminal Channel 4.3 Undeniable Digital Signatures 4.4 Designated Confirmer Signatures 4.5 Proxy Signatures 4.6 Group Signatures 4.7 Fail-Stop Digital Signatures 4.8 Computing with Encrypted Data 4.9 Bit Commitment 4.10 Fair Coin Flips 4.11 Mental Poker 4.12 One-Way Accumulators 4.13 All-or-Nothing Disclosure
    [Show full text]
  • Applied Cryptography, Second Edition
    To access the contents, click the chapter and section titles. Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth) (Publisher: John Wiley & Sons, Inc.) Author(s): Bruce Schneier ISBN: 0471128457 Publication Date: 01/01/96 Brief Full Advanced Search Search Tips Search this book: Foreword by Whitfield Diffie Preface About the Author Chapter 1—Foundations 1.1 Terminology 1.2 Steganography 1.3 Substitution Ciphers and Transposition Ciphers 1.4 Simple XOR 1.5 One-Time Pads 1.6 Computer Algorithms 1.7 Large Numbers Part I—Cryptographic Protocols Chapter 2—Protocol Building Blocks 2.1 Introduction to Protocols 2.2 Communications Using Symmetric Cryptography 2.3 One-Way Functions 2.4 One-Way Hash Functions 2.5 Communications Using Public-Key Cryptography 2.6 Digital Signatures 2.7 Digital Signatures with Encryption 2.8 Random and Pseudo-Random-Sequence Generation Chapter 3—Basic Protocols 3.1 Key Exchange 3.2 Authentication 3.3 Authentication and Key Exchange 3.4 Formal Analysis of Authentication and Key-Exchange Protocols 3.5 Multiple-Key Public-Key Cryptography 3.6 Secret Splitting 3.7 Secret Sharing 3.8 Cryptographic Protection of Databases Chapter 4—Intermediate Protocols 4.1 Timestamping Services 4.2 Subliminal Channel 4.3 Undeniable Digital Signatures 4.4 Designated Confirmer Signatures 4.5 Proxy Signatures 4.6 Group Signatures 4.7 Fail-Stop Digital Signatures 4.8 Computing with Encrypted Data 4.9 Bit Commitment 4.10 Fair Coin Flips 4.11 Mental Poker 4.12 One-Way Accumulators 4.13 All-or-Nothing Disclosure
    [Show full text]
  • APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols
    To access the contents, click the chapter and section titles. Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth) (Publisher: John Wiley & Sons, Inc.) Author(s): Bruce Schneier ISBN: 0471128457 Publication Date: 01/01/96 Brief Full Advanced Search Search Tips Search this book: Foreword by Whitfield Diffie Preface About the Author Chapter 1—Foundations 1.1 Terminology 1.2 Steganography 1.3 Substitution Ciphers and Transposition Ciphers 1.4 Simple XOR 1.5 One-Time Pads 1.6 Computer Algorithms 1.7 Large Numbers Part I—Cryptographic Protocols Chapter 2—Protocol Building Blocks 2.1 Introduction to Protocols 2.2 Communications Using Symmetric Cryptography 2.3 One-Way Functions 2.4 One-Way Hash Functions 2.5 Communications Using Public-Key Cryptography 2.6 Digital Signatures 2.7 Digital Signatures with Encryption 2.8 Random and Pseudo-Random-Sequence Generation Chapter 3—Basic Protocols 3.1 Key Exchange 3.2 Authentication 3.3 Authentication and Key Exchange 3.4 Formal Analysis of Authentication and Key-Exchange Protocols 3.5 Multiple-Key Public-Key Cryptography 3.6 Secret Splitting 3.7 Secret Sharing 3.8 Cryptographic Protection of Databases Chapter 4—Intermediate Protocols 4.1 Timestamping Services 4.2 Subliminal Channel 4.3 Undeniable Digital Signatures 4.4 Designated Confirmer Signatures 4.5 Proxy Signatures 4.6 Group Signatures 4.7 Fail-Stop Digital Signatures 4.8 Computing with Encrypted Data 4.9 Bit Commitment 4.10 Fair Coin Flips 4.11 Mental Poker 4.12 One-Way Accumulators 4.13 All-or-Nothing Disclosure
    [Show full text]
  • Security Engineering 0011 0010 1010 1101 0001 0100 1011 Lesson 10 Combining Block Ciphers; Pseudo-Random- Sequence Generators and Stream Ciphers
    Security Engineering 0011 0010 1010 1101 0001 0100 1011 Lesson 10 Combining Block Ciphers; Pseudo-Random- Sequence Generators and Stream Ciphers, Spring 2010 Dr. Marenglen Biba Combining Block Ciphers Combining Block Ciphers Double Encryption Triple Encryption Doubling the Block Length Other Multiple Encryption Schemes CDMF Key Shortening 0011 0010 1010 1101 0001 0100 1011 Whitening Cascading Multiple Block Algorithms Combining Multiple Block Algorithms Combining block algorithms • There are many ways to combine block algorithms to get new algorithms. • The idea behind these schemes is to try to increase security without going through the trouble of designing a new algorithm. 0011 0010• DES 1010 has1101 been 0001 0100a secure 1011 algorithm However, the key is too short. • Wouldn’t it be nice to use DES as a building block for another algorithm with a longer key? • We’d have the best of both worlds: the assurance of almost four decades of cryptanalysis plus a long key. Multiple encryption • Multiple encryption is one combination technique: using an algorithm to encrypt the same plaintext block multiple times with multiple keys. • Cascading is like multiple encryption, but uses different algorithms. • Encrypting a plaintext block twice with the same key, 0011 0010whether 1010 1101 with 0001 the 0100 same 1011 algorithm or a different one, is not smart. – For the same algorithm, it does not affect the complexity of a brute-force search. • If you are going to use any of the following techniques, make sure the multiple keys are different and independent. Double Encryption • A naìve way of improving the security of a block algorithm is to encrypt a block twice with two different keys.
    [Show full text]
  • The GCHQ Protocol and Its Problems
    The GCHQ Protocol and its Problems Ross Anderson, Michael Roe Cambridge University Computer Laboratory Pembroke Street, Cambridge CB2 3QG Email: (rja14,mrr)@cl.cam.ac.uk Abstract. The UK government is fielding an architecture for secure electronic mail based on the NSA’s Message Security Protocol, with a key escrow scheme inspired by Diffie-Hellman. Attempts have been made to have this protocol adopted by other governments and in various do- mestic applications. The declared policy goal is to entrench commercial key escrow while simultaneously creating a large enough market that software houses will support the protocol as a standard feature rather than charging extra for it. We describe this protocol and show that, like the ‘Clipper’ proposal of a few years ago, it has a number of problems. It provides the worst of both secret and public key systems, without delivering the advantages of ei- ther; it does not support nonrepudiation; and there are serious problems with the replacement of compromised keys, the protection of security la- bels, and the support of complex or dynamic administrative structures. 1 Introduction Over the last two years, the British government’s crypto policy has changed completely. Whereas in 1994 the Prime Minister assured the House of Com- mons that no further restrictions on encryption were envisaged, we now find the government proposing to introduce a licensing scheme for ‘trusted third par- ties’, and licenses will only be granted to operators that escrow their customers’ confidentiality keys to the government’s satisfaction [11, ?]. In March 1996, a document describing the cryptographic protocols to be used in government electronic mail systems was issued by CESG, the department of GCHQ concerned with the protection of government information; it has since been made available on the worldwide web [4].
    [Show full text]
  • SRINIVAS UNIVERSITY COLLEGE of ENGINEERING and TECHNOLOGY Electronics and Communication Engineering
    SRINIVAS UNIVERSITY COLLEGE OF ENGINEERING AND TECHNOLOGY Electronics and Communication Engineering Scheme and the Subjects of Ph.D. Course Work Sl.No Subject Code Subject Title Credits Marks 1 18PHDRM Research Methodology 4 100 2 20SPHDEC01 Advanced Embedded System 4 100 3 20SPHDEC02 Automotive Electronics 4 100 4 20SPHDEC03 Cryptography And Network Security 4 100 Total 400 Scheme of Examination Continuous Internal Assessment: 1. Department level presentations (2): 15 + 15 = 50 Marks 30, (30 + 20 = 50) 2. Assignments (1): 20. End Semester Examination: 50 One question from each module with internal Marks choice. Each question carries 10 marks. (5 x 10 = 50) ADVANCED EMBEDDED SYSTEM 20SPHDEC01 Module -1 Embedded System: Embedded vs General computing system, classification, application and purpose of ES. Core of an Embedded System, Memory, Sensors, Actuators, LED, Optocoupler, Communication Interface, Reset circuits, RTC, WDT, Characteristics and Quality Attributes of Embedded Systems (Selected Topics from Ch -1, 2, 3 of Text 1). Module -2 Hardware Software Co-Design, embedded firmware design approaches, computational models, embedded firmware development languages, Integration and testing of Embedded Hardware and firmware, Components in embedded system development environment (IDE), Files generated during compilation, simulators, emulators and debugging (Selected Topics From Ch-7, 9, 12, 13 of Text 1). Module -3 ARM-32 bit Microcontroller: Thumb-2 technology and applications of ARM, Architecture of ARM Cortex M3, Various Units in the architecture, General Purpose Registers, Special Registers, exceptions, interrupts, stack operation, reset sequence (Ch 1, 2, 3 of Text 2). Module -4 Instruction Sets: Assembly basics, Instruction list and description, useful instructions, Memory Systems, Memory maps, Cortex M3 implementation overview, pipeline and bus interface (Ch-4, 5, 6 of Text 2).
    [Show full text]