<<

2/26/2019 L06 – Applied

APPLIED CRYPTOGRAPHY

© Robert F. Kelly, 2012-2019 ISE331 – Computer Security 2

Reading

• Chapter 6 • Wiki pages for various attack strategies

http://en.wikipedia.org/wiki/Rainbow_table http://en.wikipedia.org/wiki/Trusted_Platform_Module

1 2/26/2019 L06 – Applied Cryptography

© Robert F. Kelly, 2012-2019 ISE331 – Computer Security 3

Objectives

• Learn the elements involved in the correct use of cryptography • Understand cryptography attack methods

© Robert F. Kelly, 2012-2019 ISE331 – Computer Security 4

Cryptography in Use

• Confidentiality – keep data a secret • Integrity – message not altered in transmission • – match a user to an account through previously shared credentials • Nonrepudiation – message sender cannot deny that they sent the message Availability (an important security concept is not addressed through cryptography

2 2/26/2019 L06 – Applied Cryptography

© Robert F. Kelly, 2012-2019 ISE331 – Computer Security 5

Two Way Communication

Public Key B Private KeyB

Plaintext Ciphertext Plaintext Decryption

Ciphertext Plaintext Decryption Encryption

Public Key Private KeyA A

© Robert F. Kelly, 2012-2019 ISE331 – Computer Security 6

Hybrid Techniques We cover TLS and SSL in the “Standards & Protocols” session Message Encrypted message

Symmetric Symmetric encryption decryption Symmetric key symmetric key

Public Key Encryption Public key decryption Message

Recipient’s public key Private key

3 2/26/2019 L06 – Applied Cryptography

© Robert F. Kelly, 2012-2019 ISE331 – Computer Security 7

Digital Signatures

• A cryptographic implementation designed to demonstrate authenticity and identity associated with a message • Important in implementing paperless document flow • Based on • hashing codes – assurance of integrity • Asymmetric cryptography – authentication and nonrepudiation

© Robert F. Kelly, 2012-2019 ISE331 – Computer Security 8 Digital Signatures

Message Message

Hash function Hash function

Private Message key digest Signature Encryption Signature Decryption Public Actual key digest Expected Vulnerable to collision attacks digest

4 2/26/2019 L06 – Applied Cryptography

© Robert F. Kelly, 2012-2019 ISE331 – Computer Security 9 Note that CDs had no Digital Rights Management (DRM) protection when standardized • Addresses protection of electronic copyright material • Analog or print material was much more difficult to copy and distribute • Many attempts at digital copyright protection have failed • DVD Content Scramble System (CSS) – encryption licensed to every DVD player Hackers usually identify • AACS –Blu-Ray disks use AES keys the keys and distribute • Various game industry approaches on the • Recent Satellite TV smart cards have been successful

© Robert F. Kelly, 2012-2019 ISE331 – Computer Security 10

Cryptographic Applications

• Filesystem encryption – hard drives are available with built-in AES encryption • Database encryption • 3DES and AES used to encrypt data stored in DB • Protection managed by row and column

5 2/26/2019 L06 – Applied Cryptography

© Robert F. Kelly, 2012-2019 ISE331 – Computer Security 11

Cipher Suites

• A collection of cryptographic functions • Authentication • Symmetric cipher and • Hash • Example – JCA • Java Cryptography Architecture • Interface that can be implemented by commercial SW providers • Set of APIs for various purposes (e.g., encryption, key generation and management, secure random-number generation, certificate validation, etc. )

© Robert F. Kelly, 2012-2019 ISE331 – Computer Security 12

A Changing Technology

• Need to be aware of ciphers in use and current status of each • Referred to as strong vs. weak ciphers, based on known attack vulnerabilities • Example • SSL V3 – vulnerable to attack • TLS - currently considered stronger

6 2/26/2019 L06 – Applied Cryptography

© Robert F. Kelly, 2012-2019 ISE331 – Computer Security 13

Key Exchange

• Maintaining the secrecy of the key is a critical part of cryptographic mechanisms • Early exchanges based on trusted couriers • Public key crypto techniques change the problem into one of techniques for key publication

© Robert F. Kelly, 2012-2019 ISE331 – Computer Security 14

Key Escrow

• How can users guard against loss of a key • Could lead to critical data not being accessible • Key escrow is the practice of keeping a key with a trusted third party (e.g., law enforcement) • An issue subject to debate

7 2/26/2019 L06 – Applied Cryptography

© Robert F. Kelly, 2012-2019 ISE331 – Computer Security 15

Cryptographic Applications

• A few applications can be used to encrypt data conveniently on your personal computer. • Pretty Good (PGP) • TrueCrypt is an open source solution for encryption. • FreeOTFE offers “on-the-fly” as an open source. • GnuPG, or Gnu Privacy Guard, is an open source implementation of the OpenPGP standard.

© Robert F. Kelly, 2012-2019 ISE331 – Computer Security 16

Steganography

• Offshoot of cryptography technology • Greek word steganos, meaning secret writing • Commonly hiding text or an image within an image file • Images do not attract attention. • Applications • Digital watermark (anti-piracy) • Secret communications • Difficult to detect • Tools to detect steganography: • Stegdetect, StegSecret, SegSpy, and SARC tools

8 2/26/2019 L06 – Applied Cryptography

© Robert F. Kelly, 2012-2019 ISE331 – Computer Security 17

Have You Achieved the Objectives?

• Learn the elements involved in the correct use of cryptography • Understand cryptography attack methods

9