9 vues

Transféré par Tommy Twain

- 16952_chapter 3 Classabc
- Transient Cryptographic Secrets with Multiple Rounds and Automatic Detection Using Dynamic Analysis
- 030309
- 37. Comp Sci - Dual Congruent - Yahia S. Al- Halabi
- 08240409.pdf
- Public Key
- Secure Personal Health Records Using Encryption
- Cryptography
- 2. Management-Text Hiding Using RSA and BLOWFISH Algorithms With HLSB Technique-G.annapurna
- Keyword Search on Public Key Ciphertexts with Reduced Overhead using a Query Based Ranking System
- Public Key Cryptography
- AIS Chap 9.pdf
- Implementation
- lecture+5+-+Crypto
- DNA SECURITY USING SYMMETRIC AND ASYMMETRIC CRYPTOGRAPHY
- Crossbow
- (Khan Lin Shenoy) Presentation
- Table of Contents
- cse7
- Riffle Network

Vous êtes sur la page 1sur 8

Objectives:

Basic cryptography concepts, including the importance of key length Encryption for confidentiality, including symmetric key encryption and public key encryption

Concepts

Many times two parties simply wish to communicate securely. The figure below shows that secure communication often takes place under the protection of a cryptographic system, in which software processes used by two communicating parties implement security automatically without the awareness of the communicating party. Cryptographic systems provide four types of protection to a conversations messages Confidentiality: Protection against eavesdroppers understanding intercepted messages Authentication: Assurance that senders are who they claim to be Message Integrity: Assurance that the messages has not been changed en route Anti-replay protection: Assurance that if an attacker captures a message and transmit it again later, the receiver will not accept the message.

Secure Communication

Provided Automatically

The term cryptography literally means secret writing. It originally was created as a way to prevent unauthorized people from reading messages. In other words, it was created for confidentiality. Encryption can be used for other forms of protection, including authentication and message integrity. Plaintext, Encryption, Decryption and Ciphertext Plaintext

As seen in the second figure, the original message to be sent is called the plaintext. This name may seem to imply that only text message can be protected but a plaintext message can be graphics, voice or anything else. The text in its name exists for historical reasons early cryptography actually was limited to text message. Encryption and Ciphertext Also in the diagram shows applying encryption to the plaintext creates something else called ciphertext. Encryption is a mathematical process and there are a lot of popular encryption algorithms available. The ciphertext that encryption produce looks like a random stream of ones and zeros to anyone intercepting the message. Decryption When the ciphertext message reaches the authorized receiver, the receiver is able to decrypt the message that is, apply a mathematical process that regenerates the original plaintext. Although unauthorized parties cannot read the ciphertext message en route, the authorized receiver can read the deciphered plaintext Keys Encryption Methods and Keys The figure shows that encryption processes have two parts. One is a mathematical algorithm (the encryption method), which is used in the same way on all messages. The other key is a key, which is a string of bits. Different keys produce different ciphertexts from the same plaintext even when the same method is used. Only few encryption methods have been developed, so it is impossible in practice to keep the encryption method secret. Consequently, communicating partners must keep their encryption keys secret.

Encryption Key

Plaintext Hello

Ciphertext 11011101

Interceptor

Network

Decryption Key Note: Interceptor cannot read ciphertext without the decryption key Decryption Method And Key

Ciphertext 11011101

Plaintext Hello

Encryption for confidentiality with Symmetric Key Encryption In general, two types of encryption methods exists: symmetric key encryption methods and public key encryption methods Symmetric Key Encryption: A Single Key The figure shows both sides use the same key. A method that uses a single key for both encryption and decryption in both directions is a symmetric key encryption method. Each side encrypts with this single key when it sends a message and each side decrypts with this single key when it receives a message. In other words, the encryption key is the same as the decryption key in both directions. Methods Data Encryption Standard (DES) In 1977, the U.S. National Bureau of Standards which is now the National Institute of Standards and Technology (NIST), created the Data Encryption Standard (DES). DES quickly became the most widely used symmetric key encryption method a position it is slowly beginning to lose to newer methods.

Symmetric Key

Plaintext Hello

Ciphertext 11011101

Interceptor

Network

Same Symmetric Key Decryption Method And Key

Ciphertext 11011101

Plaintext Hello

DES-CBC (DES-Cipher Block Chaining) One problem with simple DES is that the same input plaintext always gives the same output ciphertext. This provides opportunities for skilled cryptanalysis to break the DES key

Triple DES (3DES) Where stronger security than DES is needed, many firms turn to triple DES which extends the effective key size of DES. Advanced Encryption Standard (AES) In response to the obsolescence of DES and the processing burdens of 3DES, NIST has released a new Advanced Encryption Standard (AES) which is efficient enough in terms of processing power and RAM requirements to use on a wide variety of devices.

Another class of encryption methods is public key encryption. Here, each party has a private key, which keeps secret from the world. In addition, each party has a public key as its name suggests, does not need to be kept secret.

The Basic Process Sending Whenever one party sends, it encrypts the plaintext with the public key of the receiver. When A sends to B, A encrypts with Bs public key. When B sends to A, B encrypts with As public key. Receiving Each receiver decrypts with its own private key. When A sends to B, B decrypts with Bs private key. In turn, when B sends to A, A decrypts with As private key. Once a message is encrypted with the receivers public key, nobody can decrypt it except the receiver. Even the sender cannot decrypt the message after encrypting it.

Encrypted Message

Party B

Encrypted Message

Disadvantage and Advantage Complexity, Processing Intensiveness and Short Messages Public key encryption probably strikes you as complex. In fact, it is. It requires many computer processing cycles to do public key encryption and decryption about 100 times as many cycles to do public key encryption requires. The efficiency of this processing burden is so large that public key encryption can be used to encrypt small messages. The Simplicity of Exchange Keys A major benefit of public key encryption is that public keys are not secret, so there is no need to exchange them securely. Many people post their public key online for everyone to read. In contrast with symmetric key encryption, each pair of communication partners needs to have a symmetric key that must be exchanged securely.

RSA The most widely used public key encryption method is RSA which is named for its creators, Rivest, Shamir and Adleman. RSA was patented but its patent expired in 2000. Now that RSA is in the public domain, its domination if public key encryption may grow. Unfortunately, most commercial implementation use a key of only 512 bits. This is now considered too small for safety. Companies are now advised to use 1024 bit keys for normal encryption and 2048 bit keys for highly sensitive applications. Elliptic Curve Cryptosystem (ECC) A newer form of public key encryption, the elliptic curve cryptosystem (ECC) promises to provide equal protection with smaller keys and therefore less processing burden.

The usual tool for encrypting email is the GNU Privacy Guard (GPG or GNU PG) package. This package is the open source re-implementation of the proprietary Pretty Good Privacy. In addition to encrypting entire messages, GPG enables you to digitally sign messages. Used in this way, messages can be read by recipients who lack the GPG software or appropriate keys; but those who have these tools can verify that the contents havent been tampered with. Generating and Importing Keys You need a private key and a public key. You can sign your messages with your private key and readers can verify it with your public key; or you can encrypt a message with another users pubic key and it can be decrypted only with that users private key. gpg - -gen-key The program will ask you series of questions . In most cases, answering with the defaults should work well, although you may have to type in your full name and email address. The keys are stored in the ~./gnupg directory. Once youve generated your keys, you can export your public key: gpg - -export name > gpg.pub This command saves the public key associated with the name in the file gpg.pub. You can use your email address as name.

You can then make your key available to other so that they may encrypt e-mail messages sent to you or verify your signed messages. Adding - -armor option produces ASCII output, which may be preferable if you intend to email the public key. You can make the file accessible on your website , transfer it as an email attachment or distribute it in other ways. To encrypt email you send to others, you must obtain their public keys. Ask your correspondents how to obtain them. Once youve done so, you can add their keys to your keyring (set of keys GPG maintains). gpg - -import filename This command adds filename to your set of public keys belonging to other people. Once youve created your own key and perhaps imported keys from others, you can see what keys are available by using the --list-keys option to gpg. gpg --list-keys /home/gel/.gnupg/pubring.gpg ------------------------------------------pub 1024/190EDB2E 2012-03-12 uid Ana Banana <ana@localhost.com> sub 2048g/0D657AC8 2012-03-12 pub 1024/A8B2061A uid sub 2048g/4F33EF6B 2012-03-12 Apple Mansanas <apol@localhost.com > 2012-03-12

The uid lines contains identifiers youll use when encrypting or decrypting data, so you should pay particular attention to that information. Encrypting and Decrypting Data To encrypt data, you use gpg with its --out and --encrypt options and optionally, --recipient and --armor: gpg --out encrypted-file --recipient uid --armor --encrypt original-file You can use the UID from a gpg list-keys output or just email address portion as the uid in this command. If you havent signed the recipients key, youll have to verify that you want to use that key. The result is the new file, encrypted-file which holds an encrypted version of original-file. If you omit the --armor option, the resulting file is a binary file, if you send it as email, youll need to send it as an attachment or otherwise encode it for transmission over the text-based email system. If you include the --armor option, the output is ASCII, so you can cut and paste the encrypted message into an email or send it as an attachment. If you receive a message or file that was created with your public key, you can reverse the encryption by using --decrypt option.

gpg --out decrypted-file --decrypt encrypted-file Youll be asked to enter your passphrase. The result should be the decrypted version of the original file. Signing Messages and Verifying Signatures As noted earlier, GPG can be used to sign messages so that recipients know they can from you. To do so, use the --sign or --clearsign option to gpg. gpg --clearsign original-file The --sign option creates a new file with the same name as the original but with .gpg appended to the filename. This file is encrypted using your private key, so that it may only be decrypted with your public key. This means that anybody with your public key may read the message, but anybody who can read it knows its from you. The --clearsign option works similarly but it leaves the message text unencrypted and only adds an encrypted signature that can only be verified using your public key. The --clearsign option creates a file with a name that ends in .asc If you received a signed message, you can verify the signature using the verify option to gpg gpg --verify received-file If any of the keys in your key ring can decode the message or verify the signature, gpg displays a Good signature message. To read a message that was encrypted with the --sign option, you must decrypt the message via the decrypt option.

- 16952_chapter 3 ClassabcTransféré parRajinder Kaur
- Transient Cryptographic Secrets with Multiple Rounds and Automatic Detection Using Dynamic AnalysisTransféré parInternational Journal for Scientific Research and Development - IJSRD
- 030309Transféré parnaga raju n
- 37. Comp Sci - Dual Congruent - Yahia S. Al- HalabiTransféré parTJPRC Publications
- 08240409.pdfTransféré parindupriya a
- Public KeyTransféré parSherin Zafar
- Secure Personal Health Records Using EncryptionTransféré parATS
- CryptographyTransféré parVikram Chandel
- 2. Management-Text Hiding Using RSA and BLOWFISH Algorithms With HLSB Technique-G.annapurnaTransféré parBESTJournals
- Keyword Search on Public Key Ciphertexts with Reduced Overhead using a Query Based Ranking SystemTransféré parIJIRST
- Public Key CryptographyTransféré parTanusri Ghosh
- AIS Chap 9.pdfTransféré parPhupungPrasiwi
- ImplementationTransféré parChetan Raju
- lecture+5+-+CryptoTransféré parUtkarsh Shrivatava
- DNA SECURITY USING SYMMETRIC AND ASYMMETRIC CRYPTOGRAPHYTransféré parInternational Journal of New Computer Architectures and their Applications (IJNCAA)
- CrossbowTransféré parMasooque Khan
- (Khan Lin Shenoy) PresentationTransféré parApqrs SK
- Table of ContentsTransféré parDar Vin
- cse7Transféré parAhilan Aahnia
- Riffle NetworkTransféré parForense Orlando
- 032-Magons.pdfTransféré parShahriman Dan Diana
- Security Features Lotus Notes Domino Groupware 587Transféré parSaravana Kumar
- 04 ContentsTransféré parsajeesh e s
- Appendix ATransféré parHemant Rhce
- IRJET-A Stroke concealed point method with integrated approach of Asymmetric Cryptography and SteganographyTransféré parIRJET Journal
- Stream Cipher Course-ITransféré parcarygrant_2003
- revCh7_1Transféré parMd. Fazlay Rabbi
- Scalable Key CryptographyTransféré parghionoiuc
- Us 8528109Transféré pardavid19775891
- Mobile Cloud Encrypted Searching and Traffic ReductionTransféré parEditor IJRITCC

- 2015 Dote Annual ReportTransféré parsamlagrone
- Forrester Vendor Landscape VM April 2017 (1)Transféré parRenato Oliveira
- WEB SECURITYTransféré parshailu163
- Biometric Fundamentals.pptxTransféré parAjay Mehta
- Information Security Practices of Aadhaar (or lack thereof)Transféré parFirstpost
- f84ac88a9c19e615c8e483a861ae601f.Decentralized Access Control and Anonymous Authentication of Data Stored in Clouds.pdfTransféré parBhaskar Rao P
- FortiMail Troubleshooting. Antispam IssuesTransféré parlig030
- antispam-handoutTransféré parmarcio_alima
- Key Avast FreeTransféré parsennohananto
- HHS En7 Attack Analysis.v2Transféré parBj Benitez
- DoubleSec a novel 2 factor authentication for mobile devicesTransféré partobias_christen
- https://www.scribd.com/document/350048632/Ethical-Hacking-and-Countermeasures-Attack-Phases-EC-Council-pdfTransféré parMani jkm
- Prosecco ProposalTransféré parAshwin Josiah Samuel
- Annual Report 2015–16Transféré parzubinfbbfan
- Secure Authentication of Cloud Data Mining APITransféré parRohit Bhadauria
- Cyber Security QuestionnaireTransféré parSyeda Ashifa Ashrafi Papia
- Cookbook.fortinet.com-Publish OWA Using FortiWebTransféré pareva
- IJEART02301Transféré parerpublication
- Smart Grid Threat Landscape and Good Practice Guide.pdfTransféré parGábor Kárpáti
- Five Issues of the BmwTransféré parShubham Gautam
- Best Practices Securing EcommerceTransféré parjunior_00
- lecture1Transféré parapi-281609149
- New Text DocumentTransféré parBùi Thị Thu Liểu
- AgendaTransféré parsergiornunes
- 10.1109@CSCN.2017.8088629Transféré parBelinda Angel
- Computerized EnrollmentTransféré parJeremy Eugerio
- e BusinessTransféré parMayank Gupta
- List MoocsTransféré parSri Navin
- Csnb414 Lab 1Transféré parEmir Razak
- cis3400_bds_pp12Transféré parcuongbkav1989