An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... ·...
Transcript of An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... ·...
![Page 1: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/1.jpg)
CR
AnIntroduc+ontoAppliedCryptography
ChesterRebeiroIITMadras
![Page 2: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/2.jpg)
CR
ConnectedandStoredEverythingisconnected!
2
Everythingisstored!
![Page 3: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/3.jpg)
CR
IncreasedSecurityBreaches
81%morein2015
h9p://www.pwc.co.uk/assets/pdf/2015-isbs-execuGve-summary-02.pdf
3
![Page 4: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/4.jpg)
CR
SecurityThreats(whydifficulttoprevent?)
A9ackersneedtotargettheweakestlinkinthechain
Networks/CommunicaGonlinks
Hardware
Peripherals
SystemSoPware(OperaGngSystems/Hypervisor)
ApplicaGons
4
![Page 5: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/5.jpg)
CR
SecurityStudies(Research)Networks/CommunicaGonlinks
Hardware
Peripherals
SystemSoPware(OperaGngSystems/Hypervisor)
ApplicaGons
NetworkSecurity
HardwareSecurity
SystemSecurity
OSSecurity
CloudSecurityWebSecurity
DBMSSecurity
EmbeddedSecurity
Cryptography
5
![Page 6: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/6.jpg)
CR
Cryptography
• Acrucialcomponentinallsecuritysystems• Fundamentalcomponenttoachieve
– Confiden+ality
Allowsonlyauthorizedusersaccesstodata
6
![Page 7: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/7.jpg)
CR
Cryptography(itsuse)
• Acrucialcomponentinallsecuritysystems• Fundamentalcomponenttoachieve
– ConfidenGality– DataIntegrity
CryptographycanbeusedtoensurethatonlyauthorizeduserscanmakemodificaGons(forinstancetoabankaccountnumber)
7
![Page 8: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/8.jpg)
CR
Cryptography(itsuse)
• Acrucialcomponentinallsecuritysystems• Fundamentalcomponenttoachieve
– ConfidenGality– DataIntegrity– Authen+ca+on
CryptographyhelpsproveidenGGes
8
![Page 9: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/9.jpg)
CR
Cryptography(itsuse)
• Acrucialcomponentinallsecuritysystems• Fundamentalcomponenttoachieve
– ConfidenGality– DataIntegrity– AuthenGcaGon– Non-repudia+on
Thesenderofamessagecannotclaimthatshedidnotsendit
Ididnotsendthat
9
![Page 10: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/10.jpg)
CR
SchemeforConfiden+ality
Alice Bob
messageA9ackatDawn!!
untrustedcommunicaGonlink
MalloryProblem:AlicewantstosendamessagetoBob(andonlytoBob)throughanuntrustedcommunicaGonlink
10
![Page 11: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/11.jpg)
CR
Encryp+on
Alice Bob
message“A9ackatDawn!!”
untrustedcommunicaGonlink
MallorySecrets• OnlyAliceknowstheencrypGonkeyKE• OnlyBobknowsthedecrypGonkeyKD
E D
KE KD
“A9ackatDawn!!”encrypGon decrypGon
#%AR3Xf34^$(ciphertext)
Onlyseesciphertext.cannotgettheplaintextmessagebecauseshedoesnotknowthekeys
11
![Page 12: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/12.jpg)
CR
Encryp+onAlgorithms
Alice BobuntrustedcommunicaGonlinkE D
KE KD
“A9ackatDawn!!”encrypGon decrypGon
#%AR3Xf34($(ciphertext)
• ShouldbeeasytocomputeforAlice/Bob(whoknowthekey)• ShouldbedifficulttocomputeforMallory(whodoesnotknowthekey)• Whatis‘difficult’?
• Idealcase:ProvethattheprobabilityofMallorydeterminingtheencrypGon/decrypGonkeyisnobe&erthanarandomguess
• Computa+onally:ShowthatitisdifficultforMallorytodeterminethekeysevenifshehasmassivecomputaGonalpower
12
![Page 13: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/13.jpg)
CR
Ciphers• SymmetricAlgorithms
– EncrypGonandDecrypGonusethesamekey– i.e.KE=KD– Examples:
• BlockCiphers:DES,AES,PRESENT,etc.• StreamCiphers:A5,Grain,etc.
• AsymmetricAlgorithms– EncrypGonandDecrypGonkeysaredifferent– KE≠KD– Examples:
• RSA• ECC
13
E D
![Page 14: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/14.jpg)
CR
Encryp+onKeys
• Howarekeysmanaged– HowdoesAlice&Bobselectthekeys?– Needalgorithmsforkeyexchange
14
Alice BobuntrustedcommunicaGonlinkE D
KE KD
“A9ackatDawn!!”encrypGon decrypGon
#%AR3Xf34($(ciphertext)
![Page 15: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/15.jpg)
CR
AlgorithmicARacks
• CanMalloryusetrickstobreakthealgorithm
• Therebyreducingthe‘difficulty’ofgemngthekey.
15
E
![Page 16: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/16.jpg)
CR
CipherImplementa+ons
Cryptographyisalwaysanoverhead!!• Forsecurity,thealgorithmsneedtobecomputaGon
intensive.• OPenrequirelargenumbers,complexmathemaGcaloperaGons.
• DesignChallenges:Performance,Size,Power.• Algorithmstoachievethis
16
E
![Page 17: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/17.jpg)
CR
Implementa+onARacks(SideChannelAnalysis)
Alice Bob
message“A9ackatDawn!!”
untrustedcommunicaGonlink
MallorySideChannelsEg.Powerconsump+on/radia+onofdevice,execu+on+me,etc.
E D
KE KD
“A9ackatDawn!!”encrypGon decrypGon
#%AR3Xf34($(ciphertext)
GetsinformaGonaboutthekeysbymonitoringSidechannelsofthedevice
sidechannels
17
![Page 18: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/18.jpg)
CR
SideChannelAnalysis
18
Radia+onfromDevice
0 1 1 1Secretinforma+on 0 1
Alice
message“A9ackatDawn!!”
E
00111
encrypGon
![Page 19: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/19.jpg)
CR
CiphersDesignChallenges
Wewantcryptoalgorithmstobefastandsmall
Forsecurity,thealgorithmsarecomputaGonallyintensive.Typicallyuselargenumbers,complexoperaGons
Needtoprotectagainstsidechannela9acks.
TradeoffsbetweenSecurity,Speed,Side-ChannelARacks
![Page 20: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/20.jpg)
CR
CryptographyStudy
• MathemaGcs+EngineeringMathemaGcs ElectricalEngg.
ComputerSc.
cryptography
20
Physics
![Page 21: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/21.jpg)
CR
SomeHotResearchTrends
21
lightweightcryptographypost-quantumcryptography
Leakageresilientcryptographysidechannelanalysis
efficientimplementaGons
cryptanalysis
cloudsecurityhomomorphicencrypGon
privacyenhancingsecurity
![Page 22: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/22.jpg)
CR
ThePlanAhead• Howareciphersdesigned?
– IdealsecurityvsComputaGonalsecurity– Blockciphers/Streamciphers – AsymmetricKeyciphers– TradeoffsbetweensecurityandimplementaGon
• ARacks– Algorithmic/ImplementaGonbasedA9acks
• Applica+ons– HowaretheyusedtoachieveconfidenGality,integrity,authenGcaGon,
non-repudiaGon
• CaseStudies– KeyEstablishments,DigitalSignatures,Bitcoins
22
![Page 23: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/23.jpg)
CR
CourseStructure• ClassicalCryptography• Shannon’sTheory• BlockCiphers
– DES,AES,theirimplementaGonsandtheira9acks• StreamCiphers• DigitalSignaturesandAuthenGcaGon
– HashfuncGons• Publickeyciphers
– RSA,implementaGons,anda9acks– ECC
• Sidechannelanalysis• CaseStudies:Bitcoins
23
![Page 24: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/24.jpg)
CR
ExpectedLearningOutcomes
24
• Whatyouwouldlearnbytheendofthecourse?§ DisGnguishbetweencipheralgorithms
- Wheretousewhatalgorithm?
§ EvaluateciphersandtheirimplementaGonsforsecurity- MathemaGcalcryptanalysisofsomealgorithms- Sidechannelbaseda9acksoncipherimplementaGons
§ Applyalgorithmstosolvesecurityproblemsinreal-worldsystems
![Page 25: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/25.jpg)
CR
Books/References
25
Textbooks (STINSON) ''Cryptography: Theory and Practice", Third Edition, by Douglas R. Stinson, CRC Press, Taylor and Francis Group References (STALLINGS) ''Cryptography and Network Security: Principles and Practices'', Sixth Edition, by William Stallings (HANDBOOK) ''Handbook of Applied Cryptography'', Fifth Printing, by Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, CRC Press
![Page 26: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/26.jpg)
CR
Grading
• Quiz1:20%on(18/2/2016)• Quiz2:20%on(25/3/2016)• Endsemester:30%on(28/4/2016)• Assignments:15%• Tutorials:15%
26
![Page 27: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/27.jpg)
CR
CourseWebpages
• Forslides/syllabus/scheduleetc.
• Fordiscussions/announcements/submissions
CSEMoodleGoogleGroups(aciitm_2017)
27
h9p://www.cse.iitm.ac.in/~chester/courses/17e_ac/index.html
![Page 28: An Introduc+on to Applied Cryptography › ~chester › courses › 17e_ac › slides › 01... · 2017-01-09 · (STINSON) ''Cryptography: Theory and Practice", Third Edition, by](https://reader035.fdocuments.in/reader035/viewer/2022081407/5f26899b63c5bd1749756b09/html5/thumbnails/28.jpg)
CR
Logis+cs
• CS36• Time:
– Tuesdays:11:00-11:50AM– Wednesdays:10:00-10:50AM– Thursdays:8:00-8:50AM– Fridays:4:50–5:40PM
28