SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Computer and Network Security
Lecture 6
JCE tutorial
♦ In class next Wednesday
♦ HW1 will use it
Assigned readings from lecture 1
♦ “Inside the Twisted Mind of the Security
Professional”
♦ “We are All Security Customers”
♦ “Information Security and Externalities”
♦ Comments?
A high-level survey of
cryptography
Caveats
♦ Everything I present will be (relatively) informal
– I may simplify, but I will not say anything that is an
outright lie…
♦ Cryptography offers formal definitions and
rigorous proofs of security (neither of which we
will cover here)
– For more details, take CMSC 456 in the Fall (or read
my book)!
♦ If you think you already know cryptography from
somewhere else (CMSC456, CISSP, your job, the
news), you are probably mistaken
Goals of cryptography
♦ Crypto deals primarily with three goals:
– Confidentiality
– Integrity (of data)
– Authentication (of resources, people, systems)
♦ Other goals also considered
– E.g., non-repudiation
– E-cash (e.g., double spending)
– General secure multi-party computation
– Anonymity
– …
Private- vs. public-key settings
♦ For the basic goals, there are two settings:
– Private-key / shared-key / symmetric-key / secret-key
– Public-key
♦ The private-key setting is the “classical” one
(thousands of years old)
♦ The public-key setting dates to the 1970s
Private-key cryptography
♦ The communicating parties share some
information that is random and secret
– This shared information is called a key
– Key is not known to an attacker
– This key must be shared (somehow) in advance of their
communication
To emphasize
♦ Alice and Bob share a key K
– Must be shared securely
– Must be completely random
– Must be kept completely secret from attacker
♦ We don’t discuss (for now) how they do this
– You can imagine they meet on a dark street corner and
Alice hands a USB device (with a key on it) to Bob
Private-key cryptography
♦ For confidentiality:
– Private-key (symmetric-key) encryption
♦ For data integrity:
– Message authentication codes
Canonical applications
♦ Two (or more) distinct parties communicating
over an insecure network
– E.g., secure communication
♦ A single party who is communicating “with itself”
over time
– E.g., secure storage
Alice Bob
shared infoK K
Alice
K
Bob
K
Bob
K
Bob
K
Security?
♦ We will specify the exact threat model being
addressed
♦ We will also specify the security guarantees that
are ensured, within this threat model
– Here: informally; CMSC 456: formally
♦ Crucial to understand these issues before crypto
can be successfully deployed!
– Make sure the stated threat model matches your
application
– Make sure the security guarantees are what you need
Security through obscurity?
♦ Always assume that the full details of crypto
protocols and algorithms are public
– Known as Kerckhoffs’ principle
– The only secret information is a key
♦ “Security through obscurity” is a bad idea…
– True in general; even more true in the case of
cryptography
– Home-brewed solutions are BAD!
– Standardized, widely-accepted solutions are GOOD!
Security through obscurity?
♦ Why not?
♦ Easier to maintain secrecy of a key than an
algorithm
– Reverse engineering
– Social engineering
– Insider attacks
♦ Easier to change the key than the algorithm
♦ In general setting, much easier to share an
algorithm than for everyone to use their own
Private-key encryption
Functional definition
♦ Encryption algorithm:
– Takes a key and a message (plaintext), and outputs a
ciphertext
– c ← EK(m) possibly randomized!
♦ Decryption algorithm:
– Takes a key and a ciphertext, and outputs a message (or
perhaps an error)
– m = DK(c)
♦ Correctness: for all K, we have DK(EK(m)) = m
♦ We have not yet said anything about security…
Alice Bob
shared infoK K
Alice
K
Bob
K
c
c←EK(m) m=DK(c)
A classic example: shift cipher
♦ Assume the English uppercase alphabet (no
lowercase, punctuation, etc.)
– View letters as numbers in {0, …, 25}
♦ The key is a random letter of the alphabet
♦ Encryption done by addition modulo 26
♦ Is this secure?
– Exhaustive key search
– Automated determination of the key
Another example: substitution cipher
♦ The key is a random permutation of the alphabet
– Note: key space is huge!
♦ Encryption done in the natural way
♦ Is this secure?
– Frequency analysis
♦ A large key space is necessary, but not sufficient,
for security
Another example: Vigenere cipher
♦ More complicated version of shift cipher
♦ Believed to be secure for over 100 years
♦ Is it secure?
Attacking the Vigenere cipher
♦ Let pi (for i=0, …, 25) denote the frequency of
letter i in English-language text
– Known that Σ pi
2
≈ 0.065
♦ For each candidate period t, compute frequencies
{qi} of letters in the sequence c0, ct, c2t, …
♦ For the correct value of t, we expect Σ qi
2
≈ 0.065
– For incorrect values of t, we expect Σ qi
2
≈ 1/26
♦ Once we have the period, can use frequency
analysis as in the case of the shift cipher
Moral of the story?
♦ Don’t use “simple” schemes
♦ Don’t use schemes that you design yourself
– Use schemes that other people have already designed
and analyzed…
A fundamental problem
♦ A fundamental problem with “classical”
cryptography is that no definition of security was
ever specified
– It was not even clear what it meant for a scheme to be
“secure”
♦ As a consequence, proving security was not even
an option
– So how can you know when something is secure?
– (Or is at least based on well-studied, widely-believed
assumptions)
Defining security?
♦ What is a good definition?
♦ Why is a good definition important?
Security goals?
♦ Adversary unable to recover the key
– Necessary, but meaningless on its own…
♦ Adversary unable to recover entire plaintext
– Good, but is it enough?
♦ Adversary unable to determine any information at
all about the plaintext
– Formalize?
– Sounds great!
– Can we achieve it?
Note
♦ Even given our definition, we need to consider the
threat model
– Multiple messages or a single message?
– Passive/active adversary?
– Chosen-plaintext attacks?
♦ The threat model matters!
– The classical ciphers we have seen are immediately
broken by a known-plaintext attack
Defining secrecy (take 1)
♦ Even an adversary running for an unbounded
amount of time learns nothing about the message
from the ciphertext
♦ Perfect secrecy
♦ Formally, for all distributions over the message
space, all m, and all c:
Pr[M=m | C=c] = Pr[M=m]
Next time: the one-time pad;
its limitations;
overcoming these limitations

Weitere ähnliche Inhalte

Was ist angesagt?

cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free downloadTwinkal Harsora
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
Cryptography and encryption
Cryptography and  encryptionCryptography and  encryption
Cryptography and encryptionAncy Mariam Babu
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptographychauhankapil
 
information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...Zara Nawaz
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSAAmit Debnath
 
Cryptology - Antônio Lacerda
Cryptology - Antônio LacerdaCryptology - Antônio Lacerda
Cryptology - Antônio LacerdaRodrigo Almeida
 
Cryptography
CryptographyCryptography
CryptographyAnandKaGe
 
Cryptography
CryptographyCryptography
CryptographyAmbuj Rai
 

Was ist angesagt? (19)

Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Cryptography and encryption
Cryptography and  encryptionCryptography and  encryption
Cryptography and encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
 
Cryptography
CryptographyCryptography
Cryptography
 
Network Security Topic 4 cryptography2
Network Security Topic 4 cryptography2Network Security Topic 4 cryptography2
Network Security Topic 4 cryptography2
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cryptology - Antônio Lacerda
Cryptology - Antônio LacerdaCryptology - Antônio Lacerda
Cryptology - Antônio Lacerda
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Data Encryption
Data EncryptionData Encryption
Data Encryption
 
Criptography
CriptographyCriptography
Criptography
 
Ccn
CcnCcn
Ccn
 
Cryptography
CryptographyCryptography
Cryptography
 

Andere mochten auch

Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Securityprimeteacher32
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarDaniel Versola
 
Palo Alto Networks - Just another Firewall
Palo Alto Networks - Just another FirewallPalo Alto Networks - Just another Firewall
Palo Alto Networks - Just another Firewallpillardata
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...SWITCHPOINT NV/SA
 
CISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy CourseCISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy CourseAdrian Mikeliunas
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Introduction to information technology lecture 1
Introduction to information technology lecture 1Introduction to information technology lecture 1
Introduction to information technology lecture 1adpafit
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devicesRajesh Sadhukha
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkAshita Agrawal
 

Andere mochten auch (18)

Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
Palo Alto Networks - Just another Firewall
Palo Alto Networks - Just another FirewallPalo Alto Networks - Just another Firewall
Palo Alto Networks - Just another Firewall
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
CISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy CourseCISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy Course
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Modem presentation
Modem presentationModem presentation
Modem presentation
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Modem
ModemModem
Modem
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Introduction to information technology lecture 1
Introduction to information technology lecture 1Introduction to information technology lecture 1
Introduction to information technology lecture 1
 
Network security
Network securityNetwork security
Network security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Ähnlich wie Computer and Network Security

Ähnlich wie Computer and Network Security (20)

Security.ppt
Security.pptSecurity.ppt
Security.ppt
 
Cryptography for developers
Cryptography for developersCryptography for developers
Cryptography for developers
 
Network security
Network securityNetwork security
Network security
 
5967073.ppt
5967073.ppt5967073.ppt
5967073.ppt
 
lec1.pdf
lec1.pdflec1.pdf
lec1.pdf
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
amer-network-sihubconferances-security.ppt
amer-network-sihubconferances-security.pptamer-network-sihubconferances-security.ppt
amer-network-sihubconferances-security.ppt
 
20 security
20 security20 security
20 security
 
Security & Cryptography In Linux
Security & Cryptography In LinuxSecurity & Cryptography In Linux
Security & Cryptography In Linux
 
Week12
Week12Week12
Week12
 
Kleptography
KleptographyKleptography
Kleptography
 
Computer Security.ppt
Computer Security.pptComputer Security.ppt
Computer Security.ppt
 
Ch02 classic nemo
Ch02 classic nemoCh02 classic nemo
Ch02 classic nemo
 
Presentacion diapositiva 40
Presentacion diapositiva 40Presentacion diapositiva 40
Presentacion diapositiva 40
 
Security fundamentals
Security fundamentalsSecurity fundamentals
Security fundamentals
 
Security Fundamentals
Security FundamentalsSecurity Fundamentals
Security Fundamentals
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
 
3. Cryptographic Security
3. Cryptographic Security3. Cryptographic Security
3. Cryptographic Security
 
Truth and Consequences
Truth and ConsequencesTruth and Consequences
Truth and Consequences
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 

Mehr von Muhammad Yousuf Abdul Qadir (14)

The Initial Public Offering (IPO)
The Initial Public Offering (IPO)The Initial Public Offering (IPO)
The Initial Public Offering (IPO)
 
Overview of Working Capital Management
Overview of Working Capital ManagementOverview of Working Capital Management
Overview of Working Capital Management
 
Introduction to computing
Introduction to computingIntroduction to computing
Introduction to computing
 
Software project management- Software Engineering
Software project management- Software EngineeringSoftware project management- Software Engineering
Software project management- Software Engineering
 
Uml diagrams
Uml diagramsUml diagrams
Uml diagrams
 
Asymptotic notation
Asymptotic notationAsymptotic notation
Asymptotic notation
 
World Com Corporate Fraud and its Fall
World Com Corporate Fraud and its FallWorld Com Corporate Fraud and its Fall
World Com Corporate Fraud and its Fall
 
Samples and Its types
Samples and Its typesSamples and Its types
Samples and Its types
 
Production funtion Least cost Combination
Production funtion Least cost CombinationProduction funtion Least cost Combination
Production funtion Least cost Combination
 
Production function and its functions
Production function and its functionsProduction function and its functions
Production function and its functions
 
Software process model
Software process modelSoftware process model
Software process model
 
Effect of capital structure on bank’s profitability
Effect of capital structure on bank’s profitabilityEffect of capital structure on bank’s profitability
Effect of capital structure on bank’s profitability
 
INTRODUCTION TO BUISNESS
INTRODUCTION TO BUISNESSINTRODUCTION TO BUISNESS
INTRODUCTION TO BUISNESS
 
Economic resources
Economic resourcesEconomic resources
Economic resources
 

Kürzlich hochgeladen

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 

Kürzlich hochgeladen (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 

Computer and Network Security

  • 1. Computer and Network Security Lecture 6
  • 2. JCE tutorial ♦ In class next Wednesday ♦ HW1 will use it
  • 3. Assigned readings from lecture 1 ♦ “Inside the Twisted Mind of the Security Professional” ♦ “We are All Security Customers” ♦ “Information Security and Externalities” ♦ Comments?
  • 4. A high-level survey of cryptography
  • 5. Caveats ♦ Everything I present will be (relatively) informal – I may simplify, but I will not say anything that is an outright lie… ♦ Cryptography offers formal definitions and rigorous proofs of security (neither of which we will cover here) – For more details, take CMSC 456 in the Fall (or read my book)! ♦ If you think you already know cryptography from somewhere else (CMSC456, CISSP, your job, the news), you are probably mistaken
  • 6. Goals of cryptography ♦ Crypto deals primarily with three goals: – Confidentiality – Integrity (of data) – Authentication (of resources, people, systems) ♦ Other goals also considered – E.g., non-repudiation – E-cash (e.g., double spending) – General secure multi-party computation – Anonymity – …
  • 7. Private- vs. public-key settings ♦ For the basic goals, there are two settings: – Private-key / shared-key / symmetric-key / secret-key – Public-key ♦ The private-key setting is the “classical” one (thousands of years old) ♦ The public-key setting dates to the 1970s
  • 8. Private-key cryptography ♦ The communicating parties share some information that is random and secret – This shared information is called a key – Key is not known to an attacker – This key must be shared (somehow) in advance of their communication
  • 9. To emphasize ♦ Alice and Bob share a key K – Must be shared securely – Must be completely random – Must be kept completely secret from attacker ♦ We don’t discuss (for now) how they do this – You can imagine they meet on a dark street corner and Alice hands a USB device (with a key on it) to Bob
  • 10. Private-key cryptography ♦ For confidentiality: – Private-key (symmetric-key) encryption ♦ For data integrity: – Message authentication codes
  • 11. Canonical applications ♦ Two (or more) distinct parties communicating over an insecure network – E.g., secure communication ♦ A single party who is communicating “with itself” over time – E.g., secure storage
  • 12. Alice Bob shared infoK K Alice K Bob K
  • 14. Security? ♦ We will specify the exact threat model being addressed ♦ We will also specify the security guarantees that are ensured, within this threat model – Here: informally; CMSC 456: formally ♦ Crucial to understand these issues before crypto can be successfully deployed! – Make sure the stated threat model matches your application – Make sure the security guarantees are what you need
  • 15. Security through obscurity? ♦ Always assume that the full details of crypto protocols and algorithms are public – Known as Kerckhoffs’ principle – The only secret information is a key ♦ “Security through obscurity” is a bad idea… – True in general; even more true in the case of cryptography – Home-brewed solutions are BAD! – Standardized, widely-accepted solutions are GOOD!
  • 16. Security through obscurity? ♦ Why not? ♦ Easier to maintain secrecy of a key than an algorithm – Reverse engineering – Social engineering – Insider attacks ♦ Easier to change the key than the algorithm ♦ In general setting, much easier to share an algorithm than for everyone to use their own
  • 18. Functional definition ♦ Encryption algorithm: – Takes a key and a message (plaintext), and outputs a ciphertext – c ← EK(m) possibly randomized! ♦ Decryption algorithm: – Takes a key and a ciphertext, and outputs a message (or perhaps an error) – m = DK(c) ♦ Correctness: for all K, we have DK(EK(m)) = m ♦ We have not yet said anything about security…
  • 19. Alice Bob shared infoK K Alice K Bob K c c←EK(m) m=DK(c)
  • 20. A classic example: shift cipher ♦ Assume the English uppercase alphabet (no lowercase, punctuation, etc.) – View letters as numbers in {0, …, 25} ♦ The key is a random letter of the alphabet ♦ Encryption done by addition modulo 26 ♦ Is this secure? – Exhaustive key search – Automated determination of the key
  • 21. Another example: substitution cipher ♦ The key is a random permutation of the alphabet – Note: key space is huge! ♦ Encryption done in the natural way ♦ Is this secure? – Frequency analysis ♦ A large key space is necessary, but not sufficient, for security
  • 22. Another example: Vigenere cipher ♦ More complicated version of shift cipher ♦ Believed to be secure for over 100 years ♦ Is it secure?
  • 23. Attacking the Vigenere cipher ♦ Let pi (for i=0, …, 25) denote the frequency of letter i in English-language text – Known that Σ pi 2 ≈ 0.065 ♦ For each candidate period t, compute frequencies {qi} of letters in the sequence c0, ct, c2t, … ♦ For the correct value of t, we expect Σ qi 2 ≈ 0.065 – For incorrect values of t, we expect Σ qi 2 ≈ 1/26 ♦ Once we have the period, can use frequency analysis as in the case of the shift cipher
  • 24. Moral of the story? ♦ Don’t use “simple” schemes ♦ Don’t use schemes that you design yourself – Use schemes that other people have already designed and analyzed…
  • 25. A fundamental problem ♦ A fundamental problem with “classical” cryptography is that no definition of security was ever specified – It was not even clear what it meant for a scheme to be “secure” ♦ As a consequence, proving security was not even an option – So how can you know when something is secure? – (Or is at least based on well-studied, widely-believed assumptions)
  • 26. Defining security? ♦ What is a good definition? ♦ Why is a good definition important?
  • 27. Security goals? ♦ Adversary unable to recover the key – Necessary, but meaningless on its own… ♦ Adversary unable to recover entire plaintext – Good, but is it enough? ♦ Adversary unable to determine any information at all about the plaintext – Formalize? – Sounds great! – Can we achieve it?
  • 28. Note ♦ Even given our definition, we need to consider the threat model – Multiple messages or a single message? – Passive/active adversary? – Chosen-plaintext attacks? ♦ The threat model matters! – The classical ciphers we have seen are immediately broken by a known-plaintext attack
  • 29. Defining secrecy (take 1) ♦ Even an adversary running for an unbounded amount of time learns nothing about the message from the ciphertext ♦ Perfect secrecy ♦ Formally, for all distributions over the message space, all m, and all c: Pr[M=m | C=c] = Pr[M=m]
  • 30. Next time: the one-time pad; its limitations; overcoming these limitations