Session5 Cryptograph
Session5 Cryptograph
DEFENSIVE TECHNOLOGIES
Lecture 5
Session 5: CRYPTOGRAPHY
[email protected]
College of Education
School of Continuing and Distance Education
Session Overview
• This session covers the basics of cryptography, and
introduces the students to various cryptographic
algorithms.
CRYPTANALYSIS METHODS
Modern Cryptanalysis Methods
• Cryptanalysis: study of breaking encryption methods
– New attacks emerge constantly
– Security professionals must keep up to date on threats and
countermeasures
– Rely on expertise of mathematicians who design
algorithms
Side Channel Attacks
• Attacks underlying systems that leak information
– Leaks are unintentional signals (emanations) that could
expose information being processed
– Types of side channel attacks:
• Timing attacks
• Power monitoring attacks
• Acoustic cryptanalysis
• Radiation monitoring
• Thermal imaging attack
– Countermeasures include power conditioning and UPSs,
shielding, and strong physical security
Passive Attacks
• Cryptanalysts observe data being transmitted
– Eavesdrop on transmissions
– Detecting this kind of attack is difficult
– Countermeasures focus on using strong encryption
Chosen Ciphertext and Chosen
Plaintext Attacks
• Chosen ciphertext attack: attacker selects a captured
encrypted message and decrypts it with an unknown
key
– Sometimes uses a decryption oracle (a device that
decrypts ciphertext messages)
– Can be prevented by using correct cryptographic padding
values or redundancy checks
• Chosen plaintext attack: attacker selects arbitrary
plaintext messaged to be encrypted
– Public key encryption algorithms that are not randomized
are vulnerable
– Countermeasures are based on randomized encryption
Related Key Attacks
• A form of cryptanalysis in which attackers can
observe a cipher’s operation by using several
different keys
– Initial values are unknown, but a mathematical
relationship connecting the keys is known
– Wired Equivalent Privacy (WEP) failed because of related
key attacks
• WPA2 or 802.11i is recommended to be used instead of WEP
– To defend against related key attacks, use of a
cryptographic protocol (such as AES) is advised
Integral Cryptanalysis
• This attack uses sets of chosen plaintext messages
that share a common constant
– Each set of messages shares a constant value, and the
remainder of each plaintext message is tried with all
possible variables
• Applicable to block ciphers that use a substitution-
permutation network
– Rijndael, Twofish, and IDEA are examples
Differential Cryptanalysis
• This attack examines how differences in input affect
the output
– Uses pairs of plaintext messages related by a constant
difference
– By computing differences, attackers might be able to find
statistical patterns
• Applies mainly to block ciphers but can also be used
against stream ciphers and hashing functions
• Goal of cryptographers is to prevent or mask
predictable behavior
Summary, Part 1
• Cryptography is the process of converting plaintext
into ciphertext by using an encoding function
• Cryptographic primitives are modular mathematical
functions that are building blocks of cryptography
• An encryption algorithm is a set of instructions that
provides the encoding function to a cryptographic
system
• Symmetric algorithms use a shared key in a private
key exchange
• Asymmetric algorithms use two keys
Summary, Part 2
• Digital signatures use hashing algorithms with
asymmetric encryption for verifying message integrity
• Public-key Infrastructure (PKI) components include
certificates, certification authorities (CAs), registration
authorities (RAs), certificate revocation lists (CRLs),
and message digests
• Cryptographic protocols describe how algorithms
should be used
– DES, 3DES, and AES are examples
Summary, Part 3
• Wireless network cryptographic protocols include
WEP, WPA, and 802.11i
• Internet security protocols include SSL, SSH, and TLS
• IPsec is a cryptographic protocol used for Internet,
VPN, and network security
• Attacks on cryptographic systems include side
channel attacks, passive attacks, chosen ciphertext
and chosen plaintext attacks, random number
generator attacks, and XSL attacks
END
» Thank you