0% found this document useful (0 votes)
65 views42 pages

Cryptography: Class of S2 Information Tech Security Muhammad N Rizal

Cryptography is the process of securing communication by converting messages into unreadable formats. It involves encryption to encrypt messages and cryptanalysis to decrypt encrypted messages. Popular cryptographic techniques include symmetric encryption using keys like AES and asymmetric encryption using public/private key pairs. Secure communication protocols leverage these techniques, with examples being SSL/TLS for websites, S/MIME for email, and IPSec for network traffic. Key sizes, hash functions, digital signatures, and certificates help ensure security.

Uploaded by

Dyah Lu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views42 pages

Cryptography: Class of S2 Information Tech Security Muhammad N Rizal

Cryptography is the process of securing communication by converting messages into unreadable formats. It involves encryption to encrypt messages and cryptanalysis to decrypt encrypted messages. Popular cryptographic techniques include symmetric encryption using keys like AES and asymmetric encryption using public/private key pairs. Secure communication protocols leverage these techniques, with examples being SSL/TLS for websites, S/MIME for email, and IPSec for network traffic. Key sizes, hash functions, digital signatures, and certificates help ensure security.

Uploaded by

Dyah Lu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 42

Cryptography

Class of S2 Information Tech


Security
Muhammad N Rizal
Objectives
• Describe the most significant events and
discoveries from the history of cryptology
• Understand the basic principles of
cryptography
• Understand the operating principles of the
most popular tools in the area of cryptography
• List and explain the major protocols used for
secure communications
• Understand the nature and execution of the
dominant methods of attack used against
cryptosystems
Introduction
• Cryptography: process of making and using
codes to secure transmission of information
• Encryption: converting original message into a
form unreadable by unauthorized individuals
• Cryptanalysis: process of obtaining original
message from encrypted message without
knowing algorithms
• Cryptology: science of encryption; combines
cryptography and cryptanalysis
Principles of Cryptography

• With emergence of technology, need for


encryption in information technology
environment greatly increased
• All popular Web browsers use built-in
encryption features for secure e-commerce
applications
Cipher Methods

• Plaintext can be encrypted through bit stream or


block cipher method
• Bit stream: each plaintext bit transformed into
cipher bit one bit at a time
• Block cipher: message divided into blocks (e.g.,
sets of 8- or 16-bit blocks) and each is
transformed into encrypted block of cipher bits
using algorithm and key
Elements of Cryptosystems
• Cryptosystems typically made up of algorithms,
data handling techniques, and procedures
• Substitution cipher: substitute one value for
another
• Monoalphabetic substitution: uses only one
alphabet
• Polyalphabetic substitution: more advanced; uses
two or more alphabets
• Vigenère cipher: advanced cipher type that uses
simple polyalphabetic code; made up of 26 distinct
cipher alphabets
1. Cipher Substitusi - Caesar Cipher

• Tiap huruf alfabet digeser 3 huruf ke kanan

pi : A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
ci : D E F G H I J K L M N O P Q R S T U V W X Y Z A B C

• Contoh:
Plainteks: AWASI ASTERIX DAN TEMANNYA OBELIX
Cipherteks: DZDVL DVWHULA GDQ WHPDQQBA REHOLA
1. Cipher Substitusi - Vigènere Cipher

• Contoh penerapan Vigènere Cipher :


Plainteks : THIS PLAINTEXT
Kunci : sony sonysonys
Cipherteks : LVVQ HZNGFHRVL
• Jika panjang kunci lebih pendek daripada
panjang plainteks, maka kunci diulang secara
periodik. Dalam hal ini Kunci “sony” diulang
sebanyak panjang plaintext-nya
Elements of Cryptosystems
(continued)
• Transposition cipher: rearranges values
within a block to create ciphertext
• Exclusive OR (XOR): function of Boolean
algebra; two bits are compared
– If two bits are identical, result is binary 0
– If two bits not identical, result is binary 1
2. Cipher Transposisi (Contoh)
Contoh: Misalkan plainteks adalah
POLITEKNIK ELEKTRONIKA NEGERI SURABAYA

Enkripsi:
POLITEK
NIKELEK
TRONIKA
NEGERIS
URABAYA

Cipherteks: (baca secara vertikal)


PNTNUOIRERLKOGAIENEBTLIRAEEKIYKKASA
PNTN UOIR ERLK OGAI ENEB TLIR AEEK IYKK ASA
Elements of Cryptosystems
(continued)
• Vernam cipher: developed at AT&T; uses set of
characters once per encryption process
• Book (running key) cipher: uses text in book as
key to decrypt a message; ciphertext contains
codes representing page, line and word
numbers
Hash Functions
• Mathematical algorithms that generate message
summary/digest to confirm message identity and
confirm no content has changed
• Hash algorithms: publicly known functions that
create hash value
• Use of keys not required; message
authentication code (MAC), however, may be
attached to a message
• Used in password verification systems to confirm
identity of user
Cryptographic Algorithms

• Often grouped into two broad categories,


symmetric and asymmetric; today’s popular
cryptosystems use hybrid combination of
symmetric and asymmetric algorithms
• Symmetric and asymmetric algorithms
distinguished by types of keys used for
encryption and decryption operations
Cryptographic Algorithms
(continued)
• Symmetric encryption: uses same “secret
key” to encipher and decipher message
– Encryption methods can be extremely
efficient, requiring minimal processing
– Both sender and receiver must possess
encryption key
– If either copy of key is compromised, an
intermediate can decrypt and read messages
Cryptographic Algorithms
(continued)
• Data Encryption Standard (DES): one of most
popular symmetric encryption cryptosystems
– 64-bit block size; 56-bit key
– Adopted by NIST in 1976 as federal standard for
encrypting non-classified information
• Triple DES (3DES): created to provide security
far beyond DES
• Advanced Encryption Standard (AES):
developed to replace both DES and 3DES
Cryptographic Algorithms
(continued)
• Asymmetric Encryption (public key
encryption)
– Uses two different but related keys; either key
can encrypt or decrypt message
– If Key A encrypts message, only Key B can
decrypt
– Highest value when one key serves as private
key and the other serves as public key
Encryption Key Size
• When using ciphers, size of cryptovariable or
key very important
• Strength of many encryption applications and
cryptosystems measured by key size
• For cryptosystems, security of encrypted data is
not dependent on keeping encrypting algorithm
secret
• Cryptosystem security depends on keeping
some or all of elements of cryptovariable(s) or
key(s) secret
Encryption Key Power
Cryptography Tools

• Public Key Infrastructure (PKI): integrated


system of software, encryption methodologies,
protocols, legal agreements, and third-party
services enabling users to communicate
securely
• PKI systems based on public key cryptosystems;
include digital certificates and certificate
authorities (CAs)
Cryptography Tools (continued)

• PKI protects information assets in several


ways:
– Authentication
– Integrity
– Privacy
– Authorization
– Nonrepudiation
Digital Signatures

• Encrypted messages that can be mathematically


proven to be authentic
• Created in response to rising need to verify
information transferred using electronic systems
• Asymmetric encryption processes used to create
digital signatures
Digital Certificates

• Electronic document containing key value and


identifying information about entity that controls
key

• Digital signature attached to certificate’s


container file to certify file is from entity it claims
to be from
Figure 8-5 Digital Signatures
Hybrid Cryptography Systems
• Except with digital certificates, pure asymmetric
key encryption not widely used
• Asymmetric encryption more often used with
symmetric key encryption, creating hybrid
system
• Diffie-Hellman Key Exchange method: most
common hybrid system; provided foundation for
subsequent developments in public key
encryption
Steganography

• Process of hiding information; in use for a long


time
• Most popular modern version hides information
within files appearing to contain digital pictures
or other images
• Some applications hide messages in .bmp, .wav,
.mp3, and .au files, as well as in unused space
on CDs and DVDs
Protocols for Secure
Communications
• Secure Socket Layer (SSL) protocol: uses public
key encryption to secure channel over public
Internet
• Secure Hypertext Transfer Protocol (S-HTTP):
extended version of Hypertext Transfer Protocol;
provides for encryption of individual messages
between client and server across Internet
• S-HTTP is the application of SSL over HTTP; allows
encryption of information passing between
computers through protected and secure virtual
connection
Protocols for Secure
Communications (continued)
• Securing E-mail with S/MIME, PEM, and PGP
– Secure Multipurpose Internet Mail Extensions
(S/MIME): builds on Multipurpose Internet Mail
Extensions (MIME) encoding format by adding
encryption and authentication
– Privacy Enhanced Mail (PEM): proposed as
standard to function with public key
cryptosystems; uses 3DES symmetric key
encryption
– Pretty Good Privacy (PGP): uses IDEA Cipher for
message encoding
Protocols for Secure
Communications (continued)
• Securing Web transactions with SET, SSL, and
S-HTTP
– Secure Electronic Transactions (SET): developed by
MasterCard and VISA in 1997 to provide protection
from electronic payment fraud
– Uses DES to encrypt credit card information transfers
– Provides security for both Internet-based credit card
transactions and credit card swipe systems in retail
stores
Protocols for Secure
Communications (continued)

• Securing TCP/IP with IPSec


– Internet Protocol Security (IPSec): open
source protocol to secure communications
across any IP-based network
– IPSec designed to protect data integrity, user
confidentiality, and authenticity at IP packet
level
Protocols for Secure Communications
(continued)
– IPSec combines several different
cryptosystems: Diffie-Hellman; public key
cryptography; bulk encryption algorithms;
digital certificates
– In IPSec, IP layer security obtained by use of
application header (AH) protocol or
encapsulating security payload (ESP) protocol
IPSec Headers
Protocols for Secure Communications
(continued)
• Securing TCP/IP with PGP
– Pretty Good Privacy (PGP): hybrid
cryptosystem designed in 1991 by Phil
Zimmermann
– Combined best available cryptographic
algorithms to become open source de facto
standard for encryption and authentication of
e-mail and file storage applications
Protocols for Secure Communications
(continued
– Freeware and low-cost commercial PGP
versions are available for many platforms
– PGP security solution provides six services:
authentication by digital signatures; message
encryption; compression; e-mail compatibility;
segmentation; key management
PGP Function
Attacks on Cryptosystems

• Attempts to gain unauthorized access to secure


communications have typically used brute force
attacks (ciphertext attacks)

• Attacker may alternatively conduct known-


plaintext attack or selected-plaintext attach
schemes
Man-in-the-Middle Attack
• Designed to intercept transmission of public key
or insert known key structure in place of
requested public key
• From victims’ perspective, encrypted
communication appears to be occurring
normally, but in fact attacker receives each
encrypted message, decodes, encrypts, and
sends to originally intended recipient
• Establishment of public keys with digital
signatures can prevent traditional man-in-the-
middle attack
Correlation Attacks
• Collection of brute-force methods that attempt to
deduce statistical relationships between
structure of unknown key and ciphertext
• Differential and linear cryptanalysis have been
used to mount successful attacks
• Only defense is selection of strong
cryptosystems, thorough key management, and
strict adherence to best practices of
cryptography in frequency of changing keys
Dictionary Attacks

• Attacker encrypts every word in a dictionary


using same cryptosystem used by target
• Dictionary attacks can be successful when the
ciphertext consists of relatively few characters
(e.g., usernames, passwords)
Timing Attacks
• Attacker eavesdrops during victim’s session;
uses statistical analysis of user’s typing patterns
and inter-keystroke timings to discern sensitive
session information
• Can be used to gain information about
encryption key and possibly cryptosystem in use
• Once encryption successfully broken, attacker
may launch a replay attack (an attempt to
resubmit recording of deciphered authentication
to gain entry into secure source
Defending From Attacks

• No matter how sophisticated encryption and


cryptosystems have become, if key is
discovered, message can be determined
• Key management is not so much management
of technology but rather management of people
Summary
• Cryptography and encryption provide sophisticated approach
to security
– Many security-related tools use embedded encryption
technologies
– Encryption converts a message into a form that is
unreadable by the unauthorized
• Many tools are available and can be classified as symmetric
or asymmetric, each having advantages and special
capabilities
• Strength of encryption tool dependent on key size but even
more dependent on following good management practices
• Cryptography is used to secure most aspects of Internet and
Web uses that require it, drawing on extensive set of
protocols and tools designed for that purpose
• Cryptosystems are subject to attack in many ways

You might also like