Cybersecurity 3
Cybersecurity 3
Computing,
Fifth Edition
Topic 3: Asymmetric
Cryptography
Chapter 12: Details of
Cryptography
3
Methods of Cryptanalysis
Ciphertext only
Lookfor patterns, similarities, and discontinuities
among many messages that are encrypted alike
Plaintext
and ciphertext, so the cryptanalyst
can see what transformations occurred
Known plaintext
Probable plaintext
Chosen plaintext
5
History
Babbage/Kasiski Test
Ciphertext:
DYDUXRMHTVDVNQDQNWDYDUXRMHARTJGWNQD
Look for repeated groups of letters and count the number of
letters between the beginning of each group.
Factor the numbers. If there are similarities, that is the length
of the key.
If the keyword is N letters long, then every Nth letter must be
enciphered using the same letter of the keytext. Grouping
every Nth letter together, it is possible to use frequency
analysis to decipher message.
7
History (continue)
One-Time Pads
Developed in 1917 by Gilbert Vernam, an AT&T Bell Labs engineer.
OTP is an encryption algorithm where the plaintext is combined with a
random key that is as long as the plaintext so that it’s used only once.
OTP proven unbreakable by Claude Shannon, a fellow engineer at Bell
Labs who provided a proof in his information theory.
8
One-Time Pads
Theprocess of
concealing the
contents of a
message from all
except those who
know the KEY
UsesCodes
and Cyphers
November Slide
1, 2004 #8-14
Cryptographic Primitives:
Basic Techniques
Substitution: Topic 2
One set of bits is exchanged for another
Transposition: Topic 2
Rearranging the order of the ciphertext to break any
repeating patterns in the underlying plaintext
Confusion
An algorithm providing good confusion has a complex
functional relationship between the plaintext/key pair and
the ciphertext, so that changing one character in the
plaintext causes unpredictable changes to the resulting
ciphertext
Diffusion
Distributes the information from single plaintext characters
over the entire ciphertext output, so that even small
changes to the plaintext result in broad changes to the
ciphertext
Public Key & Private Key
https://www.youtube.com/watch?v=ERp8420ucGs
November Slide
1, 2004 #8-17
Public Key Cryptography
Two keys
Private key known only to individual
Public key available to anyone
Public key, private key inverses
Idea
Confidentiality: encipher using public
key, decipher using private key
Integrity/authentication: encipher
using private key, decipher using
public one
Asymmetric
Cryptography
https://www.youtube.com/watch?v=3QnD2c4Xovk
24
Sending Messages:
Encrypting Email
When using asymmetric-key
encryption to send a secret to X,
encrypt the secret with X's public
key, then send the encrypted text
When X receives the encrypted text,
X will decrypt it with a private key
Anyone who intercepts the
encrypted text cannot decrypt it
without X's private key—this is true
even if they have X’s public key
Encrypting Internet Traffic
Exponentiation cipher
Relies on the difficulty of determining
the number of numbers relatively
prime to a large integer n
256
Slide
#8-31
Asymmetric Cryptography
The Elgamal Algorithm
"A public key cryptosystem and a signature
scheme based on discrete logarithms" -- 1985
• Proposed by Taher Elgamal
ElGamal encryption
consists of three
components: the key
generator, the encryption
algorithm, and the
decryption algorithm.
32
Asymmetric
Cryptography
RSA being first...
Was used for all public key applications
• Secure Socket Layer (SSL)
• Pretty Good Privacy (PGP)
Elgamal later...
Replaced RSA in PGP
• Better implementation of Diffie-Hellman
• Key exchange
• Signatures
33
Asymmetric
Cryptograp
hy
The present
RSA still used for SSL
• SSL Requires few key generations
Elgamal
• Selected as the Digital Signature Standard
(DSS)
• Replaced RSA as default in PGP
Implementation of PKI
• Public Key Infrastructures (PKI)
• Generally uses RSA
34
• Provides secure communications across
networks
Applied Encryption:
Digital Signature Lab
Digital signature: a unique identifier that authenticates a message,
A digital signature combines a private key generated by an
asymmetric-key algorithm (e.g., RSA or DSA) and hash encryption
(e.g., SHA-1, MD5, or HMAC) for integrity
In cryptography, a keyed-hash message authentication code
(HMAC) is a specific type of message authentication code
(MAC) involving a cryptographic hash function (hence the 'H')
in combination with a secret cryptographic key.
Hash encryption is used to verify data has not changed
The MD5 algorithm is a widely used hash function producing a
128-bit hash value.
Services provided by digital signatures
Authentication, Non-repudiation, Data integrity
Digital signatures do not provide data confidentiality
Certificate Authority &
Digital Certificates
40
Elliptic
Curve
Cryptograph
y
Elliptic curve cryptography (ECC) is an approach
to public-key cryptography based on the algebraic
structure of elliptic curves over finite fields.
One of the main benefits in comparison with non-
ECC cryptography (with plain Galois fields as a
basis) is the same level of security provided by
keys of smaller size.
for example, a 256-bit ECC public key should
provide comparable security to a 3072-bit RSA
public key.
Used in small wireless devices
ECDHE: Elliptic Curve Diffie Helman Ephemeral-
used to generate encryption keys
NIST & NSA
technology
Quantum Computing