38
What is Encryption ? טטט"ט

What is Encryption

Embed Size (px)

Citation preview

Page 1: What is Encryption

What is Encryption? תשס"ט

Page 2: What is Encryption

What is Encryption ?

Encryption (enciphering) transforms original information (plaintext) into cipher text (cipher)

The transformed information is called cryptogram

The technique or rules used for encryption are calledencryption algorithm

Encryption provides:

the Confidentiality (keep the information confidential)

the Integrity (keep the accuracy of the information)

the Authenticity (information comes from an authentic source) of a message

Page 3: What is Encryption

Two Basic Types of Encryption

Transposition Ciphers

rearrange the order of the bits or the characters

NUCLEAR → LUCNARE

Substitution Ciphersreplace the actual bits or the characters

with substitutes (next letter in the alphabet) NUCLEAR → OVDMFBS

Page 4: What is Encryption

A Bible Cipherא-ת-ב-ש

a substitution cipher

איך נלכדה ששך, ותתפש תהלת כל הארץ נ"א, מ"א( )ירמיהו

ששך = בבל

Page 5: What is Encryption

Julius Caesar EncryptionA substitution cipher

Susceptible to frequency analysis and brute force attacks

Page 6: What is Encryption

The Vigenère Cipher

French diplomat of the 16th century who invented a substitution cipher using a keyword

Yet easy to crack using the frequency analysis technique

Page 7: What is Encryption

The Enigma MachineA substitution cipher using a set of rotating wheels

Used in WW II by the Germans (U-Boote) and the Japanese

Code was cracked by the Allies in 1941(Alan Turing & Polish mathematicians)

Poor assumption: letters in plain text should not be substituted for the same letter in cipher text

Page 8: What is Encryption

The Protagonists

Alice (wants to talk securely with Bob)

Bob (Alice’s friend)

Eve (eavesdropping the conversation)

Mallory (a malicious person)

Plain text: Bob → Alice “I love you”Cipher text: Nkn → Mgsbc “S gktc wky”

Page 9: What is Encryption

In “Real” Life: Who Are Alice & Bob ?

Web browser/server for electronic transactions (credit cards etc.)

On-line banking applications Routers exchanging tables updates Corporate VPN (virtual private network) E-mails B2B or B2U Wireless connections to the network

Page 10: What is Encryption

There are bad guys out there

What can they (Eve and Mallory) do ?

Eavesdropping (intercept the message)

Spoof the message (faking source or content)

Hijack the communication (insert himself)

Denial of Service (overloading resources)

Page 11: What is Encryption

Sniffing (Packet Analyzing)

Sniffers can capture the packets across the network and analyze their content

Page 12: What is Encryption

Spoofing

Receiver “A” can’t tell if source is spoofed

Page 13: What is Encryption

Modern Ciphers

Four cryptographic primitives:

1. Random number generationused to generate keys

2. Symmetric encryption (private keys) same secret key is used to encrypt and decrypt information

3. Asymmetric encryption (private/public keys)two keys are used: a public key and a private key, each user has both a public key (published) and a private key (secret), public and private key are mathematically related:encrypt with sender’s private key, decrypt with sender’s public key encrypt with recipient’s public key, decrypt with recipient’s private key

4. Hash functionstakes a message of any size and computes a smaller fixed-size message called a digest (used to store passwords and signatures)

Page 14: What is Encryption

Symmetric Key Algorithms

2 types of algorithms used

Stream Cipher: plain text is processed as a stream of data

Block Cipher: plain text is processed through blocks with additional measures to avoid repeating blocks

Page 15: What is Encryption

Diffie-Hellman Shared Symmetric Key Before 1975, all encryption forced the sender and receiver to have the same key

If a thousand users had to share secrets with each other, using a secret-key system, they needed half a million shared-keys (1000 x 1000) / 2 = 500’000 keys

Diffie-Hellman proposed in 1975 a way to exchange secret keys across an unsecured communication channel

How does it work ? First assume that everybody has a three-liter bucket of yellow paint (the shared public encryption key)

If Alice and Bob want to agree on a secret key, each of them adds one liter of their secret color to their own bucket (Alice: pink, Bob: red)

Finally, Alice takes Bob’s mixture and add her secret color and Bob takes Alice’s mixture and adds his own secret color

Alice ends up with yellow + pink + red and Bob with yellow + red + pink in his bucket (the shared secret encryption key)

We have confidentiality but not authentication (everybody has a yellow color bucket)

Page 16: What is Encryption

Asymmetric Keys (public & private)

Encrypting with private key, decrypting with public key provides

authenticity without confidentiality (anyone can access the public key)

Encrypting with public key, decrypting with private key providesconfidentiality without authenticity (anyone can access the public key)

Solution: use a mixture of both (double encryption) for the digital signature and the public key for the message (confidentiality)

Page 17: What is Encryption

Public Key Cryptography

Page 18: What is Encryption

RSA Algorithm For Key Generation Based on large prime numbers:

1. Choose two large prime numbers p, q2. Compute n = pq and z = (p - 1)(q - 1)3. Choose e (e < n) that has no common factors with z

(e and z are relatively prime)4. Choose d such that ed – 1 is exactly divisible by z

i.e. ed (mod z) = 15. Public key KB

+ is (n,e) ; private key KB- is (n,d)

6. Encrypt m with c = me (mod n)7. Decrypt c as m = cd (mod n)

This works because: m = [me (mod n)]d (mod n)

Page 19: What is Encryption

Example of RSA Key Generation

Bob chooses p = 5 and q = 71. then n = 5 * 7 = 35 and z = (5-1)*(7-1) = 242. e = 5 (relatively prime to z)3. d = 29 (ed-1 = 144 exactly divisible by z)4. encrypt the letter l (m = 12):

me = 125 = 248’832c = me (mod n) = 248’832 (mod 35) = 17

5. decrypt (c =17):m = cd (mod n) = 1729 (mod 35) = 4.819686 *1035 (mod 35) = 12

Page 20: What is Encryption

Receiver’s public key

Sender’s public key

` `

Sender’s private key

Receiver’s private key

InternetSenderAlice

ReceiverBob

Get the re

ceiver’s public key

Get the sender’s public key

Encrypt the entire message using the receiver’s public key

Encrypt the signature with the sender’s private key and the receiver’s public key

Signature is double encrypted to ensure confidentiality & authentication

Page 21: What is Encryption

Some Useful Acronyms DES: Data Encryption Standard (60’s – 70’s), improved with triple DES (IBM 1978)

Diffie & Hellman: algorithm for key exchange (1976)

Kerberos: authentication mechanism using authentication and ticket granting server

RSA: Rivest, Shamir & Adleman algorithm, using large prime numbers for the generation of the keys (1982)

X509: International Standard for Certificates (1988)

FIPS140-2: Federal Information Processing Standard (2001)

AES-256: Advanced Encryption Standard (2002), a sophisticated block cipher algorithm

PKI: Public Key Infrastructure

TLS: Transport Layer Security, used for secure Web connections

IPsec: Protocol suite based on IP and encryption standards for use in VPN

IBE: Identity Based Encryption, a simplified method for B2U E-mail encryption

S/MIME: (Secure Multipurpose Internet Mail extensions), for B2B E-mail encryption

PGP: (Pretty Good Privacy), for B2B and B2U E-mail encryption

Page 22: What is Encryption

Some Israeli Cryptographers

Prof. Adi Shamir (Weizmann Institute)

Prof. Dan Boneh (Stanford University)

Page 23: What is Encryption

SSL (Secure Sockets Layer) & TLS (Transport Layer Security)

TLS provides connection securityensuring that the connection is both encrypted and authenticated

Counterparty’s identity is authenticatedusing asymmetric keys

Exchange of the secret symmetric session key is secure

No attacker can modify the negotiated communication without being detected

Page 24: What is Encryption

The SSL Handshake

Page 25: What is Encryption

Certificate Authority (CA) Repository of public keys used for

encrypted connections

Page 26: What is Encryption

Certificate Sample

Page 27: What is Encryption

E-Learning uses TLS

Page 28: What is Encryption

Aventail uses TLS (access the VPN)

Page 29: What is Encryption

Yet another way to access the VPN:Two-Factor Authentication (PIN + Token)

Page 30: What is Encryption

VPN uses IPsec, TLS and RSA

Page 31: What is Encryption

E-mail & Web Security Appliance

Enables to send encrypted E-mails toa particular destination using TLS

Page 32: What is Encryption

ePO server - agent communication uses digital signature(self-signed certificates)

ePO Agent

Hos

t Com

plia

nce

Ant

i-Viru

s

Ant

i-Spy

war

e

Des

ktop

FW

Hos

t IPS

NA

C

Hos

t DLP

Rem

edia

tion

ePOManagementConsole

NetworkVM

SecureGateway

Network IPS

Data LossPrevention

Total Protection…futuretechnologies

ComplianceReporting

HostCompliance

Remediation

Page 33: What is Encryption

Endpoint Device Encryption

Device encryption for PC/Laptop Device encryption for PDA’s Device encryption for Tablet PC

Uses FIPS 140 certified AES-256 algorithm

Page 34: What is Encryption

Encrypted USB Manager

Uses FIPS140-2 certified AES-256 encryption

Page 35: What is Encryption

Wireless 802.11b (Wi-Fi)

Uses radio frequencies (2.4 GHz) Transmission speed 5.5 Mbps (new 54 Mbps)

WEP (Wired Equivalent Privacy) uses a shared key between the mobile station and the base, but has security loopholes

IEEE 802.11i addresses the WEP weaknesses, uses AES and block cipher to encrypt the wireless communication

Page 36: What is Encryption

IronMail from Secure Computing

Policy-Based Protection for Outbound Messages

Business-to-Business (B2B) Encryption – SSL/TLS: Secure Sockets Layer – S/MIME: Secure Multipurpose Internet Mail Extensions – OpenPGP: Pretty Good Privacy for businesses

Business-to-Users (B2U) Encryption– Secure Mail Encryption / Push : attachment with password– Secure Mail Encryption / Pull : mail is in a secure Web site– Voltage IBE Server: Identity Based Encryption– PGP Universal: Pretty Good Privacy for private users

Page 37: What is Encryption

IronMail Compliance Server

Page 38: What is Encryption

World War III via Encrypted E-mail