DOC PREVIEW
Pitt IS 2150 - Introduction to Security

This preview shows page 1-2-3-4-5-32-33-34-35-65-66-67-68-69 out of 69 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

IS 2150 / TEL 2810 Introduction to SecurityObjectivesSecure Information Transmission (network security model)Security of Information Systems (Network access model)Issues in Network securityCryptologyElementary Number TheoryDivisorsPrime NumbersGreatest common divisor (GCD)Relatively Prime NumbersThe modulo operationModular ArithmeticModulo OperationSlide 15Brief HistoryCryptosystemExampleCæsar cipherAttacksClassical CryptographySlide 22Slide 23Transposition CipherAttacking the CipherSlide 26Slide 27Substitution CiphersSlide 29Statistical AttackCharacter Frequencies (Denning)Statistical AnalysisCorrelation: (i) for 0 ≤ i ≤ 25The ResultCæsar’s ProblemVigenère CipherRelevant Parts of TableauUseful TermsAttacking the CipherOne-Time PadOverview of the DESDESEnciphermentThe f FunctionControversyDES ModesCBC Mode DecryptionSelf-Healing PropertyPublic Key CryptographyRequirementsDiffie-HellmanAlgorithmSlide 53RSASlide 55Confidentiality using RSAAuthentication using RSAConfidentiality + AuthenticationWarningsCryptographic ChecksumsMathematical characteristicsDefinitionCollisionsKeysMessage DigestHash Message Authentication Code (HMAC)Protection StrengthAverage time required for exhaustive key searchKey Points1IS 2150 / TEL 2810Introduction to SecurityJames JoshiAssistant Professor, SISLecture 8October 25, 2007Basic CryptographyNetwork Security2ObjectivesUnderstand/explain/employ the basic cryptographic techniquesReview the basic number theory used in cryptosystemsClassical systemPublic-key systemSome crypto analysisMessage digest3Secure Information Transmission(network security model)Trusted Third Partyarbiter, distributer of secret informationOpponentSecure MessageSecure Message MessageInformation channelSender ReceiverSecret InformationSecurity related transformationSecret Information Message4Security of Information Systems(Network access model)GateKeeperOpponent - hackers - softwareAccess ChannelInternalSecurity ControlDataSoftwareGatekeeper – firewall or equivalent, password-based loginInternal Security Control – Access control, Logs, audits, virus scans etc.5Issues in Network securityDistribution of secret information to enable secure exchange of informationEffect of communication protocols needs to be consideredEncryption if used cleverly and correctly, can provide several of the security services Physical and logical placement of security mechanismsCountermeasures need to be considered6CryptologyCRYPTOLOGYCRYPTOGRAPHY CRYPTANALYSISPrivate Key(Secret Key)Public KeyBlock Cipher Stream Cipher Integer FactorizationDiscrete LogarithmEncipher, encryptDecipher, decrypt7Elementary Number TheoryNatural numbers N = {1,2,3,…}Whole numbers W = {0,1,2,3, …}Integers Z = {…,-2,-1,0,1,2,3, …}DivisorsA number b is said to divide a if a = mb for some m where a, b, m  ZWe write this as b | aRead as “b divides a”8DivisorsSome common propertiesIf a | 1, a = +1 or –1If a|b and b|a then a = +b or –bAny b  Z divides 0 if b  0If b|g and b|h then b|(mg + nh) where b,m,n,g,h  ZExamples: The positive divisors of 42 are 1,2,3,6,7,14,21,423|6 and 3|21 => 3|21m+6n for m,n  Z9Prime NumbersAn integer p is said to be a prime number if its only positive divisors are 1 and itself2, 3, 7, 11, ..Any integer can be expressed as a unique product of prime numbers raised to positive integral powersExamples7569 = 3 x 3 x 29 x 29 = 32 x 2925886 = 2 x 27 x 109 = 2 x 33 x 1094900 = 72 x 52 x 22100 = ?250 = ?This process is called Prime Factorization10Greatest common divisor (GCD)Definition: Greatest Common DivisorThis is the largest divisor of both a and bGiven two integers a and b, the positive integer c is called their GCD or greatest common divisor if and only ifc | a and c | b Any divisor of both a and b also divides cNotation: gcd(a, b) = cExample: gcd(49,63) = ?11Relatively Prime NumbersTwo numbers are said to be relatively prime if their gcd is 1Example: 63 and 22 are relatively primeHow do you determine if two numbers are relatively prime?Find their GCD orFind their prime factorsIf they do not have a common prime factor other than 1, they are relatively primeExample: 63 = 9 x 7 = 32 x 7 and 22 = 11 x 212The modulo operationWhat is 27 mod 5?DefinitionLet a, r, m be integers and let m > 0We write a  r mod m if m divides r – a (or a – r) and 0  r < mm is called the modulusr is called the remainderNote that a = m.q + r where q is another integer (quotient)13Modular ArithmeticWe say that a  b mod m if m | a – bRead as: a is congruent to b modulo mm is called the modulusExample: 27  2 mod 5Note that b is the remainder after dividing a by m BUT Example: 27  7 mod 5 and 7  2 mod 5a  b mod m => b  a mod m Example: 2  27 mod 5We usually consider the smallest positive remainder which is sometimes called the residue14Modulo OperationThe modulo operation “reduces” the infinite set of integers to a finite setExample: modulo 5 operationWe have five sets {…,-10, -5, 0, 5, 10, …} => a  0 mod 5{…,-9,-4,1,6,11,…} => a  1 mod 5{…,-8,-3,2,7,12,…} => a  2 mod 5, etc.The set of residues of integers modulo 5 has five elements {0,1,2,3,4} and is denoted Z5.15Modulo OperationProperties[(a mod n) + (b mod n)] mod n = (a + b) mod n[(a mod n) - (b mod n)] mod n = (a - b) mod n[(a mod n) × (b mod n)] mod n = (a × b) mod n(-1) mod n = n -1 (Using b = q.n + r, with b = -1, q = -1 and r = n-1)16Brief HistoryAll encryption algorithms from BC till 1976 were secret key algorithmsAlso called private key algorithms or symmetric key algorithmsJulius Caesar used a substitution cipherWidespread use in World War II (enigma)Public key algorithms were introduced in 1976 by Whitfield Diffie and Martin Hellman17Cryptosystem(E, D, M, K, C)E set of encryption functions e: M  K  CD set of decryption functions d: C  K  MM set of plaintextsK set of keysC set of ciphertexts18ExampleCæsar cipherM = { sequences of letters }K = { i | i is an integer and 0 ≤ i ≤ 25 }E = { Ek | k  K and for all letters m,Ek(m) = (m + k) mod 26 }D = { Dk | k  K and for all letters c,Dk(c) = (26 + c – k) mod 26 }C = M19Cæsar cipherLet k = 9, m =


View Full Document

Pitt IS 2150 - Introduction to Security

Documents in this Course
QUIZ

QUIZ

8 pages

Assurance

Assurance

40 pages

Load more
Download Introduction to Security
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Introduction to Security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Introduction to Security 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?