29
Cryptography & Network Security Introduction CR Introduction Chester Rebeiro IIT Madras

Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Embed Size (px)

Citation preview

Page 1: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Cryptography & Network Security

Introduction

CR

Introduction

Chester Rebeiro

IIT Madras

Page 2: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

The Connected World

CR 2

Page 3: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Information Storage

CR 3

Page 4: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Increased Security Breaches

CR

81% more in 2015

http://www.pwc.co.uk/assets/pdf/2015-isbs-executive-summary-02.pdf 4

Page 5: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Security Threats

(why difficult to prevent?)Networks / Communication links

Hardware

System Software

CR

Attackers need to target the weakest link in the chain

Peripherals

System Software

(Operating Systems / Hypervisor)

Applications

5

Page 6: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Security Studies (Research)

(an ocean)Networks / Communication links

Hardware

System Software

Network Security

Hardware Security

System Security

CRPeripherals

System Software

(Operating Systems / Hypervisor)

Applications

System Security

OS Security

Cloud Security

Web Security

DBMS Security

Embedded Security

Cryptography

6

Page 7: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Cryptography

• A crucial component in all security systems

• Fundamental component to achieve

– Confidentiality

CR

Allows only authorized users access to data

7

Page 8: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Cryptography

(its use)

• A crucial component in all security systems

• Fundamental component to achieve

– Confidentiality

– Data Integrity

CR

– Data Integrity

Cryptography can be used to ensure that only

authorized users can make modifications

(for instance to a bank account number)

8

Page 9: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Cryptography

(its use)

• A crucial component in all security systems

• Fundamental component to achieve

– Confidentiality

– Data Integrity

CR

– Data Integrity

– Authentication

Cryptography helps prove identities

9

Page 10: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Cryptography

(its use)

• A crucial component in all security systems

• Fundamental component to achieve

– Confidentiality

– Data Integrity

I did not

send that

CR

– Data Integrity

– Authentication

– Non-repudiation

The sender of a message cannot

claim that she did not send it

send that

10

Page 11: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Scheme for Confidentiality

Alice Bob

message

Attack at Dawn!!

untrusted communication link

CR

Attack at Dawn!!

MalloryProblem : Alice wants to send a message

to Bob (and only to Bob) through an untrusted

communication link

11

Page 12: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Encryption

Alice Bob

message

untrusted communication linkE D

KE KD

“Attack at Dawn!!”encryption decryption

#%AR3Xf34^$

(ciphertext)

CR

message

“Attack at Dawn!!”

Mallory

Secrets

• Only Alice knows the encryption key KE

• Only Bob knows the decryption key KD Only sees ciphertext.

cannot get the plaintext message

because she does not know the keys12

Page 13: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Encryption Algorithms

Alice Bobuntrusted communication linkE D

KE KD

“Attack at Dawn!!”encryption decryption

#%AR3Xf34($

(ciphertext)

CR

• Should be easy to compute for Alice / Bob (who know the key)

• Should be difficult to compute for Mallory (who does not know the key)

• What is ‘difficult’?

• Ideal case : Prove that the probability of Mallory determining the encryption / decryption key is no better than a random guess

• Computationally : Show that it is difficult for Mallory to determine the keys even if she has massive computational power

13

Page 14: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Algorithmic Attacks

• Can Mallory use tricks to break the algorithm

CR

• There by reducing the ‘difficulty’ of getting the

key.

14

E

Page 15: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Encryption Keys

Alice Bobuntrusted communication linkE D

KE KD

“Attack at Dawn!!”encryption decryption

#%AR3Xf34($

(ciphertext)

CR

• How are keys managed

– How does Alice & Bob select the keys?

– Need algorithms for key exchange

15

Page 16: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Ciphers

• Symmetric Algorithms– Encryption and Decryption use the same key

– i.e. KE = KD

– Examples:• Block Ciphers : DES, AES, PRESENT, etc.

• Stream Ciphers : A5, Grain, etc.

CR

• Stream Ciphers : A5, Grain, etc.

• Asymmetric Algorithms– Encryption and Decryption keys are different

– KE ≠ KD

– Examples: • RSA

• ECC

16

Page 17: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Cipher Implementations

Cryptography is always an overhead !!

• For security, the algorithms need to be computation intensive.

CR

intensive.

• Often require large numbers, complex mathematical operations.

• Design Challenges: Performance, Size, Power.

• Algorithms to achieve this

17

Page 18: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Encryption Devices

Alice Bob

message

untrusted communication linkE D

KE KD

“Attack at Dawn!!”

encryption decryption#%AR3Xf34($

(ciphertext)

CR

message

“Attack at Dawn!!”

Mallory

Side Channels

Eg. Power consumption / radiation

of device, execution time, etc. Gets information about the keys by monitoring

Side channels of the device

18

Page 19: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Side Channel Analysis

Alice

message

E

00111

encryption

CR 19

Radiation from

Device

0 1 1 1Secret information 0 1

message

“Attack at Dawn!!”

Page 20: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Ciphers Design Challenges

We want crypto algorithms to be fast and small

Tradeoffs between Security , Speed, Side-Channel Attacks

CR

For security, the algorithms are

computationally intensive.

Typically use large numbers,

complex operations

Need to protect against side

channel attacks.

Page 21: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Cryptography Study

• Mathematics + Engineering Mathematics Electrical Engg.

CRComputer Sc.

cryptography

21

Physics

Page 22: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Some Hot Research Trends

light weight cryptographypost-quantum cryptography

efficient implementations

cryptanalysis privacy enhancing security

CR 22

light weight cryptographypost-quantum cryptography

Leakage resilient cryptography

side channel analysis

cloud security

homomorphic encryption

Page 23: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

The Plan Ahead

• How are ciphers designed?– Ideal security vs Computational security

– Block ciphers / Stream ciphers

– Asymmetric key ciphers

– Trade offs between security and implementation

CR

– Trade offs between security and implementation

• Attacks– Algorithmic / Side Channel Analysis

• Applications– How are they used to achieve confidentiality, integrity,

authentication, non-repudiation

• Case Studies– Network security aspects, Bitcoins

23

Page 24: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Course Structure

• Classical Cryptography

• Shannon’s Theory

• Block Ciphers– DES, AES, their implementations and their attacks

• Stream Ciphers

CR

Stream Ciphers

• Digital Signatures and Authentication– Hash functions

• Public key ciphers– RSA, implementations, and attacks

• Side channel analysis

• Network Security aspects

• Case Studies : Bitcoins

24

Page 25: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Expected Learning Outcomes

• What you would learn by the end of the course

� Distinguish between cipher algorithms

- Where to use what algorithm?

� Evaluate ciphers and their implementations for security

CR 25

� Evaluate ciphers and their implementations for security

- Mathematical cryptanalysis of some algorithms

- Side channel based attacks on cipher implementations

� Apply algorithms to solve security problems in networks and real-world systems

Page 26: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Books / References

Textbooks

(STINSON) ''Cryptography: Theory and Practice", Third Edition, by Douglas R.

Stinson, CRC Press, Taylor and Francis Group

References

CR 26

References

(STALLINGS) ''Cryptography and Network Security: Principles and Practices'',

Sixth Edition, by William Stallings

(HANDBOOK) ''Handbook of Applied Cryptography'', Fifth Printing, by Alfred J.

Menezes, Paul C. van Oorschot, and Scott A. Vanstone, CRC Press

(HARDSEC) ''Hardware Security : Design, Threats, and Safeguards", by

Debdeep Mukhopadhyay and Rajat Subhra Chakraborty, CRC Press, Taylor

and Francis Group

Page 27: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Grading

• Quiz 1 : 20%

• Quiz 2 : 20%

• End semester : 40%

• Assignments : 20%

CR

• Assignments : 20%

– Surprise tests / Tutorials / Programming assignments /

minute papers / Google groups / etc.

27

Self Study vs Attending Classes

• Same tutorials / assignments / quizzes / etc.

• Grading policy is different

Page 28: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Course Webpages

• For slides / syllabus / schedule etc.

• For discussions / announcements / submissions

http://www.cse.iitm.ac.in/~chester/courses/16e_cns/index.html

CR

• For discussions / announcements / submissions

CSE Moodle

Google Groups (cnsiitm_2016)

28

Page 29: Cryptography & Network Security Introductionchester/courses/16e_cns/slides/01_Introduction.pdf · Security Studies (Research) (an ocean) Networks / Communication links Hardware System

Logistics

• CS26

• Time:

– Tuesdays : 11:00 - 11:50 AM

– Wednesdays : 10:00 - 10:50 AM

CR

– Wednesdays : 10:00 - 10:50 AM

– Thursdays : 8:00 - 8:50 AM

– Fridays : 2:00 – 2:50 PM

29