CS549: Cryptography and Network Security: © by Xiang-Yang Li Department of Computer Science, IIT
CS549: Cryptography and Network Security: © by Xiang-Yang Li Department of Computer Science, IIT
CS549: Cryptography and Network Security: © by Xiang-Yang Li Department of Computer Science, IIT
Notice
This lecture note (Cryptography and Network Security) is prepared by
Xiang-Yang Li. This lecture note has benefited from numerous
textbooks and online materials. Especially the Cryptography and
Network Security 2nd edition by William Stallings and the
Cryptography: Theory and Practice by Douglas Stinson.
You may not modify, publish, or sell, reproduce, create derivative
works from, distribute, perform, display, or in any way exploit any
of the content, in whole or in part, except as otherwise expressly
permitted by the author.
The author has used his best efforts in preparing this lecture note.
The author makes no warranty of any kind, expressed or implied,
with regard to the programs, protocols contained in this lecture
note. The author shall not be liable in any event for incidental or
consequential damages in connection with, or arising out of, the
furnishing, performance, or use of these.
ABOUT INSTRUCTOR
About Instructor
Associate Professor IIT
Research Interests:
Algorithm design and analysis
Wireless networks
Game theory
Computational geometry
Contact Information
Phone 312-567-5207
Email: xli@cs.iit.edu
Room 229C, SB
Cryptography and Network Security
Office hours
Prof. XiangYang Li
http://www.cs.iit.edu/~xli
http://www.cs.iit.edu/~winet/
xli@cs.iit.edu
Stuart Building 229C
Topics studied:
Wireless networks
Social networks
Representative Projects
Environment monitoring
Ocean
Sense http://www.cse.ust.hk/~liu/Ocean/index.html
GreenObs http://orbsmap.greenorbs.org/
Tracking objects: iLight
OceanSense (2007-)
GreenObs (2008-)
Applications
CWS
Ammonia sensor
Collaborators
Demo
More sensor/Adhoc/RFID
examples
Sensor nodes
Other Projects
BlueSense
BlueSky
WiFace
Theoretical Studies
Algorithm Design and Analysis of Practical
Questions
Where do we publish?
Journals
Conferences
31
Handbook
of Applied Cryptography by
Alfred J. Menezes, Paul C. van Oorschot
and Scott A. Vanstone, CRC Press
I have electronic version!
Cryptography and Network Security
32
Homework
20%
Final Exam
30% (closed book on final exam week, 2012)
Group Programming Projects
20% (select your own topic, ),
Programming project: include a final presentation and demo
India session
Homework 20%, final exam 40%, individual programming projects 25%, individual term paper
15%,
Policy
Do it yourself
Can use library, Internet and so on, but you have to cite the sources when you
use this information
Cryptography and Network Security
33
Homeworks
Do it independently
No discussion
No copy
Can use reference books
and programming)
34
Topics
Introduction
Number Theory
Traditional Methods: secret key system
35
Organization
Chapters
Introduction
Number Theory
Conventional Encryption
Block Ciphers
Public Key System
Key Management
Hash Function and Digital Signature
Identification
Secret Sharing
Pseudo-random number Generation
Email Security
Others
Cryptography and Network Security
36
Introduction
Xiang-Yang Li
37
Introduction
The art of war teaches us not on the likelihood
of the enemys not coming, but on our own
readiness to receive him; not on the chance of
his not attacking, but rather on the fact that
we have made our position unassailable.
--The art of War, Sun Tzu
38
Information Security
From wikipedia
Cryptography and Network Security
39
C.I.A
Confidentiality, Integrity and Availability
Information Systems are decomposed in
40
Various Securities
Data security
Data security is the means of ensuring that data is kept safe from
corruption and that access to it is suitably controlled.
Computer Security
Network Security
41
Network Security
network security and information security are
42
Practical Efficiency
Space, time and so on
Explicitness
About its environment assumptions, security service offered,
special cases in math assumptions,
Protection tuned to application needs
No less, no more
Security protocols cannot do all: man does what man can do,
machine does what machine can do
Openness
Cryptography and Network Security
43
Most important
Security first
Efficiency, resource utilization, and
security tradeoffs
44
Cryptography
Cryptography (from Greek
45
linguistics
Mathematics: number theory, information theory, computational
complexity, statistics and combinatorics
engineering
46
http://en.wikipedia.org/wiki/Traffic_analysis
47
Steganography
Some techniques
Polybius square
Hidden messages on messenger's body
48
Stenography Example
Last 2 bits
49
atrix.htm
50
Principal
(sender)
(receiver)
Security
transformation
Security
transformation
attacker
Cryptography and Network Security
51
52
Attacks
Passive attacks
Interception
Release of message contents
Traffic analysis
Active attacks
Masquerade
Replay
Modification
Denial of service
53
Information Transferring
54
Attack: Interruption
55
Attack: Interception
Wiring,
eavesdrop
Cryptography and Network Security
56
Attack: Modification
intercept
Replaced
info
57
Attack: Fabrication
Ali: this is
58
59
Integrity:
Authentication:
Non-repudiation:
60
Secure Communication
protecting data locally only solves a minor part of
the problem.
61
Secure Communication
62
Secure Communication
The combined protocol HTTP/TLS or SSL is often
63
SOAP security
SOAP (Simple Object Access Protocol) is designed to pass
64
PKI
PKI key management provides a sophisticated framework for
65
66
Cryptography
Cryptography is the study of
67
Basic Concepts
Cryptography
Plaintext
Ciphertext
Message
68
Basic Concepts
Cipher
An algorithm for transforming an intelligible message
into unintelligible by transposition and/or substitution,
or some other techniques
Keys
Some critical information used by the cipher, known
only to the sender and/or receiver
Encipher (encode)
The process of converting plaintext to ciphertext
Decipher (decode)
The process of converting ciphertext back into plaintext
Cryptography and Network Security
69
Basic Concepts
cipher
an
Protocols
specify the details of how ciphers (and other cryptographic
primitives) are to be used to achieve specific tasks.
A suite of protocols, ciphers, key management, userprescribed actions implemented together as a system
constitute a cryptosystem;
this is what an end-user interacts with, e.g. PGP
70
Decipher P = D(K2)(C)
ciphertext
Plaintext
Encipher C = E(K1)(P)
K1, K2: from keyspace
These two keys could be different;
could be difficult to get one from the other
Cryptography and Network Security
71
What is Security?
Two fundamentally different securities
Unconditional security
Computational security
72
Visual Cryptography
By:
Moni Naor
Adi Shamir
Visual Cryptography
Visual Cryptography is a secret-sharing method that
dependency
Decryption algorithm not required (Use a human Visual
System). So a person unknown to cryptography can
decrypt the message.
We can send cipher text through FAX or E-MAIL
Infinite Computation Power cant predict the message.
Introduction:
Cryptography:
Plain Text
Plain Text
Channel
Encryption
Decryption
Cipher Text
Visual Cryptography:
Plaintext (in form of image)
Encryption (creating shares)
Channel (Fax, Email)
Decryption (Human Visual System)
Example:
Secret Image
Share1
share
secret
Share2
Stacking the
reveals the
Encoding of Pixels:
Original Pixel
Share1
Share2
overlaid
Original Pixel
share1
s1=
share2
overlaid Image
s0=
(2,2) Model
1. Construct two 2x2 basis matrices as:
s0=
1
0
0
1
s1= 1
1
0
0
Cont..
3. Before encoding each pixel from the secret image onto
each share, randomly permute the columns of the basis
matrices S0 and S1
3.1 This VCS (Visual Cryptography Scheme) divides each
pixel in the secret image into m=2 sub pixels.
3.2 It has a contrast of (m)m=1 and a relative contrast of
(m)=1/2.