110 likes | 129 Views
Dive into the colorful history of cryptography, from military use to modern internet security methods. Learn about encryption, decryption, cryptanalysis, and key security. Discover public key cryptography, authentication, and securing communication online. Explore traditional encryption methods, challenge/response authentication, and general security practices for safe online interactions.
E N D
LIS508 last lecture: Cryptography & Security Thomas Krichel 2002-12-16
Internet security • On the Internet, every stream of communication that anyone sends can, in principle, be read by anyone else. • Assess to the physical wire is all that it takes. • How to establish secure communication?
Introduction • A subject with a very colorful history. • In the past cryptography mainly used by military, diplomatic corps, diarists and lovers. • For the military, difficulty of encryption in the battlefield was main problem. • Original data, called “plaintext” is transformed by a function parameterized by a “key”, to get “cyphertext”.
cryptanalysis • The art of finding the way to get from the cyphertext to the plain text is called cryptanalysis. We assume that the cryptanalyst knows the general method, but does not know the key. • Cryptanalysts one of three types of problems • cyphertext only • known plaintext • chosen plaintext
Tradition encryptation methods • Substitution ciphers keep letters in the same position but replace each letter of the alphabet with another. • Transposition ciphers keep each letter as it is but shovels the letters around. • We need some redundant data in the cyphertext in order to deter active intruders from generating bogus message • but the more redundant data in the plain text makes it easier for passive intruders. • Main problem: keeping the key secret.
Diffie and Hellman (1978) • Let P be the plaintext, C be the cyphertext. E() is the encryption key and D() is the decryption key. • Then we have public key cryptography if • 1. D(E(P))=P • 2. D() can not be broken by chosen plaintext attack. • 3. Knowing E() will give you no clue about D(). • E() can then be made public and is referred to as the public key, D() is the private key. • It is possible to find key pairs that have these properties.
Authentication • I want to securely login to a host machine. • I send the hast an encrypted message ``hey, I am Thomas, my public key is 7ni820g=0...'' • Machine then knows how to send me messages that other people can not decode. • But it can not be sure that it was me who sent the message. An intruder may have done that since me public key is public. • This problem is solved by challenge/response
challenge/response • To find out if I am the person that I claim to be, the machine encodes a random number, and challenges me to decode that number. • If my software can decode the challenge, I must be the person whom I claim I am. • My software and the host will agree on a session key to use to encrypt all communication. • Thus the communication is encoded using simple cryptography because that is less intensive.
General Security • Always log off. • Choose secure password, for example through concatenating the first letters of a phrase: ig!,&w • Never use telnet and ftp to a private account, use secure methods only. • Disable all services that you do not use.
General security • Disable booting from floppy disks. • You can change boot sequence in the bios settings. • On different machines use different passwords. • You can set a bios password. • Keep regular backups.
http://openlib.org/home/krichel Thank you for your attention!