SlideShare a Scribd company logo
3
Most read
4
Most read
10
Most read
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown
Chapter 7 –  Confidentiality Using Symmetric Encryption John wrote the letters of the alphabet under the letters in its first lines and tried it against the message. Immediately he knew that once more he had broken the code. It was extraordinary the feeling of triumph he had. He felt on top of the world. For not only had he done it, had he broken the July code, but he now had the key to every future coded message, since instructions as to the source of the next one must of necessity appear in the current one at the end of each month. — Talking to Strange Men,  Ruth Rendell
Confidentiality using Symmetric Encryption traditionally symmetric encryption is used to provide message confidentiality consider typical scenario workstations on LANs access other workstations & servers on LAN LANs interconnected using switches/routers with external lines or radio/satellite links consider attacks and placement in this scenario snooping from another workstation use dial-in to LAN or server to snoop use external router link to enter & snoop monitor and/or modify traffic one external links
Confidentiality using Symmetric Encryption have two major placement alternatives link encryption encryption occurs independently on every link implies must decrypt traffic between links requires many devices, but paired keys end-to-end encryption encryption occurs between original source and final destination need devices at each end with shared keys
Traffic Analysis when using end-to-end encryption must leave headers in clear so network can correctly route information hence although contents protected, traffic pattern flows are not ideally want both at once end-to-end protects data contents over entire path and provides authentication link protects traffic flows from monitoring
Placement of Encryption can place encryption function at various layers in OSI Reference Model link encryption occurs at layers 1 or 2 end-to-end can occur at layers 3, 4, 6, 7 as move higher less information is encrypted but it is more secure though more complex with more entities and keys
Traffic Analysis is monitoring of communications flows between parties useful both in military & commercial spheres can also be used to create a covert channel link encryption obscures header details but overall traffic volumes in networks and at end-points is still visible traffic padding can further obscure flows but at cost of continuous traffic
Key Distribution symmetric schemes require both parties to share a common secret key issue is how to securely distribute this key often secure system failure due to a break in the key distribution scheme
Key Distribution given parties A and B have various  key distribution  alternatives: A can select key and physically deliver to B third party can select & deliver key to A & B if A & B have communicated previously can use previous key to encrypt a new key if A & B have secure communications with a third party C, C can relay key between A & B
Key Distribution Scenario
Key Distribution Issues hierarchies of KDC’s required for large networks, but must trust each other session key lifetimes should be limited for greater security use of automatic key distribution on behalf of users, but must trust system use of decentralized key distribution controlling purposes keys are used for
Random Numbers many uses of  random numbers  in cryptography  nonces in authentication protocols to prevent replay session keys public key generation keystream for a one-time pad in all cases its critical that these values be  statistically random with uniform distribution, independent unpredictable  cannot infer future sequence on previous values
Natural Random Noise best source is natural randomness in real world  find a regular but random event and monitor  do generally need special h/w to do this  eg. radiation counters, radio noise, audio noise, thermal noise in diodes, leaky capacitors, mercury discharge tubes etc  starting to see such h/w in new CPU's  problems of  bias  or uneven distribution in signal  have to compensate for this when sample and use  best to only use a few noisiest bits from each sample
Published Sources a few published collections of random numbers  Rand Co, in 1955, published 1 million numbers  generated using an electronic roulette wheel  has been used in some cipher designs cf Khafre  earlier Tippett in 1927 published a collection  issues are that: these are limited too well-known for most uses
Pseudorandom Number Generators (PRNGs) algorithmic technique to create “random numbers” although not truly random can pass many tests of “randomness”
Linear Congruential Generator common iterative technique using: X n +1  = ( aX n  +  c ) mod  m given suitable values of parameters can produce a long random-like sequence suitable criteria to have are: function generates a full-period generated sequence should appear random efficient implementation with 32-bit arithmetic note that an attacker can reconstruct sequence given a small number of values
Using Block Ciphers as Stream Ciphers can use block cipher to generate numbers use Counter Mode X i  = E Km [i] use Output Feedback Mode X i  = E Km [ X i-1 ] ANSI X9.17 PRNG uses date-time + seed inputs and 3 triple-DES encryptions to generate new seed & random
Blum Blum Shub Generator based on public key algorithms use least significant bit from iterative equation: x i+1  = x i 2  mod n  where  n=p.q , and primes  p,q=3 mod 4 unpredictable, passes  next-bit  test security rests on difficulty of factoring N  is unpredictable given any run of bits  slow, since very large numbers must be used too slow for cipher use, good for key generation
Summary have considered: use of symmetric encryption to protect confidentiality need for good key distribution use of trusted third party KDC’s random number generation

More Related Content

PDF
2. public key cryptography and RSA
PPTX
Hash Function
PPTX
Public Key Cryptography
PPT
Symmetric Key Algorithm
PPTX
Block Cipher and Operation Modes
PPTX
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
PPTX
SHA- Secure hashing algorithm
PPTX
CS8792 - Cryptography and Network Security
2. public key cryptography and RSA
Hash Function
Public Key Cryptography
Symmetric Key Algorithm
Block Cipher and Operation Modes
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
SHA- Secure hashing algorithm
CS8792 - Cryptography and Network Security

What's hot (20)

PPTX
Diffie hellman key exchange algorithm
PDF
symmetric key encryption algorithms
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPT
Classical Encryption Techniques in Network Security
PPTX
Kerberos
PPT
Traditional symmetric-key cipher
PPT
Message authentication and hash function
PPT
Cryptography and Network Security William Stallings Lawrie Brown
PDF
RSA ALGORITHM
PPT
PGP S/MIME
PPTX
Hash Function
PDF
Block Ciphers and the Data Encryption Standard
PPT
Data encryption standard
PDF
Elliptic curve cryptography
PPTX
Classical encryption techniques
PDF
Asymmetric Cryptography
PPT
Security Attacks.ppt
PPTX
Cryptography and Information Security
PDF
Cs8792 cns - unit iv
Diffie hellman key exchange algorithm
symmetric key encryption algorithms
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Classical Encryption Techniques in Network Security
Kerberos
Traditional symmetric-key cipher
Message authentication and hash function
Cryptography and Network Security William Stallings Lawrie Brown
RSA ALGORITHM
PGP S/MIME
Hash Function
Block Ciphers and the Data Encryption Standard
Data encryption standard
Elliptic curve cryptography
Classical encryption techniques
Asymmetric Cryptography
Security Attacks.ppt
Cryptography and Information Security
Cs8792 cns - unit iv
Ad

Viewers also liked (20)

PPT
PPT
PPT
11848 ch04(1) (1)
PPT
Ch02 classic nemo
PPT
Ch01
 
PPT
Cryptography - An Overview
PPTX
Introduction to Cryptography
PPT
key distribution in network security
PPTX
Cryptography
PPT
Cryptography
PPTX
Network security
11848 ch04(1) (1)
Ch02 classic nemo
Ch01
 
Cryptography - An Overview
Introduction to Cryptography
key distribution in network security
Cryptography
Cryptography
Network security
Ad

Similar to Ch07 (20)

PPT
ch07.ppt
PPTX
Information and data security pseudorandom number generation and stream cipher
PDF
Network coding combined with onion routing for anonymous and secure communica...
PPTX
A study of cryptography for satellite applications
PDF
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
PDF
Nt1310 Unit 6 Powerpoint
PDF
H42063743
DOC
Lightweight secure scheme for detecting provenance forgery and packet drop at...
PDF
Secure Checkpointing Approach for Mobile Environment
PPT
Cryptography
PPTX
Introduction to Cryptography CYB 303.pptx
DOCX
Hop by hop message authentication chapter 1
PPT
Cryptography Lecture by Sam Bowne
PDF
Securing Personal Information in Data Mining
PDF
Message authentication between the nodes
PPT
Network Security
PPT
Ch12 Cryptography it-slideshares.blogspot.com
ch07.ppt
Information and data security pseudorandom number generation and stream cipher
Network coding combined with onion routing for anonymous and secure communica...
A study of cryptography for satellite applications
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Nt1310 Unit 6 Powerpoint
H42063743
Lightweight secure scheme for detecting provenance forgery and packet drop at...
Secure Checkpointing Approach for Mobile Environment
Cryptography
Introduction to Cryptography CYB 303.pptx
Hop by hop message authentication chapter 1
Cryptography Lecture by Sam Bowne
Securing Personal Information in Data Mining
Message authentication between the nodes
Network Security
Ch12 Cryptography it-slideshares.blogspot.com

More from Joe Christensen (20)

PPS
Live a life_that_matters
PDF
Advanced Comuter Architecture Ch6 Problem Solutions
PDF
Advanced Computer Architecture chapter 5 problem solutions
PDF
Advanced Computer Architecture Chapter 123 Problems Solution
PPS
Two Choices
ODP
IEEE 12207
PPT
Lecture 13
PPT
Lecture 15
PPT
Lecture 12
PPT
Lecture 11
PPT
Lecture 8 9
PPT
Lecture 10
PPT
Lecture 7n
PPT
Lecture 6
PPT
Lecture 5
PPT
Lecture 4
PPT
Lecture 14
PPT
Moble Communication
Live a life_that_matters
Advanced Comuter Architecture Ch6 Problem Solutions
Advanced Computer Architecture chapter 5 problem solutions
Advanced Computer Architecture Chapter 123 Problems Solution
Two Choices
IEEE 12207
Lecture 13
Lecture 15
Lecture 12
Lecture 11
Lecture 8 9
Lecture 10
Lecture 7n
Lecture 6
Lecture 5
Lecture 4
Lecture 14
Moble Communication

Recently uploaded (20)

PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Basic Mud Logging Guide for educational purpose
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Institutional Correction lecture only . . .
PDF
Pre independence Education in Inndia.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Insiders guide to clinical Medicine.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
01-Introduction-to-Information-Management.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
Anesthesia in Laparoscopic Surgery in India
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Basic Mud Logging Guide for educational purpose
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Final Presentation General Medicine 03-08-2024.pptx
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Institutional Correction lecture only . . .
Pre independence Education in Inndia.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Module 4: Burden of Disease Tutorial Slides S2 2025
Insiders guide to clinical Medicine.pdf
Microbial disease of the cardiovascular and lymphatic systems
Renaissance Architecture: A Journey from Faith to Humanism
PPH.pptx obstetrics and gynecology in nursing
01-Introduction-to-Information-Management.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Supply Chain Operations Speaking Notes -ICLT Program
FourierSeries-QuestionsWithAnswers(Part-A).pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf

Ch07

  • 1. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown
  • 2. Chapter 7 – Confidentiality Using Symmetric Encryption John wrote the letters of the alphabet under the letters in its first lines and tried it against the message. Immediately he knew that once more he had broken the code. It was extraordinary the feeling of triumph he had. He felt on top of the world. For not only had he done it, had he broken the July code, but he now had the key to every future coded message, since instructions as to the source of the next one must of necessity appear in the current one at the end of each month. — Talking to Strange Men, Ruth Rendell
  • 3. Confidentiality using Symmetric Encryption traditionally symmetric encryption is used to provide message confidentiality consider typical scenario workstations on LANs access other workstations & servers on LAN LANs interconnected using switches/routers with external lines or radio/satellite links consider attacks and placement in this scenario snooping from another workstation use dial-in to LAN or server to snoop use external router link to enter & snoop monitor and/or modify traffic one external links
  • 4. Confidentiality using Symmetric Encryption have two major placement alternatives link encryption encryption occurs independently on every link implies must decrypt traffic between links requires many devices, but paired keys end-to-end encryption encryption occurs between original source and final destination need devices at each end with shared keys
  • 5. Traffic Analysis when using end-to-end encryption must leave headers in clear so network can correctly route information hence although contents protected, traffic pattern flows are not ideally want both at once end-to-end protects data contents over entire path and provides authentication link protects traffic flows from monitoring
  • 6. Placement of Encryption can place encryption function at various layers in OSI Reference Model link encryption occurs at layers 1 or 2 end-to-end can occur at layers 3, 4, 6, 7 as move higher less information is encrypted but it is more secure though more complex with more entities and keys
  • 7. Traffic Analysis is monitoring of communications flows between parties useful both in military & commercial spheres can also be used to create a covert channel link encryption obscures header details but overall traffic volumes in networks and at end-points is still visible traffic padding can further obscure flows but at cost of continuous traffic
  • 8. Key Distribution symmetric schemes require both parties to share a common secret key issue is how to securely distribute this key often secure system failure due to a break in the key distribution scheme
  • 9. Key Distribution given parties A and B have various key distribution alternatives: A can select key and physically deliver to B third party can select & deliver key to A & B if A & B have communicated previously can use previous key to encrypt a new key if A & B have secure communications with a third party C, C can relay key between A & B
  • 11. Key Distribution Issues hierarchies of KDC’s required for large networks, but must trust each other session key lifetimes should be limited for greater security use of automatic key distribution on behalf of users, but must trust system use of decentralized key distribution controlling purposes keys are used for
  • 12. Random Numbers many uses of random numbers in cryptography nonces in authentication protocols to prevent replay session keys public key generation keystream for a one-time pad in all cases its critical that these values be statistically random with uniform distribution, independent unpredictable cannot infer future sequence on previous values
  • 13. Natural Random Noise best source is natural randomness in real world find a regular but random event and monitor do generally need special h/w to do this eg. radiation counters, radio noise, audio noise, thermal noise in diodes, leaky capacitors, mercury discharge tubes etc starting to see such h/w in new CPU's problems of bias or uneven distribution in signal have to compensate for this when sample and use best to only use a few noisiest bits from each sample
  • 14. Published Sources a few published collections of random numbers Rand Co, in 1955, published 1 million numbers generated using an electronic roulette wheel has been used in some cipher designs cf Khafre earlier Tippett in 1927 published a collection issues are that: these are limited too well-known for most uses
  • 15. Pseudorandom Number Generators (PRNGs) algorithmic technique to create “random numbers” although not truly random can pass many tests of “randomness”
  • 16. Linear Congruential Generator common iterative technique using: X n +1 = ( aX n + c ) mod m given suitable values of parameters can produce a long random-like sequence suitable criteria to have are: function generates a full-period generated sequence should appear random efficient implementation with 32-bit arithmetic note that an attacker can reconstruct sequence given a small number of values
  • 17. Using Block Ciphers as Stream Ciphers can use block cipher to generate numbers use Counter Mode X i = E Km [i] use Output Feedback Mode X i = E Km [ X i-1 ] ANSI X9.17 PRNG uses date-time + seed inputs and 3 triple-DES encryptions to generate new seed & random
  • 18. Blum Blum Shub Generator based on public key algorithms use least significant bit from iterative equation: x i+1 = x i 2 mod n where n=p.q , and primes p,q=3 mod 4 unpredictable, passes next-bit test security rests on difficulty of factoring N is unpredictable given any run of bits slow, since very large numbers must be used too slow for cipher use, good for key generation
  • 19. Summary have considered: use of symmetric encryption to protect confidentiality need for good key distribution use of trusted third party KDC’s random number generation