SlideShare a Scribd company logo
CS5204 – Operating Systems 1
Cryptographic Security
CS 5204 – Operating Systems 2
Cryptographic Security
Security Considerations
Goals:
• privacy/confidentiality - information not disclosed to unauthorized entities
• integrity - information not altered deliberately or accidentally
• authentication - validation of identity of source of information
• non-repudiation - source of information can be objectively established
Factors:
• reliance on unknown, vulnerable intermediaries (e.g., Internet routers)
• parties may have no personal or organizational relationship (e.g., e-commerce)
• use of automated surrogates (e.g., agents)
Threats:
• replay of messages
• interference (inserting bogus messages)
• corrupting messages
CS 5204 – Operating Systems 3
Cryptographic Security
Cryptography
Encryption key Decryption key
public information
E
CA
M D
C
M’
Ke
M
Kd
Forms of attack:
ciphertext­
only
known­
plaintext
chosen­
plaintext
CS 5204 – Operating Systems 4
Cryptographic Security
Forms of Cryptosystems
• Private Key (symmetric) :
A single key is used for both encryption and decryption.
Key distribution problem ­a secure channel is needed to transmit
the key before secure communication can take place over an
unsecure channel.
• Public Key (asymmetric):
The encryption procedure (key) is public while the decryption
procedure (key) is private.
Requirements:
1. For every message M, D(E(M)) = M
2. E and D can be efficiently applied to M
3. It is impractical to derive D from E.
CS 5204 – Operating Systems 5
Cryptographic Security
Combining Public/Private Key Systems
(1)
(2)
A B
Public key encryption is more expensive than symmetric key encryption
For efficiency, combine the two approaches
(1) Use public key encryption for authentication; once authenticated,
transfer a shared secret symmetric key
(2) Use symmetric key for encrypting subsequent data transmissions
CS 5204 – Operating Systems 6
Cryptographic Security
Secure Communication - Public Key System
M M
?
User X User Y
User Z
DY(C)
EY(M)
C
EY is the public key for user Y
DY is the secret key for user Y
CS 5204 – Operating Systems 7
Cryptographic Security
Rivest­
Shamir­
Adelman (RSA) Method
M
M
User X User Y
Me
mod n Cd
mod n
Encryption Key for user Y Decryption Key for user Y
C
(e, n) (d, n)
CS 5204 – Operating Systems 8
Cryptographic Security
RSA Method
1. Choose two large (100 digit) prime numbers, p and q,and set n = p x q
2. Choose any large integer, d, so that: GCD( d, ((p­
1)x(q­
1)) = 1
3. Find e so that: e x d = 1 (modulo (p­
1)x(q­
1))
Example:
1. p = 5, q = 11 and n = 55.
(p­
1)x(q­
1) = 4 x 10 = 40
2. A valid d is 23 since GCD(40, 23) = 1
3. Then e = 7 since:
23 x 7 = 161 modulo 40 = 1
CS 5204 – Operating Systems 9
Cryptographic Security
(Large) Document Integrity
File/
message
hash process
digest
Digest properties:
• fixed-length, condensation of the source
• efficient to compute
• irreversible - computationally infeasible for the
original source to be reconstructed from the digest
• unique - difficult to find two different sources that
map to the same digest (collision resistance)
Also know as: fingerprint
Examples: MD5 (128 bits), SHA-1 (160 bits)
CS 5204 – Operating Systems 10
Cryptographic Security
(Large)Document Integrity
file
hash process
digest
file
encrypt with
sender’s private key
digital
envelope
CS 5204 – Operating Systems 11
Cryptographic Security
Guaranteeing Integrity
hash process
file
digest
decrypt with
sender’s public key
file
digital
envelope
digest
compare
CS 5204 – Operating Systems 12
Cryptographic Security
Digital Signatures (Public Key)
Requirements:
unforgable and unique
receiver: knows that a message came from the sender (authenticity)
sender: cannot deny authorship( non-repudiation)
message integrity
sender & receiver: message contents preserved (integrity)
(e.g., cannot cut­
and­
paste a signature into a message)
Public Key System:
sender, A: (EA : public, DA : private)
receiver, B: (EB : public, DB : private)
sender(A) ­
­
­
­C= EB (DA (M)) ­
­
­
> receiver(B)
receiver(B) ­
­M = EA (DB (C)) ­
­
­
> M
CS 5204 – Operating Systems 13
Cryptographic Security
Secure Communication (Public Key)
B
A
Handshaking
IA, IB are “nonces”
nonces can be included in each subsequent message
PKB: public key of B; PKA: public key of A;
EPKA (IA, IB)
EPKB, (IA, A)
EPKB (IB)

More Related Content

PPT
Lecture 17 (Cryptography).pptngrfiigrhjtf
PPTX
Encryption techniques
PPT
Attaining data security in cloud computing
PPT
6. cryptography
PPTX
Secrity project keyvan
PPTX
Encryption in Cryptography
PPT
Cryptography
PPTX
Cyptography and network security unit 3-1
Lecture 17 (Cryptography).pptngrfiigrhjtf
Encryption techniques
Attaining data security in cloud computing
6. cryptography
Secrity project keyvan
Encryption in Cryptography
Cryptography
Cyptography and network security unit 3-1

Similar to Cryptography subject gor lectures 111.ppt (20)

PPT
Seminar on ECommerce
PPTX
Unit 7 : Network Security
PPTX
Introduction to Cryptography for btech cse
PDF
TLS/SSL Protocol Design 201006
PPT
Encryption
PPTX
Security testing fundamentals - must need basics to learn Penetration Testing
PPTX
Cryptography /Sankar jayam
PPTX
Sankar jayam
PPTX
Cyber security workshop talk.pptx
PPTX
IT235 POC - Unit I priciples of cryptography
PPT
security issue
PDF
Basics of Data Security and Cryptographic techniques
PDF
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
PPTX
Cloud-Security-Prevention-Techniques-22042025-111844am (2).pptx
PPTX
PDF
A Robust Cryptographic System using Neighborhood-Generated Keys
PDF
A Robust Cryptographic System using Neighborhood-Generated Keys
PPTX
Network security
PDF
SlingSecure Mobile Voice Encryption
PPTX
3 public key cryptography
Seminar on ECommerce
Unit 7 : Network Security
Introduction to Cryptography for btech cse
TLS/SSL Protocol Design 201006
Encryption
Security testing fundamentals - must need basics to learn Penetration Testing
Cryptography /Sankar jayam
Sankar jayam
Cyber security workshop talk.pptx
IT235 POC - Unit I priciples of cryptography
security issue
Basics of Data Security and Cryptographic techniques
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
Cloud-Security-Prevention-Techniques-22042025-111844am (2).pptx
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
Network security
SlingSecure Mobile Voice Encryption
3 public key cryptography
Ad

More from abduganiyevbekzod011 (10)

PDF
Xalqaro_anjumanlar_baza_2025 nskvn nsn snrdg.pdf
PPTX
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
PPTX
12_2019_12_03!04_59_50_PM symmetric.pptx
PPTX
typesofattacks-180418113629 255536155.pptx
PPT
lecture2-1 part one about cryptography.ppt
PPT
Tree-structured indexes lectures for student.ppt
PPT
9910559 jjjgjgjfs lke lwmerfml lew we.ppt
PPT
ch1_intro_HH_upd lectures othe be hand.ppt
PPT
attachment_2356_1635343030 service unit.ppt
PPTX
Ta'lim klasteri kontekstida talabalarning ijtimoiy
Xalqaro_anjumanlar_baza_2025 nskvn nsn snrdg.pdf
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
12_2019_12_03!04_59_50_PM symmetric.pptx
typesofattacks-180418113629 255536155.pptx
lecture2-1 part one about cryptography.ppt
Tree-structured indexes lectures for student.ppt
9910559 jjjgjgjfs lke lwmerfml lew we.ppt
ch1_intro_HH_upd lectures othe be hand.ppt
attachment_2356_1635343030 service unit.ppt
Ta'lim klasteri kontekstida talabalarning ijtimoiy
Ad

Recently uploaded (20)

PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
advance database management system book.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
Trump Administration's workforce development strategy
PDF
IGGE1 Understanding the Self1234567891011
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
RMMM.pdf make it easy to upload and study
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
Empowerment Technology for Senior High School Guide
PDF
Complications of Minimal Access Surgery at WLH
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Weekly quiz Compilation Jan -July 25.pdf
advance database management system book.pdf
Computing-Curriculum for Schools in Ghana
Trump Administration's workforce development strategy
IGGE1 Understanding the Self1234567891011
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
A systematic review of self-coping strategies used by university students to ...
What if we spent less time fighting change, and more time building what’s rig...
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Final Presentation General Medicine 03-08-2024.pptx
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
RMMM.pdf make it easy to upload and study
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Empowerment Technology for Senior High School Guide
Complications of Minimal Access Surgery at WLH
UNIT III MENTAL HEALTH NURSING ASSESSMENT

Cryptography subject gor lectures 111.ppt

  • 1. CS5204 – Operating Systems 1 Cryptographic Security
  • 2. CS 5204 – Operating Systems 2 Cryptographic Security Security Considerations Goals: • privacy/confidentiality - information not disclosed to unauthorized entities • integrity - information not altered deliberately or accidentally • authentication - validation of identity of source of information • non-repudiation - source of information can be objectively established Factors: • reliance on unknown, vulnerable intermediaries (e.g., Internet routers) • parties may have no personal or organizational relationship (e.g., e-commerce) • use of automated surrogates (e.g., agents) Threats: • replay of messages • interference (inserting bogus messages) • corrupting messages
  • 3. CS 5204 – Operating Systems 3 Cryptographic Security Cryptography Encryption key Decryption key public information E CA M D C M’ Ke M Kd Forms of attack: ciphertext­ only known­ plaintext chosen­ plaintext
  • 4. CS 5204 – Operating Systems 4 Cryptographic Security Forms of Cryptosystems • Private Key (symmetric) : A single key is used for both encryption and decryption. Key distribution problem ­a secure channel is needed to transmit the key before secure communication can take place over an unsecure channel. • Public Key (asymmetric): The encryption procedure (key) is public while the decryption procedure (key) is private. Requirements: 1. For every message M, D(E(M)) = M 2. E and D can be efficiently applied to M 3. It is impractical to derive D from E.
  • 5. CS 5204 – Operating Systems 5 Cryptographic Security Combining Public/Private Key Systems (1) (2) A B Public key encryption is more expensive than symmetric key encryption For efficiency, combine the two approaches (1) Use public key encryption for authentication; once authenticated, transfer a shared secret symmetric key (2) Use symmetric key for encrypting subsequent data transmissions
  • 6. CS 5204 – Operating Systems 6 Cryptographic Security Secure Communication - Public Key System M M ? User X User Y User Z DY(C) EY(M) C EY is the public key for user Y DY is the secret key for user Y
  • 7. CS 5204 – Operating Systems 7 Cryptographic Security Rivest­ Shamir­ Adelman (RSA) Method M M User X User Y Me mod n Cd mod n Encryption Key for user Y Decryption Key for user Y C (e, n) (d, n)
  • 8. CS 5204 – Operating Systems 8 Cryptographic Security RSA Method 1. Choose two large (100 digit) prime numbers, p and q,and set n = p x q 2. Choose any large integer, d, so that: GCD( d, ((p­ 1)x(q­ 1)) = 1 3. Find e so that: e x d = 1 (modulo (p­ 1)x(q­ 1)) Example: 1. p = 5, q = 11 and n = 55. (p­ 1)x(q­ 1) = 4 x 10 = 40 2. A valid d is 23 since GCD(40, 23) = 1 3. Then e = 7 since: 23 x 7 = 161 modulo 40 = 1
  • 9. CS 5204 – Operating Systems 9 Cryptographic Security (Large) Document Integrity File/ message hash process digest Digest properties: • fixed-length, condensation of the source • efficient to compute • irreversible - computationally infeasible for the original source to be reconstructed from the digest • unique - difficult to find two different sources that map to the same digest (collision resistance) Also know as: fingerprint Examples: MD5 (128 bits), SHA-1 (160 bits)
  • 10. CS 5204 – Operating Systems 10 Cryptographic Security (Large)Document Integrity file hash process digest file encrypt with sender’s private key digital envelope
  • 11. CS 5204 – Operating Systems 11 Cryptographic Security Guaranteeing Integrity hash process file digest decrypt with sender’s public key file digital envelope digest compare
  • 12. CS 5204 – Operating Systems 12 Cryptographic Security Digital Signatures (Public Key) Requirements: unforgable and unique receiver: knows that a message came from the sender (authenticity) sender: cannot deny authorship( non-repudiation) message integrity sender & receiver: message contents preserved (integrity) (e.g., cannot cut­ and­ paste a signature into a message) Public Key System: sender, A: (EA : public, DA : private) receiver, B: (EB : public, DB : private) sender(A) ­ ­ ­ ­C= EB (DA (M)) ­ ­ ­ > receiver(B) receiver(B) ­ ­M = EA (DB (C)) ­ ­ ­ > M
  • 13. CS 5204 – Operating Systems 13 Cryptographic Security Secure Communication (Public Key) B A Handshaking IA, IB are “nonces” nonces can be included in each subsequent message PKB: public key of B; PKA: public key of A; EPKA (IA, IB) EPKB, (IA, A) EPKB (IB)