SlideShare a Scribd company logo
DNSSEC Tutorial
Public / Private Keys
DNSSec and Cryptography
Three Key Concepts
l  Public / Private keys
l  Message digests, checksums, hashes
l  Digital signatures
Are at the core of DNSSEC. If these do not make
sense, then DNSSEC will not make sense.
Ciphertext
l  We start with plaintext. Something you can read.
l  We apply a mathematical algorithm to the
plaintext.
l  The algorithm is the cipher.
l  The plaintext is turned in to ciphertext.
l  Creating a secure cipher is a difficult process.
l  The standardization process for AES, the
replacement for the aging DES protocol, took 5
years
Keys
l  In symmetric cryptography, a plaintext is
transformed into a ciphertext, and back into
plaintext using a key to the cipher (the algorithm
used) on both ends.
l  Assuming that the cipher method is known, the
security of the ciphertext rests with the key. This
is a critical point. If someone obtains your key,
your plaintext is compromised.
Symmetric Cipher
The quick
brown fox
jumped
over the...
Single Key/Symmetric Ciphers
The quick
brown fox
jumped
over the...
clear
text
clear
text
ciphertext
K K
The same key is used to encrypt the document before sending
and to decrypt it once it is received
7&T%
$#@!
PoViuz-)~
sddaX23
Dqpir
The Big Question...
+ Issue: how do you securely distribute the
key to the intended receiving party or
parties ?
Public / Private Keys
l  We generate a cipher key pair. One key is the
private key, the other is the public key.
l  The private key remains secret and should be
protected.
l  The public key is freely distributable. It is related
mathematically to the private key, but you cannot
(easily) derive the private key from the public key.
l  Use the public key to encrypt data. Only someone
with the private key can decrypt the encrypted
data.
Example Public / Private Key Pair
The quick
brown fox
jumped
over the...
clear
textk1
(public key)
k2
(private key)
One key is used to encrypt the document,
a different key is used to decrypt it.
This is an important aspect!
The quick
brown fox
jumped
over the...
7&T%
$#@!
PoViuz-)~
sddaX23
Dqpir
clear
text
clear
text
ciphertext
Issues
l  For larger data transmissions than used in
DNSSEC we use hybrid systems.
l  Symmetric ciphers (single key) are much more efficient
than public key algorithms for data transmission!
l  Attack on the public key is possible via chosen-plaintext
attacks. Thus, the public/private key pair need to be
large (2048 bits).
l  For instance, SSH uses public/private cryptography to
setup the initial session, and exchange the dynamically
calculated symmetric session-key.
One-Way Hashing Functions
l  A mathematical function that generates a fixed
length result regardless of the amount of data you
pass through it. Generally very fast.
l  You cannot generate the original data from the fixed-
length result, thus the term “one-way”.
l  Hopefully you cannot find two sets of data that
produce the same fixed-length result. If you do, this
is called a collision. (Example, md5).
l  The fixed length result is known as a Message
Digest or a checksum or a hash.
One-Way Hashing Functions cont.
l  The fixed-length result of a hashing function is
referred to as a checksum, message digest or
hash.
l  Some popular hashing functions include:
è  md5: Outputs 128 bit result. Fast. Collisions found.
http://www.mscs.dal.ca/~selinger/md5collision/
è  sha-1: Outputs 160 bits. Slower. Collisions in 263.
è  sha-2: Outputs 224-512 bits. Slower. Collisions
expected (280 attack).
è  sha-3: TBA: Currently in development via a new NIST
Hash Function Competition:
http://csrc.nist.gov/groups/ST/hash/sha-3/
Hashing 

another example
Note the significant change in the hash sum for minor changes in the
input. Note that the hash sum is the same length for varying input
sizes. This is extremely useful.
*Image courtesy Wikipedia.org.
What use is this?
There are several:
l  Passwords encryption (in Linux, Unix and Windows),
using multiple rounds of hashing (MD5 or other)
l  You can run many megabytes of data through a
hashing function, but only have to check a fixed
number of bits of information (160-512 bits). This is
used to create a digital signature.
Digital Signatures
Reverse the role of public and private keys.
To create a digital signature on a document do:
è  Hash a document, producing a message digest
1.  Encrypt the message digest with your private key.
è  Send the document plus the encrypted message digest.
è  On the other end hash the document and decrypt the
encrypted message digest with the person's public key.
1.  If the results match, the document is authenticated.
This process creates a digital signature.
When Authenticating:
Take a hash of the document and encrypt only that.
An encrypted hash is called a "digital signature"
The quick
brown fox
jumped
over the...
The quick
brown fox
jumped
over the...
k2 k1
digital
signature
COMPARE
hash hash
(public)(private)
Conclusion
l  Public / Private keys
l  Message digests, checksums, hashes
l  Digital signatures
Are at the core of DNSSEC.

More Related Content

PDF
Introduction DNSSec
PDF
DNS Security
PDF
An Overview of DNSSEC
PDF
Signing DNSSEC answers on the fly at the edge: challenges and solutions
PDF
Encrypted DNS - DNS over TLS / DNS over HTTPS
PDF
IPv6 Threat Presentation
PDF
DNSSEC - Domain Name System Security Extensions
PDF
Understanding the DNS & DNSSEC
Introduction DNSSec
DNS Security
An Overview of DNSSEC
Signing DNSSEC answers on the fly at the edge: challenges and solutions
Encrypted DNS - DNS over TLS / DNS over HTTPS
IPv6 Threat Presentation
DNSSEC - Domain Name System Security Extensions
Understanding the DNS & DNSSEC

What's hot (20)

PDF
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
PPTX
Understanding DNS Security
PDF
DNS DDoS Attack and Risk
PDF
getdns PyCon presentation
PDF
CNIT 40: 2: DNS Protocol and Architecture
PDF
DNSSEC Tutorial; USENIX LISA 2013
ZIP
DNS Cache Poisoning
PDF
DNSSEC Deployment for .VN and share information of DNSSEC's plan in 2017
PDF
CNIT 40: 1: The Importance of DNS Security
PDF
Ricardo de Oliveria Schmidt - DDoS Attacks on the Root DNS
PDF
CNIT 40: 6: DNSSEC and beyond
PDF
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
PPTX
ION Hangzhou - How to Deploy DNSSEC
PPTX
DoH, DoT and ESNI
PDF
DNS-OARC 34: Measuring DNS Flag Day 2020
PDF
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
PDF
DNS Cache White Paper
PDF
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
PDF
Network Security Best Practice (BCP38 & 140)
PPT
Cryptography - Overview
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Understanding DNS Security
DNS DDoS Attack and Risk
getdns PyCon presentation
CNIT 40: 2: DNS Protocol and Architecture
DNSSEC Tutorial; USENIX LISA 2013
DNS Cache Poisoning
DNSSEC Deployment for .VN and share information of DNSSEC's plan in 2017
CNIT 40: 1: The Importance of DNS Security
Ricardo de Oliveria Schmidt - DDoS Attacks on the Root DNS
CNIT 40: 6: DNSSEC and beyond
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
ION Hangzhou - How to Deploy DNSSEC
DoH, DoT and ESNI
DNS-OARC 34: Measuring DNS Flag Day 2020
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
DNS Cache White Paper
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
Network Security Best Practice (BCP38 & 140)
Cryptography - Overview
Ad

Similar to Dnssec tutorial-crypto-defs (20)

PPTX
All details of cryptography and all the topics of cryptography was explained
PPTX
IS413 Topic 5.pptx
PPT
Network Security: Standards and Cryptography
PPTX
501 ch 10 cryptography
PDF
White Paper on Cryptography
PPTX
Security
PDF
Public Key Encryption & Hash functions
PPTX
Cryptography and network security
PPTX
CompTIASecPLUS-Part6 - UnlimitedEdited.pptx
PDF
Basic Cryptography.pdf
PPTX
20 security
PPTX
Cryptography-Hash-Functions.pptx
PPTX
Hashes_and_Digital_Signatures_Slides.pptx
PPT
Cryptography
PPT
BCS_PKI_part1.ppt
PPTX
Cryptography Key Management.pptx
PPTX
PPTX
Digital signatures
PDF
Hash
All details of cryptography and all the topics of cryptography was explained
IS413 Topic 5.pptx
Network Security: Standards and Cryptography
501 ch 10 cryptography
White Paper on Cryptography
Security
Public Key Encryption & Hash functions
Cryptography and network security
CompTIASecPLUS-Part6 - UnlimitedEdited.pptx
Basic Cryptography.pdf
20 security
Cryptography-Hash-Functions.pptx
Hashes_and_Digital_Signatures_Slides.pptx
Cryptography
BCS_PKI_part1.ppt
Cryptography Key Management.pptx
Digital signatures
Hash
Ad

More from AFRINIC (20)

PDF
AIS19 - Policies under discussion
PDF
AIS19 Newcomers Session (EN)
PDF
AFRINIC 101 2017
PDF
AFRINIC 101 2016 (Fr)
PDF
Internet development in Africa: a content use, hosting and distribution persp...
PDF
Insight Into Africa’s Country-level Latencies
PDF
Deep Diving into Africa’s Inter-Country Latencies
PDF
Studying performance barriers to cloud services in Africa's public sector
PDF
Routing security and implications for NRENs
PDF
APRICOT Latency Clustering
PDF
Latency clustering AfPIF2017
PDF
AFRINIC RIA MoU
PDF
DNS Measurements
PDF
AFRINIC DNSSEC Infrastructure and Signer Migration
PDF
Tampering With the Open Internet: Experiences From Africa
PDF
Assessing Internet Freedom and the Digital Resilience
PDF
Measuring quality of Internet links in NRENs
PDF
State of Internet measurement Infrastructure/tools in Africa
PDF
TraceMON - a new RIPE Atlas tool
PDF
Measuring the complexity of the Internet: indexes and indicators
AIS19 - Policies under discussion
AIS19 Newcomers Session (EN)
AFRINIC 101 2017
AFRINIC 101 2016 (Fr)
Internet development in Africa: a content use, hosting and distribution persp...
Insight Into Africa’s Country-level Latencies
Deep Diving into Africa’s Inter-Country Latencies
Studying performance barriers to cloud services in Africa's public sector
Routing security and implications for NRENs
APRICOT Latency Clustering
Latency clustering AfPIF2017
AFRINIC RIA MoU
DNS Measurements
AFRINIC DNSSEC Infrastructure and Signer Migration
Tampering With the Open Internet: Experiences From Africa
Assessing Internet Freedom and the Digital Resilience
Measuring quality of Internet links in NRENs
State of Internet measurement Infrastructure/tools in Africa
TraceMON - a new RIPE Atlas tool
Measuring the complexity of the Internet: indexes and indicators

Recently uploaded (20)

PDF
Introduction to the IoT system, how the IoT system works
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
E -tech empowerment technologies PowerPoint
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPT
Ethics in Information System - Management Information System
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
innovation process that make everything different.pptx
PPTX
international classification of diseases ICD-10 review PPT.pptx
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Introduction to the IoT system, how the IoT system works
The New Creative Director: How AI Tools for Social Media Content Creation Are...
E -tech empowerment technologies PowerPoint
An introduction to the IFRS (ISSB) Stndards.pdf
Exploring VPS Hosting Trends for SMBs in 2025
Paper PDF World Game (s) Great Redesign.pdf
Module 1 - Cyber Law and Ethics 101.pptx
Ethics in Information System - Management Information System
Cloud-Scale Log Monitoring _ Datadog.pdf
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Slides PDF The World Game (s) Eco Economic Epochs.pdf
innovation process that make everything different.pptx
international classification of diseases ICD-10 review PPT.pptx
Sims 4 Historia para lo sims 4 para jugar
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
INTERNET------BASICS-------UPDATED PPT PRESENTATION
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Job_Card_System_Styled_lorem_ipsum_.pptx
Slides PPTX World Game (s) Eco Economic Epochs.pptx

Dnssec tutorial-crypto-defs

  • 2. DNSSec and Cryptography Three Key Concepts l  Public / Private keys l  Message digests, checksums, hashes l  Digital signatures Are at the core of DNSSEC. If these do not make sense, then DNSSEC will not make sense.
  • 3. Ciphertext l  We start with plaintext. Something you can read. l  We apply a mathematical algorithm to the plaintext. l  The algorithm is the cipher. l  The plaintext is turned in to ciphertext. l  Creating a secure cipher is a difficult process. l  The standardization process for AES, the replacement for the aging DES protocol, took 5 years
  • 4. Keys l  In symmetric cryptography, a plaintext is transformed into a ciphertext, and back into plaintext using a key to the cipher (the algorithm used) on both ends. l  Assuming that the cipher method is known, the security of the ciphertext rests with the key. This is a critical point. If someone obtains your key, your plaintext is compromised.
  • 5. Symmetric Cipher The quick brown fox jumped over the... Single Key/Symmetric Ciphers The quick brown fox jumped over the... clear text clear text ciphertext K K The same key is used to encrypt the document before sending and to decrypt it once it is received 7&T% $#@! PoViuz-)~ sddaX23 Dqpir
  • 6. The Big Question... + Issue: how do you securely distribute the key to the intended receiving party or parties ?
  • 7. Public / Private Keys l  We generate a cipher key pair. One key is the private key, the other is the public key. l  The private key remains secret and should be protected. l  The public key is freely distributable. It is related mathematically to the private key, but you cannot (easily) derive the private key from the public key. l  Use the public key to encrypt data. Only someone with the private key can decrypt the encrypted data.
  • 8. Example Public / Private Key Pair The quick brown fox jumped over the... clear textk1 (public key) k2 (private key) One key is used to encrypt the document, a different key is used to decrypt it. This is an important aspect! The quick brown fox jumped over the... 7&T% $#@! PoViuz-)~ sddaX23 Dqpir clear text clear text ciphertext
  • 9. Issues l  For larger data transmissions than used in DNSSEC we use hybrid systems. l  Symmetric ciphers (single key) are much more efficient than public key algorithms for data transmission! l  Attack on the public key is possible via chosen-plaintext attacks. Thus, the public/private key pair need to be large (2048 bits). l  For instance, SSH uses public/private cryptography to setup the initial session, and exchange the dynamically calculated symmetric session-key.
  • 10. One-Way Hashing Functions l  A mathematical function that generates a fixed length result regardless of the amount of data you pass through it. Generally very fast. l  You cannot generate the original data from the fixed- length result, thus the term “one-way”. l  Hopefully you cannot find two sets of data that produce the same fixed-length result. If you do, this is called a collision. (Example, md5). l  The fixed length result is known as a Message Digest or a checksum or a hash.
  • 11. One-Way Hashing Functions cont. l  The fixed-length result of a hashing function is referred to as a checksum, message digest or hash. l  Some popular hashing functions include: è  md5: Outputs 128 bit result. Fast. Collisions found. http://www.mscs.dal.ca/~selinger/md5collision/ è  sha-1: Outputs 160 bits. Slower. Collisions in 263. è  sha-2: Outputs 224-512 bits. Slower. Collisions expected (280 attack). è  sha-3: TBA: Currently in development via a new NIST Hash Function Competition: http://csrc.nist.gov/groups/ST/hash/sha-3/
  • 12. Hashing 
 another example Note the significant change in the hash sum for minor changes in the input. Note that the hash sum is the same length for varying input sizes. This is extremely useful. *Image courtesy Wikipedia.org.
  • 13. What use is this? There are several: l  Passwords encryption (in Linux, Unix and Windows), using multiple rounds of hashing (MD5 or other) l  You can run many megabytes of data through a hashing function, but only have to check a fixed number of bits of information (160-512 bits). This is used to create a digital signature.
  • 14. Digital Signatures Reverse the role of public and private keys. To create a digital signature on a document do: è  Hash a document, producing a message digest 1.  Encrypt the message digest with your private key. è  Send the document plus the encrypted message digest. è  On the other end hash the document and decrypt the encrypted message digest with the person's public key. 1.  If the results match, the document is authenticated. This process creates a digital signature.
  • 15. When Authenticating: Take a hash of the document and encrypt only that. An encrypted hash is called a "digital signature" The quick brown fox jumped over the... The quick brown fox jumped over the... k2 k1 digital signature COMPARE hash hash (public)(private)
  • 16. Conclusion l  Public / Private keys l  Message digests, checksums, hashes l  Digital signatures Are at the core of DNSSEC.