Crypto
Crypto
Crypto
Authentication
Digital Certificate
DH algorithm
Encryption
Confidentiality - Keeping information out of the hands of
unauthorized users
Technique: Data Encryption
Confidentiality, Integrity
and Authentication CN8816: Network Security 2
1. Symmetric Key Algorithm
Ks Ks
Same key
Confidentiality, Integrity
and Authentication CN8816: Network Security 3
1. Symmetric Key Algorithm
Ks En Ks En Ks En
C1 … Cn … CN
Confidentiality, Integrity
and Authentication CN8816: Network Security 4
1. Symmetric Key Algorithm
DES Algorithm
Data is divided into 64-bit blocks
Basic operation:
KN+1
+ F( )
Confidentiality, Integrity
and Authentication CN8816: Network Security 5
1. Symmetric Key Algorithm
Both encryption and decryption processes consist of 16 rounds
of basic operation
Encryption and decryption have the same structure
k1/k16
Basic Operation 1
…
k16/k1
…
Basic Operation 16
Left Right
DES3
Cascading three DES blocks to support a longer key length
Supports key lengths of 56, 112, and 168
Confidentiality, Integrity
and Authentication CN8816: Network Security 7
1. Symmetric Key Algorithm
Initial Vector
(IV)
Confidentiality, Integrity
and Authentication CN8816: Network Security 8
1. Symmetric Key Algorithm
AES
Use the concept of multiplicative inversion
-1
P(x)*P (x) = 1
Basic 8-bit multiplication operation:
8 4 3
( P(x) * Q(x) ) mod ( x +x +x +x+1)
8 4 3
x +x +x +x+1 is an irreducible polynomial
Confidentiality, Integrity
and Authentication CN8816: Network Security 9
1. Symmetric Key Algorithm
AES consists of N rounds of basic operation
N= 10, 12, or 14 for the key size of 128, 192, or 256, respectively
k0
+ Input
Key expansion
k1
Key Basic Operation 1
…
…
K(N-1)
Basic Operation N-1
KN
Sub-byte and shift row Output
Confidentiality, Integrity
and Authentication CN8816: Network Security 10
1. Symmetric Key Algorithm
AES
Basic operation
Confidentiality, Integrity
and Authentication CN8816: Network Security 11
1. Symmetric Key Algorithm
SubByte Processing
From Pi,j , find Inv(Pi,j)
Pi,j Inv(Pi,j ) Mod (x +x +x +x+1) = 1
8 4 3
Inv(Pi,j) is then multiplied with a fixed 8x8 binary matrix and then
added with a fixed binary vector
Si,j = B1 Inv(Pi,j) + B2
c0 1 0 0 0 1 1 1 1 b0 1
c1 1 1 0 0 0 1 1 1 b1 1
c2 1 1 1 0 0 0 1 1 b2 0
c3 = 1 1 1 1 0 0 0 1 b3 + 0
c4 1 1 1 1 1 0 0 0 b4 0
c5 0 1 1 1 1 1 0 0 b5 1
c6 0 0 1 1 1 1 1 0 b6 1
c7 0 0 0 1 1 1 1 1 b7 0
Confidentiality, Integrity
and Authentication CN8816: Network Security 12
1. Symmetric Key Algorithm
ShiftRow
R0 R1 R2 R3
S0,0 S0,1 S0,2 S0,3 S0,0 S0,1 S0,2 S0,3
Confidentiality, Integrity
and Authentication CN8816: Network Security 13
1. Symmetric Key Algorithm
MaxColumns transform
Zi = a(x) × Ri(x) (mod) x4 + 1
a(x) = {03}x
3 + {01}x2 + {01}x + {02}
Zi = A Ri
02 03 01 01
A=
01 02 03 01
01 01 02 03
03 01 01 02
The product of the multiplication of the two coefficients is still
limited to the finite field of 8 bits
Applying modular operation with the modulus of
x8 + x4 + x3 + x + 1
Confidentiality, Integrity
and Authentication CN8816: Network Security 14
1. Symmetric Key Algorithm
AddRoundKey Transformation
Round Key
Z0,0 Z0,1 Z0,2 Z0,3 K0,0 K0,1 K0,2 K0,3
Message Digest
The digest is the hash function of a message
A small change of the message will completely change the
hash value
Confidentiality, Integrity
and Authentication CN8816: Network Security 16
2. Data Integrity
Hash algorithms
MD-5: 512-bit block, 128-bit hash
Secure Hash Algorithm (SHA)
SHA-1: 512-bit block, 160-bit hash
SHA-224: 512-bit block, 224-bit hash
SHA-256: 512-bit block, 256-bit hash
SHA-384: 1024-bit block, 385-bit hash
SHA-512: 1024-bit block, 512-bit hash
Confidentiality, Integrity
and Authentication CN8816: Network Security 17
2. Data Integrity
SHA-512
Message Padding
The padding includes the padding and length fields
The length field holds the value of the message length
Padding 128
Message 100…00 Length
Confidentiality, Integrity
and Authentication CN8816: Network Security 18
2. Data Integrity
Processing overview
M1 M2 … Mi … MN
Confidentiality, Integrity
and Authentication CN8816: Network Security 19
2. Data Integrity
Confidentiality, Integrity
and Authentication CN8816: Network Security 20
3. Private/Public Key Mechanism
Confidentiality, Integrity
and Authentication CN8816: Network Security 21
3. Private/Public Key Mechanism
RSA algorithm:
Select two large prime numbers, P and Q
Select an odd number E such that E and (P-1)(Q-1) are relative
prime
Find a number D, which is the multiplicative inverse of E, such
that
DE modulo (P-1)(Q-1) = 1
Public key = (E, PQ)
Private key = (D, PQ)
Encrytion/Decryption:
E
Cipher Text (C) = M mod PQ
D ED
Origin Text (M) = C mod PQ = M mod PQ
Confidentiality, Integrity
and Authentication CN8816: Network Security 22
3. Private/Public Key Mechanism
RSAES-OAEP algorithm
Provides integrity check to counter the chosen cipher
attack
L Hash
seed MGF O
+
Public_key
O
+ MGF
cipher
Ox00 masked seed Masked Data Block Encryption
text
Confidentiality, Integrity
and Authentication CN8816: Network Security 23
3. Private/Public Key Mechanism
1. Eb(A, Na)
Confidentiality, Integrity
and Authentication CN8816: Network Security 24
3. Private/Public Key Mechanism
Digital Signature Application
Private/public key pair and hash function
Confidentiality, Integrity
and Authentication CN8816: Network Security 25
3. Private/Public Key Mechanism
A public key is used to verify the digital signature
Confidentiality, Integrity
and Authentication CN8816: Network Security 26
3. Private/Public Key Mechanism
Confidentiality, Integrity
and Authentication CN8816: Network Security 27
4. Digital Certificate
Certificate
Verification of the
certificate
Confidentiality, Integrity
and Authentication CN8816: Network Security 28
4. Digital Certificate
Confidentiality, Integrity
and Authentication CN8816: Network Security 29
4. Digital Certificate
Equal?
Confidentiality, Integrity
and Authentication CN8816: Network Security 30
4. Digital Certificate
CA Hierarchical structure
the root CA delegates the certification authority to the
intermediate CA
Confidentiality, Integrity
and Authentication CN8816: Network Security 31
4. Digital Certificate
User
Cert/CRL retrieval
Cert/CRL Repository
End entity
Cert pub. registration
Regist. Auth. revocation
Cert/CRL pub.
CA
CRL pub. cross
CRL issuer certification
Management CA
Confidentiality, Integrity
and Authentication CN8816: Network Security 32
5. DH Algorithm
gy mod n
Confidentiality, Integrity
and Authentication CN8816: Network Security 33
5. DH Algorithm
DH exchange is susceptible to the man-in-the-middle attack
Peers must require authentication
Confidentiality, Integrity
and Authentication CN8816: Network Security 34