INTRODUCTION Computer data often travels from one computer to another, leaving the safety of its protected physical surroundings. Once the data is out of hand, people with bad intention could modify or forge your data, either for amusement or for their own benefit. Cryptography can reformat and transform our data, making it safer on its trip between computers. The technology is based on the essentials of secret codes, augmented by modern mathematics that protects our data in powerful ways.
Computer Security - generic name for the collection of tools designed to protect data and to thwar thackers .[ to stop somebody doing what he/she planned to do; to prevent something happening ] Network Security - measures to protect data during their transmission Internet Security - measures to protect data during their transmission over a collection of interconnected networks
Security Attacks, Services and Mechanisms To assess the security needs of an organization effectively, the manager responsible for security needs some systematic way of defining the requirements for security and characterization of approaches to satisfy those requirements. One approach is to consider three aspects of information security: Security attack – Any action that compromises the security of information owned by an organization. Security mechanism – A mechanism that is designed to detect, prevent or recover from a security attack. Security service – A service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks and they make use of one or more security mechanisms to provide the service.
Basic Concepts Cryptography The art or science encompassing the principles and methods of transforming an intelligible message into one that is unintelligible, and then retransforming that message back to its original form Plaintext The original intelligible message Cipher text The transformed message Cipher An algorithm for transforming an intelligible message into one that is unintelligible by transposition and/or substitution methods Key Some critical information used by the cipher, known only to the sender& receiver Encipher (encode) The process of converting plaintext to cipher text using a cipher and a key Decipher (decode) the process of converting cipher text back into plaintext using a cipher and a key Cryptanalysis The study of principles and methods of transforming an unintelligible message back into an intelligible message without knowledge of the key. Also called code breaking Cryptology Both cryptography and cryptanalysis Code An algorithm for transforming an intelligible message into an unintelligible one using a code-book
Cryptography Cryptographic systems are generally classified along 3 independent dimensions: Type of operations used for transforming plain text to cipher text All the encryption algorithms are based on two general principles: substitution , in which each element in the plaintext is mapped into another element, and transposition , in which elements in the plaintext are rearranged. The number of keys used If the sender and receiver uses same key then it is said to be symmetric key (or) single key (or) conventional encryption . If the sender and receiver use different keys then it is said to be public key encryption . The way in which the plain text is processed A block cipher processes the input and block of elements at a time, producing output block for each input block. A stream cipher processes the input elements continuously, producing output element one at a time, as it goes along.
SECURITY SERVICES The classification of security services are as follows: Confidentiality: Ensures that the information in a computer system a n d transmitted information are accessible only for reading by authorized parties. E.g. Printing, displaying and other forms of disclosure. Authentication : Ensures that the origin of a message or electronic document is correctly identified, with an assurance that the identity is not false. Integrity : Ensures that only authorized parties are able to modify computer system assets and transmitted information. Modification includes writing, changing status, deleting, creating and delaying or replaying of transmitted messages. Non repudiation : Requires that neither the sender nor the receiver of a message be able to deny the transmission. Access control : Requires that access to information resources may be controlled by or the target system. Availability: Requires that computer system assets be available to authorized parties when needed
DATA ENCRYPTION STANDARD (DES) In May 1973, and again in Aug 1974 the NBS (now NIST) called for possible encryption algorithms for use in unclassified government applications response was mostly disappointing, however IBM submitted their Lucifer design following a period of redesign and comment it became the Data Encryption Standard (DES) it was adopted as a (US) federal standard in Nov 76, published by NBS as a hardware only scheme in Jan 77 and by ANSI for both hardware and software standards subsequently it has been widely adopted and is now published in many standards around the world cf Australian Standard
one of the largest users of the DES is the banking industry, particularly with EFT, and EFTPOS it is for this use that the DES has primarily been standardized, with ANSI having twice reconfirmed its recommended use for 5 year periods recent analysis has shown despite this that the choice was appropriate, and that DES is well designed rapid advances in computing speed though have rendered the 56 bit key susceptible to exhaustive key search, as predicted by Diffie & Hellman the DES has also been theoretically broken using a method called Differential Cryptanalysis, however in practice this is unlikely to be a problem (yet)
Overview of the DES Encryption Algorithm
the basic process in enciphering a 64-bit data block using the DES consists of: an initial permutation (IP) 16 rounds of a complex key dependent calculation f a final permutation, being the inverse of IP · in more detail the 16 rounds of f consist of:
this can be described functionally as L( i ) = R(i-1) R( i ) = L(i-1) (+) P(S( E(R(i-1))(+) K( i ) )) and forms one round in an S-P network · the subkeys used by the 16 rounds are formed by the key schedule which consists of: an initial permutation of the key (PC1) which selects 56-bits in two 28-bit halves 16 stages consisting of o selecting 24-bits from each half and permuting them by PC2 for use in function f, rotating each half either 1 or 2 places depending on the key rotation schedule KS · this can be described functionally as: K( i ) = PC2(KS(PC1(K), i ))
DES Modes of Use DES encrypts 64-bit blocks of data, using a 56-bit key · we need some way of specifying how to use it in practise , given that we usually have an arbitrary amount of information to encrypt the way we use a block cipher is called its Mode of Use and four have been defined for the DES by ANSI in the standard: ANSI X3.106-1983 Modes of Use)
modes are either: Block Modes Splits messages in blocks (ECB, CBC) Electronic Codebook Book (ECB) – Where the message is broken into independent 64-bit blocks which are encrypted C_( i ) = DES_(K1) (P_( i )) Cipher Block Chaining (CBC) Again the message is broken into 64-bit blocks, but they are linked together in the encryption operation with an IV C_( i ) = DES_(K1) (P_( i )(+)C_(i-1)) C_(-1)=IV Stream Modes On bit stream messages (CFB, OFB)
Cipher Feedback (CFB) Where the message is treated as a stream of bits, added to the output of the DES, with the result being feedback for the next stage C_( i ) = P_( i )(+) DES_(K1) (C_(i-1)) C_(-1)=IV Output Feedback (OFB) Where the message is treated as a stream of bits, added to the message, but with the feedback being independent of the message C_( i ) = P_( i )(+) O_( i ) O_( i ) = DES_(K1)(O_(i-1)) O_(-1)=IV · each mode has its advantages and disadvantages
Limitations of Various Modes ECB repetitions in message can be reflected in ciphertext if aligned with message block particularly with data such graphics or with messages that change very little, which become a code-book analysis problem weakness is because enciphered message blocks are independent of each other
DES DES Weak Keys · with many block ciphers there are some keys that should be avoided, because of reduced cipher complexity · these keys are such that the same sub-key is generated in more than one round, and they include: Weak Keys · he same sub-key is generated for every round · DES has 4 weak keys Semi-Weak Keys · only two sub-keys are generated on alternate rounds · DES has 12 of these (in 6 pairs)
Demi-Semi Weak Keys have four sub-keys generated · none of these cause a problem since they are a tiny fraction of all available keys · however they MUST be avoided by any key generation program
Public Key Cryptography Symmetric cryptography was well suited for organizations such as governments, military, and big financial corporations were involved in the classified communication. With the spread of more unsecure computer networks in last few decades, a genuine need was felt to use cryptography at larger scale. The symmetric key was found to be non-practical due to challenges it faced for key management. This gave rise to the public key cryptosystems
The process of encryption and decryption is depicted in the following illustration −
The most important properties of public key encryption scheme are − Different keys are used for encryption and decryption. This is a property which set this scheme different than symmetric encryption scheme. Each receiver possesses a unique decryption key, generally referred to as his private key. Receiver needs to publish an encryption key, referred to as his public key. Some assurance of the authenticity of a public key is needed in this scheme to avoid spoofing by adversary as the receiver. Generally , this type of cryptosystem involves trusted third party which certifies that a particular public key belongs to a specific person or entity only. Encryption algorithm is complex enough to prohibit attacker from deducing the plaintext from the ciphertext and the encryption (public) key. Though private and public keys are related mathematically, it is not be feasible to calculate the private key from the public key. In fact, intelligent part of any public-key cryptosystem is in designing a relationship between two keys.
Cryptography Hash functions Hash functions are extremely useful and appear in almost all information security applications. A hash function is a mathematical function that converts a numerical input value into another compressed numerical value. The input to the hash function is of arbitrary length but output is always of fixed length. Values returned by a hash function are called message digest or simply hash values . The following picture illustrated hash function −
Features of Hash Functions The typical features of hash functions are − Fixed Length Output (Hash Value) Hash function coverts data of arbitrary length to a fixed length. This process is often referred to as hashing the data . In general, the hash is much smaller than the input data, hence hash functions are sometimes called compression functions . Since a hash is a smaller representation of a larger data, it is also referred to as a digest . Hash function with n bit output is referred to as an n-bit hash function . Popular hash functions generate values between 160 and 512 bits.
Efficiency of Operation Generally for any hash function h with input x, computation of h(x) is a fast operation. Computationally hash functions are much faster than a symmetric encryption.
Properties of Hash Functions In order to be an effective cryptographic tool, the hash function is desired to possess following properties − Pre-Image Resistance This property means that it should be computationally hard to reverse a hash function. In other words, if a hash function h produced a hash value z, then it should be a difficult process to find any input value x that hashes to z. This property protects against an attacker who only has a hash value and is trying to find the input.
Second Pre-Image Resistance This property means given an input and its hash, it should be hard to find a different input with the same hash. In other words, if a hash function h for an input x produces hash value h(x), then it should be difficult to find any other input value y such that h(y) = h(x). This property of hash function protects against an attacker who has an input value and its hash, and wants to substitute different value as legitimate value in place of original input value.
Collision Resistance This property means it should be hard to find two different inputs of any length that result in the same hash. This property is also referred to as collision free hash function. In other words, for a hash function h, it is hard to find any two different inputs x and y such that h(x) = h(y). Since, hash function is compressing function with fixed hash length, it is impossible for a hash function not to have collisions. This property of collision free only confirms that these collisions should be hard to find. This property makes it very difficult for an attacker to find two input values with the same hash. Also, if a hash function is collision-resistant then it is second pre-image resistant.
Design of Hashing Algorithms At the heart of a hashing is a mathematical function that operates on two fixed-size blocks of data to create a hash code. This hash function forms the part of the hashing algorithm. The size of each data block varies depending on the algorithm. Typically the block sizes are from 128 bits to 512 bits. The following illustration demonstrates hash function −
Hashing algorithm involves rounds of above hash function like a block cipher. Each round takes an input of a fixed size, typically a combination of the most recent message block and the output of the last round. This process is repeated for as many rounds as are required to hash the entire message. Schematic of hashing algorithm is depicted in the following illustration −
Since, the hash value of first message block becomes an input to the second hash operation, output of which alters the result of the third operation, and so on. This effect, known as an avalanche effect of hashing. Avalanche effect results in substantially different hash values for two messages that differ by even a single bit of data. Understand the difference between hash function and algorithm correctly. The hash function generates a hash code by operating on two blocks of fixed-length binary data. Hashing algorithm is a process for using the hash function, specifying how the message will be broken up and how the results from previous message blocks are chained together.
What are Public-Key Cryptography Standards (PKCS )? Public-Key Cryptography Standards (PKCS) are a set of standard protocols, numbered from 1 to 15. These standards were developed to enable secure information exchange on the internet by using a public key infrastructure ( PKI ). Over the past three decades, PKCS specifications have made a significant impact on the real-world and practical uses of public key encryption.
Public-Key Cryptography Standards explained PKCS are a set of nonvendor -dependent standards first initiated in the early 1990s. RSA Laboratories devised and published the standards in collaboration with security developers and industry partners from around the world. PKCS specifications are defined for both binary and American Standard Code for Information Interchange data types. They standardize message syntax and specific algorithms , which can be viewed as different levels of abstraction that are independent of each other. However, the specifications only describe message syntax in an abstract manner without specifying the representation format.
These standards cover the following : Rivest -Shamir- Adleman (RSA) encryption RSA signature password -based encryption encrypted or cryptographic message syntax private key information syntax selected object category and attribute type certification or authentication request syntax encryption or cryptographic token interface personal information exchange syntax encrypted or cryptographic token information syntax
A primary goal of developing PKCS was to make different applications from different vendors interoperable. However , security developers also had other aims, namely, to accelerate the deployment of public key cryptography by vendors, foster more secure communications through extensive cryptography and avoid the errors in typical schemes.