100 likes | 168 Views
Explore the advanced realm of asymmetric cryptography, covering mathematical statements, key pairs, security strength, encryption states, and the current status of AES, DES, and hash functions. Join us for a comprehensive look at modern encryption techniques and ensure you never compromise security by building your own solutions when proven tools are available. Stay informed about the latest developments in SHA-3 and engage in discussions on trusting internal components.
E N D
Class 4Asymmetric Cryptography and Trusting Internal Components CIS 755: Advanced Computer SecuritySpring 2014 Eugene Vasserman http://www.cis.ksu.edu/~eyv/CIS755_S14/
Administrative stuff • Quiz on Thursday • Cryptography concepts • Examples… • Project due dates posted • Schedule always being updated – watch for changes • What would you like to see covered? • Paper reading and the “huh?” moment
Last time: Basic primitives • Confidentiality (encryption) • Symmetric (e.g. AES) • Asymmetric (e.g. RSA) • Hash functions • Integrity and authentication • Symmetric (authentication codes) • Asymmetric (signatures) • Random numbers
Asymmetric cryptography • The idea: base security properties on mathematical statements • Facts or assumptions • We need to be familiar with our toolset • NEVER BUILD YOUR OWN WHEN SOLUTION EXISTS!!
Asymmetric • No pre-shared keys • Public and secret keys (key pairs) • Asymmetric means…? • Non-repudiable • Key agreement, e.g. Diffie-Hellman • Not like sending password in the clear • Mathematical proof based on conjecture • Variants of conjecture (important)
Security (strength) • Key size* • Commonly 2256 for AES, 22048 for RSA • What is a [good] key? • Underlying cryptosystem/primitives • Composition • e.g. MAC with broken underlying hash function may not itself be broken
Current state of symmetric encryption • DES is too weak (56-bit key) • 3DES is weak (168-bit keys but only 2112 security – “meet-in-the-middle” attack) • Recent weaknesses in AES: • AES-256 (2254.4) AES-192 (2189.7) AES-128 (2126.1) http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf
Current state of hash functions • MD5 is broken • http://www.win.tue.nl/hashclash/ • SHA-1 is known to be weak • http://theory.csail.mit.edu/~yiqun/shanote.pdf (269) • http://eprint.iacr.org/2004/304 (2106, generalizable) • SHA-256 (variant) is even weaker • SHA-3 currently in “development” (NIST) • We have a winner: all hail Keccak (SHA-3)! • http://csrc.nist.gov/groups/ST/hash/sha-3/
Questions? Trusted component discussion