28
Encryption 3 Tom Chothia Computer Security: Lecture 4

4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

Encryption 3

Tom Chothia Computer Security: Lecture 4

Page 2: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

This Lecture

•  Some more history (not on the exam)

•  RSA

•  Signing

•  Pretty Good Privacy, PGP

Page 3: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

Some History Before cheap powerful

computers, unbreakable encryption was almost impossible.

Governments wanted to read

the codes of others. They could control the export of

these machines. When IBM designed DES they

could get it weakened.

•  Cipher machines looked like this:

Page 4: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

Some History During 1970-1990 all that

changed. Personal computers could

do anything a cipher machine could do.

University academics

worked on encryption with the aim of making it available to everyone.

Page 5: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

RSA

•  RSA is the most popular public key cipher. –  More efficient that Elgamal, and allows for signing.

•  It uses two large primes p & q. We set n = p.q and o(n) = (p-1)(q-1)

•  Pick random

–  e such that 1 ≤ e ≤ o(n) and e and o(n) are co-prime. –  d such that d.e mod o(n) = 1

The public key is (e,n) and the private key is (d,n)

Page 6: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

RSA

•  To encrypt a message, turn it into numbers “m” that are less than “n”

•  The encrypt as cipher text c do: c = me mod n

•  To decrypt a cipher text c as a message m do: m = cd mod n

Page 7: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

Elliptic curve crypto

•  Public key encryption based on elliptic curves.

•  Functionally very like RSA, but more efficient.

•  No full security proof, but recommended by NSA.

•  Becoming the most popular web public key encryption system.

Page 8: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

Using Public Key Crypto •  Public key crypto is much slower than symmetric key.

•  So instead of just using public key crypto, systems: –  make a new symmetric key –  encrypt that with the public key –  then encrypt the message with the symmetric key.

EKP(KS),{M}KS

Plain Text

AES-CBC RSA

New AES Key

Cipher Text

The Public RSA Key

Page 9: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

Some More History •  These ciphers make encryption pretty much unbreakable.

•  They made encryption available to everyone and the Internet, as we know it, possible

•  But Diffie, Rivset, etc. weren’t the first. At the British intelligent service GCHQ:"–  James Ellis invented the concept of public keys in the 1960’s"–  Malcolm J. Williamson invented DH in 1974"–  Clifford Cocks invented RSA in 1973"

•  But GCHQ distributed their keys via embassies, so never used it."

Page 10: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

Signatures •  Using RSA Epub(Dpriv(M)) = M •  This can be used to sign messages.

•  Sign a message with the private key and this can be verified with the public key.

•  Any real crypto suite will not use the same key for encryption and signing. –  as this can be used to trick people into decrypting.

Page 11: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

Signatures

Alice has a and a signing key Ks and wants to sign message M Signature: Dks(#(M)) Clear-signed: M,Dks(#(M))

RSA decrypt with key ks

Plain Text

SHA hash

Page 12: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

Pretty Good Privacy

•  In 1991 Phil Zimmermann implemented RSA in an e-mail friendly package.

•  He wanted encryption for everyone, especially activists.

•  RSA inc. started a licensing dispute.

•  The US government started a criminal investigation for arms trafficking!

Page 13: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

The Crypto Wars

•  Laws in the 1990s were unable to cope with strong encryption from short computer programs.

•  Strong crypto available for free on the new Internet panic governments.

•  Who was going to control crypto in the age of the Internet?

Encryption machines like this were classed

as “arms” If key > 40 bits

Page 14: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

The Crypto Wars •  1991: proposed law in the US to ban public key crypto

–  In reaction activists uploaded PGP on to Internet bulleting boards.

•  1993 arms trafficking case against Zimmermann started.

•  1993-1996 Investigation continues, –  people print RSA algorithm on t-shirts and go through U.S.

customs –  PGP code printed as a book (freedom of speech).

•  1996 Case against Zimmerman dropped –  But U.S. Attorney: "no change in law, no change in policy”

Page 15: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

Key Escrow •  Early 90’s government barging:

–  You can use Strong Crypto, but you have to give us the key.

•  Implemented in “Clipper Chip” –  Strong crypto –  Every message includes with a Law Enforcement Access

Field (LEAF) which contents the key –  LEAF encrypted with a key the government knows.

Page 16: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

SkipJack

•  The Clipper chip used the NSA designed cipher SkipJack: –  80 bit key, unlike DES’s 56 bit key.

•  As soon as it was declassification Biham and Shamir found a weakness.

•  Today it can be broken in 244+216 ops –  About the same as DES.

Page 17: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

Matt Blaze’s Analysis of Clipper Chip

•  Clipper chip must test the integrity of the LEAF and only accept connections if it is genuine.

•  Matt Blaze found that this was based on a 16 bit checksum in the LEAF. –  16 bits can be brute force, so LEAFs can be forged.

•  I.e you could use the clipper check without real key escrow

Page 18: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

First Set Paper:

Key Escrow from a Safe Distance Looking Back at the Clipper Chip

By Matt Blaze

27th Computer Security Applications Conference, ACSAC 2011. Find a link to it on the module website.

Page 19: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

The Crypto Wars •  1993-1996: Clipper chip considered in US congress

and rejected. –  Due partly to Matt Blaze’s analysis –  and strongly attack by John Kerry among others.

•  2000 US laws lifted: the Geeks ``won the crypto wars’’.

•  Freedoms won in the US then filtered through to the rest of the Internet, –  e.g. French laws until 2004: ECB mode only, max key length

40, must include known plain text.

Page 20: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

Crypto Wars: Round 2

•  We learnt in September that the NSA had been working to weaken (“back door”) crypto.

•  Some of the possible backdoors: – “Bad” elliptic curve parameters – Weak random number generators: e.g.

Dual_EC_DRBG

Page 21: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

Certificates

•  A public key certificate binds a public key to an identity.

•  As well as a public key it contains a name, e-mail address, etc.

•  It is signed, with the private key, and anyone else that trusts it.

Page 22: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

Distributing Public Keys

•  The whole system breaks down if you get the wrong key for someone. –  The best way to exchange keys is face to face. –  You can also check the fingerprint of the key.

•  If someone you trust has signed some else key you can may trust it too. –  Web of trust.

Page 23: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

Key Servers

•  Key servers store public key certificates –  E.g. http://pgp.mit.edu, http://keyserver.pgp.com

•  Many clients can automatically search a key server for unknown e-mail addresses. – But beware, there is no gautentee the key

is not a fake.

Page 24: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

https://xkcd.com/364/

Page 25: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

Recommended Key Lengths

•  See http://www.keylength.com/

Page 26: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

This Lecture

•  Some more history (not on the exam)

•  RSA

•  Signing

•  Pretty Good Privacy, PGP

Page 27: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

Further Reading

•  See links on the website.

•  Eike’s Cryptology module •  Coursera Cryptology module

– www.coursera.org/course/crypto •  Bruce Schneier: Applied Cryptography •  The Code Book, by Simon Singh.

Page 28: 4 Crypto3 Print · 2013-10-07 · Some History Before cheap powerful computers, unbreakable encryption was almost impossible. Governments wanted to read the codes of others. They

Next Lecture

•  Access Control Frameworks