CMSC 414 Computer (and Network) Security Lecture 8 - PowerPoint PPT Presentation

1 / 12
About This Presentation
Title:

CMSC 414 Computer (and Network) Security Lecture 8

Description:

Example: CBC MAC. CBC MAC is secure if the underlying block cipher is secure. CBC encryption does not authenticate data. Some final notes... Non-repudiation? ... – PowerPoint PPT presentation

Number of Views:18
Avg rating:3.0/5.0
Slides: 13
Provided by: jka9
Learn more at: http://www.cs.umd.edu
Category:

less

Transcript and Presenter's Notes

Title: CMSC 414 Computer (and Network) Security Lecture 8


1
CMSC 414Computer (and Network) SecurityLecture
8
  • Jonathan Katz

2
Administrative stuff
  • HW2 (will be) out
  • Due in 2 weeks
  • Two papers (will be) linked from syllabus
  • Discuss one of these next time

3
Integrity of messages
4
Integrity vs. secrecy
  • Integrity and secrecy are distinct concerns
  • Secrecy passive eavesdropper cannot get any
    information about the message
  • Integrity active attacker cannot change the
    message (without being detected)
  • Important
  • Authentication does not provide secrecy
  • Encryption does not provide integrity

5
Scenarios
  • Possibility of active attacks?
  • Malicious routers
  • Radio broadcast
  • Even the best message integrity scheme does not
    protect against replay attacks
  • Protect against this at the application level

6
Cryptographic integrity
  • Non-cryptographic checksums
  • Meant to defend against (random) errors
  • Not meant to defend against active attacks
  • Must use cryptographic techniques

7
Private-key case
  • Message authentication codes (MACs)
  • Attack model and definition of security
  • Example CBC MAC
  • CBC MAC is secure if the underlying block cipher
    is secure
  • CBC encryption does not authenticate data

8
Some final notes
  • Non-repudiation?
  • How to achieve encryption and integrity?
  • Secure channels
  • Trivial approaches do not work
  • Encrypt-then-mac
  • Must use distinct keys
  • Special-purpose modes

9
Public-key case
  • Digital signature schemes (signatures)
  • Attack model and definition of security
  • Should be obvious that public-key encryption
    provides no authentication at all

10
Important point
  • Signing and decrypting are not the same
  • In general, signing a message by decrypting
    it is a BAD idea
  • Having said that

11
RSA signatures I
  • Textbook RSA
  • Why textbook RSA is completely insecure! (Two
    attacks)

12
RSA signatures for real
  • Hash functions
  • Collision-resistance
  • Birthday attacks
  • Scrambling
  • How to fix RSA signatures
  • Why does this work?
  • Is it actually secure?
Write a Comment
User Comments (0)
About PowerShow.com