SlideShare a Scribd company logo
12/8/2015
AppCrypto Team
What does it mean a system to be secure?
It boils down to the trust you place on the system!
Guru
Trust on the
system
How secure is
the system
You decide to safeguard your valuable assets like
hardly used gold jewelries in a bank instead of
keeping them in your house.
Guru
You are placing more
trust on the bank’s
ability to safeguard
your valuable asset
than your own house.
You learn this fact
by experience – you
friends valuable
assets kept at home
got robbed.
None of your friends
have had any bad
experience with the
bank safeguarding
their assets.
Secure systems are built to satisfy the following
security goals.
Guru
Integrity
Availability
Confidentiality
Authentication
Non-
repudiation
We will not discuss availability in this presentation
as cryptography is not generally used to assure
availability (i.e. the service is available whenever
you need it)Guru
Denial of Service (DoS) attacks disrupts the
available it of a service.
Can I trust the system not to show my sensitive
data to any unauthorized parties?
Guru
Can I trust the system not to modify my data by
any unauthorized parties?
Can I trust the system not to allow to impersonate
me to the system?
Can I trust the system to hold each individual
accountable of their actions?
Confidentiality
Integrity
Authentication
Non-repudiation
Confidentiality
Integrity
Authentication
Non-repudiation
Cryptography
Can’t read!
Can’t modify!
Can’t impersonate!
Can’t deny doing!
Trust sounds intuitive, but how do I
objectively measure trust?
What does it mean a system to be secure?
Guru
The measure of trust (how secure your system)
depends on who you are trying to protect
against. We call it the attack model.
An Attack model captures the capabilities,
collisions and intentions of adversaries.
An adversary is a bad
user who want to break
the security of your
system.
Guru
In order to demonstrate trust in the system
under the given attack model
We need to prove the security of the
cryptographic protocols under that attack
model.
A cryptographic protocol secure under one
attack model (e.g. attacker can see one message)
may not be secure under more stronger attack
model (e.g. attacker can see many messages).
Guru
Usually, most of us will be using time tested and
proven cryptographic primitives such as ciphers,
message authentication codes, digital signatures.
We will be constructing new protocols using
these primitives. However, we need to make
sure that our protocols are secure under the
chosen attack model.
A cryptographic protocol built using secure
cryptographic primitives may not necessarily
be secure if not built right.
Adversary
Capabilities
Intentions
In cryptography, we
assume that attackers
have limited
computational power.
In other words, they
are computationally
bounded.
There could be passive
attackers or active
attackers. Passive
attackers simply
listens to your
messages whereas
much more powerful
active attacks modify
your messages.
Collisions
Multiple adversaries
may collude together to
break a cryptographic
protocol.
Let’s look at the security goals that are
directly tied to cryptography mentioned
earlier.
Guru
Confidentiality
Can’t read!
Ciphertext (C)EncryptPlaintext (M)
Plaintext(M)DecryptCiphertext(C)
Use cipher.
The message to be
encrypted is called
“plaintext”
The encrypted
message is called
“ciphertext”
Ciphers
Symmetric ciphers
Asymmetric ciphers
Also called
“Symmetric Key
Cryptosystems”
Also called “Public
Key Cryptosystems”
Alice Bob
Alice and Bob share
the same key.
Alice Bob
Alice and Bob do not
share the same key.Public key & Private
key pair
Roughly speaking, a cipher is secure
if it is hard to obtain plaintext from
the ciphertext without knowing the
key used.Guru
In a cipher, only the key is secret;
everything else (encryption algorithm,
decryption algorithm) is public.
Alice Bob
Messages exchanged in a TLS protocol
are encrypted using a symmetric cipher.
Integrity
Can’t modify!
Cryptographic
Hashing Algorithm
Document
Key
Secure Hash
Alice Bob
Messages exchanged in a TLS protocol
are hashed using a keyed hash algorithm.
Send the hash along with the
document to the receiver.
Receiver can compute the hash
and compare to verify.
Message Hash
Use hashing.
Authentication
Can’t impersonate!
Use hashing, Public Key Ciphers (certificates).
Three ways to authenticate
Use what you have (e.g. key,
badge, certificates)
Use what you know (e.g.
passwords, PINs)
Use what you are (e.g.
fingerprints, iris)
Password authentication (Server: am I talking to Alice?)
Alice
Server (www.example.com)
Hash pwd Salt
Password
Certificate based authentication (Alice: Am I taking to example.com?)
Alice
Server (www.example.com)
Example.com
certificate
Example.com
certificate
Check if the certificate is
signed by a trusted root
authority.
Check if the new
hash matches the
stored one.
Transfer $1M to Bob
Non-repudiation
Can’t deny doing!
Use Public Key Ciphers (digital signatures).
Alice
Public key Private key
Transfer $1M to Bob
Digitally signed using Alice’s
private key
Alice cannot later deny that she
did not order bank to transfer as
it has her digital signature on it
(only she can produce that
signature)
Verify signature
using Alice’s public
key
The security of a system boils down to the trust.
Cryptography is a tool that we can use to build
trust in security services (confidentiality,
integrity, authentication and non-repudiation)
and in turn in systems build using these security
services.
If the foundation of your house
(cryptographic tools used) is not
strong, your house (software system)
will collapse!
Guru

More Related Content

PPTX
Cryptography
Dipti Sakpal
 
PPTX
Encryption
Adnan Malak
 
PPT
Cryptography
Milap Oza
 
PPTX
Cryptography by gaurav singh
Gaurav Singh
 
PDF
Workshop on Cryptography - Frequency Analysis (basic)
Andrea Tino
 
PPTX
Password policies
Ari Elias-Bachrach
 
PDF
Session6-Protecct Sensetive Data
zakieh alizadeh
 
PPTX
Cryptography
Jasim Jas
 
Cryptography
Dipti Sakpal
 
Encryption
Adnan Malak
 
Cryptography
Milap Oza
 
Cryptography by gaurav singh
Gaurav Singh
 
Workshop on Cryptography - Frequency Analysis (basic)
Andrea Tino
 
Password policies
Ari Elias-Bachrach
 
Session6-Protecct Sensetive Data
zakieh alizadeh
 
Cryptography
Jasim Jas
 

What's hot (11)

DOCX
Cyber public key cryptography
Gopika Babu
 
PPTX
Data encryption
Aman Jain
 
PDF
The ultimate privacy guide
JD Liners
 
PDF
Applied Cryptography
Marcelo Martins
 
PPT
Whatisdigitalsignature
Kishankant Yadav
 
PPTX
Honeywords
Pratiksha Kale
 
PPT
E-mail and Encryption
hey4ndr3w
 
PPTX
Introduction to python for cybersecurity pythonminna
TopeAbdulgafar
 
PPT
Information Cryptography Security
Achmad Solichin
 
PDF
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
Blockchain Council
 
PPTX
How Hashing Algorithms Work
CheapSSLsecurity
 
Cyber public key cryptography
Gopika Babu
 
Data encryption
Aman Jain
 
The ultimate privacy guide
JD Liners
 
Applied Cryptography
Marcelo Martins
 
Whatisdigitalsignature
Kishankant Yadav
 
Honeywords
Pratiksha Kale
 
E-mail and Encryption
hey4ndr3w
 
Introduction to python for cybersecurity pythonminna
TopeAbdulgafar
 
Information Cryptography Security
Achmad Solichin
 
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
Blockchain Council
 
How Hashing Algorithms Work
CheapSSLsecurity
 
Ad

Viewers also liked (10)

PDF
How software should get done
osmanehmad
 
PPT
Introduction to SmartCards - Michael Perlov
Filipe Mello
 
PDF
How to explain bitcoin to your mother
removed_5ef8f4100b1d7e8bfe3d2dc557fe10d0
 
PPTX
Study on Bitcoin
Dhanith Krishna
 
PPT
Secure payment systems
Abdulaziz Mohd
 
PPTX
Electronic Payment Systems (EPS)
Sahan Walpitagamage
 
PPTX
Electronic payment system
pankhadi
 
PPT
Electronic Payment System
Ritesh Goyal
 
PPTX
The electronic payment systems
Vishal Singh
 
KEY
Introduction to bitcoin
Wolf McNally
 
How software should get done
osmanehmad
 
Introduction to SmartCards - Michael Perlov
Filipe Mello
 
How to explain bitcoin to your mother
removed_5ef8f4100b1d7e8bfe3d2dc557fe10d0
 
Study on Bitcoin
Dhanith Krishna
 
Secure payment systems
Abdulaziz Mohd
 
Electronic Payment Systems (EPS)
Sahan Walpitagamage
 
Electronic payment system
pankhadi
 
Electronic Payment System
Ritesh Goyal
 
The electronic payment systems
Vishal Singh
 
Introduction to bitcoin
Wolf McNally
 
Ad

Similar to Cryptography And Secure Systems (20)

PPTX
Authentication and session v4
skimil
 
DOCX
In responding to your peers’ posts, assess your peers’ recommendatio.docx
mecklenburgstrelitzh
 
PPTX
Encryption by fastech
Abdulafeez Fasasi
 
PPTX
Cryptography and Network Security Principles.pptx
AbrahamThompson3
 
PDF
Getting authentication right
Andre N. Klingsheim
 
ODP
Identity On The Internet
Jon Spriggs
 
DOCX
Password Cracking
Hajer alriyami
 
PPT
ISDD Security Precautions
Forrester High School
 
PPTX
Improving Password Based Security
Rare Input
 
PDF
Password Strength Policy Query
Gloria Stoilova
 
PPTX
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
abduganiyevbekzod011
 
PPTX
Domain 9 of CEH Cryptography.pptx
Infosectrain3
 
PPTX
Overview of cryptography
Roshan Chaudhary
 
PDF
Public Vs. Private Keys
101 Blockchains
 
PDF
paper9.pdf
aminasouyah
 
PDF
sheet2.pdf
aminasouyah
 
PDF
doc2.pdf
aminasouyah
 
PDF
paper2.pdf
aminasouyah
 
PDF
lecture1.pdf
aminasouyah
 
Authentication and session v4
skimil
 
In responding to your peers’ posts, assess your peers’ recommendatio.docx
mecklenburgstrelitzh
 
Encryption by fastech
Abdulafeez Fasasi
 
Cryptography and Network Security Principles.pptx
AbrahamThompson3
 
Getting authentication right
Andre N. Klingsheim
 
Identity On The Internet
Jon Spriggs
 
Password Cracking
Hajer alriyami
 
ISDD Security Precautions
Forrester High School
 
Improving Password Based Security
Rare Input
 
Password Strength Policy Query
Gloria Stoilova
 
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
abduganiyevbekzod011
 
Domain 9 of CEH Cryptography.pptx
Infosectrain3
 
Overview of cryptography
Roshan Chaudhary
 
Public Vs. Private Keys
101 Blockchains
 
paper9.pdf
aminasouyah
 
sheet2.pdf
aminasouyah
 
doc2.pdf
aminasouyah
 
paper2.pdf
aminasouyah
 
lecture1.pdf
aminasouyah
 

Recently uploaded (20)

PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
Doc9.....................................
SofiaCollazos
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 

Cryptography And Secure Systems

  • 2. What does it mean a system to be secure?
  • 3. It boils down to the trust you place on the system! Guru Trust on the system How secure is the system
  • 4. You decide to safeguard your valuable assets like hardly used gold jewelries in a bank instead of keeping them in your house. Guru You are placing more trust on the bank’s ability to safeguard your valuable asset than your own house. You learn this fact by experience – you friends valuable assets kept at home got robbed. None of your friends have had any bad experience with the bank safeguarding their assets.
  • 5. Secure systems are built to satisfy the following security goals. Guru Integrity Availability Confidentiality Authentication Non- repudiation
  • 6. We will not discuss availability in this presentation as cryptography is not generally used to assure availability (i.e. the service is available whenever you need it)Guru Denial of Service (DoS) attacks disrupts the available it of a service.
  • 7. Can I trust the system not to show my sensitive data to any unauthorized parties? Guru Can I trust the system not to modify my data by any unauthorized parties? Can I trust the system not to allow to impersonate me to the system? Can I trust the system to hold each individual accountable of their actions? Confidentiality Integrity Authentication Non-repudiation
  • 9. Trust sounds intuitive, but how do I objectively measure trust?
  • 10. What does it mean a system to be secure?
  • 11. Guru The measure of trust (how secure your system) depends on who you are trying to protect against. We call it the attack model. An Attack model captures the capabilities, collisions and intentions of adversaries. An adversary is a bad user who want to break the security of your system.
  • 12. Guru In order to demonstrate trust in the system under the given attack model We need to prove the security of the cryptographic protocols under that attack model. A cryptographic protocol secure under one attack model (e.g. attacker can see one message) may not be secure under more stronger attack model (e.g. attacker can see many messages).
  • 13. Guru Usually, most of us will be using time tested and proven cryptographic primitives such as ciphers, message authentication codes, digital signatures. We will be constructing new protocols using these primitives. However, we need to make sure that our protocols are secure under the chosen attack model. A cryptographic protocol built using secure cryptographic primitives may not necessarily be secure if not built right.
  • 14. Adversary Capabilities Intentions In cryptography, we assume that attackers have limited computational power. In other words, they are computationally bounded. There could be passive attackers or active attackers. Passive attackers simply listens to your messages whereas much more powerful active attacks modify your messages. Collisions Multiple adversaries may collude together to break a cryptographic protocol.
  • 15. Let’s look at the security goals that are directly tied to cryptography mentioned earlier. Guru
  • 16. Confidentiality Can’t read! Ciphertext (C)EncryptPlaintext (M) Plaintext(M)DecryptCiphertext(C) Use cipher. The message to be encrypted is called “plaintext” The encrypted message is called “ciphertext”
  • 17. Ciphers Symmetric ciphers Asymmetric ciphers Also called “Symmetric Key Cryptosystems” Also called “Public Key Cryptosystems” Alice Bob Alice and Bob share the same key. Alice Bob Alice and Bob do not share the same key.Public key & Private key pair
  • 18. Roughly speaking, a cipher is secure if it is hard to obtain plaintext from the ciphertext without knowing the key used.Guru In a cipher, only the key is secret; everything else (encryption algorithm, decryption algorithm) is public. Alice Bob Messages exchanged in a TLS protocol are encrypted using a symmetric cipher.
  • 19. Integrity Can’t modify! Cryptographic Hashing Algorithm Document Key Secure Hash Alice Bob Messages exchanged in a TLS protocol are hashed using a keyed hash algorithm. Send the hash along with the document to the receiver. Receiver can compute the hash and compare to verify. Message Hash Use hashing.
  • 20. Authentication Can’t impersonate! Use hashing, Public Key Ciphers (certificates). Three ways to authenticate Use what you have (e.g. key, badge, certificates) Use what you know (e.g. passwords, PINs) Use what you are (e.g. fingerprints, iris)
  • 21. Password authentication (Server: am I talking to Alice?) Alice Server (www.example.com) Hash pwd Salt Password Certificate based authentication (Alice: Am I taking to example.com?) Alice Server (www.example.com) Example.com certificate Example.com certificate Check if the certificate is signed by a trusted root authority. Check if the new hash matches the stored one.
  • 22. Transfer $1M to Bob Non-repudiation Can’t deny doing! Use Public Key Ciphers (digital signatures). Alice Public key Private key Transfer $1M to Bob Digitally signed using Alice’s private key Alice cannot later deny that she did not order bank to transfer as it has her digital signature on it (only she can produce that signature) Verify signature using Alice’s public key
  • 23. The security of a system boils down to the trust. Cryptography is a tool that we can use to build trust in security services (confidentiality, integrity, authentication and non-repudiation) and in turn in systems build using these security services. If the foundation of your house (cryptographic tools used) is not strong, your house (software system) will collapse! Guru