You are on page 1of 10

uan 8oneh

lnLroducuon
Course Cvervlew
Cnllne CrypLography Course uan 8oneh
uan 8oneh
Welcome
Course ob[ecuves:
Learn how crypLo prlmluves work
Learn how Lo use Lhem correcLly and reason abouL securlLy
My recommendauons:
1ake noLes
ause vldeo frequenLly Lo Lhlnk abouL Lhe maLerlal
Answer Lhe ln-vldeo quesuons
uan 8oneh
CrypLography ls everywhere
!"#$%" #'(($)*#+,'):
web Lramc: P11S
wlreless Lramc: 802.11l WA2 (and WL), CSM, 8lueLooLh
-)#%./,)0 12"3 ') 4*35: LlS, 1rueCrypL
6')7")7 /%'7"#,') (e.g. uvu, 8lu-ray): CSS, AACS
83"% +$79"),#+,')
. and much much more
uan 8oneh
Secure communlcauon
no eavesdropplng
no Lamperlng
uan 8oneh
Secure SockeLs Layer / 1LS

1wo maln parLs
1. Pandshake roLocol: -37+:2*39 39+%"4 3"#%"7 5".
$3*)0 /$:2*#;5". #%./7'0%+/9. (2
nd
parL of course)
2. 8ecord Layer: <%+)3(*7 4+7+ $3*)0 39+%"4 3"#%"7 5".
Lnsure condenuallLy and lnLegrlLy (1
sL
parL of course)
uan 8oneh
roLecLed les on dlsk
ulsk
llle 1
llle 2
Allce Allce
no eavesdropplng
no Lamperlng
Analogous Lo secure communlcauon:
Allce Loday sends a message Lo Allce Lomorrow
uan 8oneh
8ulldlng block: sym. encrypuon
L, u: clpher k: secreL key (e.g. 128 blLs)
m, c: plalnLexL, clpherLexL
Lncrypuon algorlLhm ls publlcly known
never use a proprleLary clpher
Alice
E
m
E(k,m)=c
Bob
D
c
D(k,c)=m
k k
uan 8oneh
use Cases
!*)02" $3" 5".: (one ume key)
key ls only used Lo encrypL one message
- encrypLed emall: new key generaLed for every emall
=$2, $3" 5".: (many ume key)
key used Lo encrypL muluple messages
- encrypLed les: same key used Lo encrypL many les
need more machlnery Lhan for one-ume key
uan 8oneh
1hlngs Lo remember
CrypLography ls:
A Lremendous Lool
1he basls for many securlLy mechanlsms
CrypLography ls noL:
1he soluuon Lo all securlLy problems
8ellable unless lmplemenLed and used properly
SomeLhlng you should Lry Lo lnvenL yourself
- many many examples of broken ad-hoc deslgns
uan 8oneh
Lnd of SegmenL

You might also like