La Cryptographie au cœur de l`informatique

Jean-Marc Darées IT Architect
[email protected]
La Cryptographie au cœur de l’informatique
Cryptography , what is it ?
2
ƒ
Secret message Sciences
Cryptography (Greek “cryptos" (hidden) + "graphia“ (writing))
ƒ
It is about :
Confidentiality
Integrity
Authentication
Non-Repudiation
Encryption begins
ƒ
Coming from military and diplomatic for “secret writing” activities
–
–
–
–
–
–
3
ABCDEFGHIJKLMNOPQRSTUVWXYZ
DEFGHIJKLMNOPQRSTUVWXYZABC
Replace the letter in top line by the one underneath (substitution)
Reverse the order of the letters in the message (transposition)
The above scheme is known as the Caesar Cipher
Reputed 1st used by Julius Caesar during the Gallic wars
Cryptography :a very old science
Vigenere (1585)
Schott (1665)
al-Kindi (850)
4
Secret key Public algorithm
5
Mechanization of the data treatment
6
The War speed up the Crypto Sciences
The WWII code battle won by the Alan Turing
Team against the ENIGMA
7
Cryptography began the computer story
1944 The Colossus
first electronic computer based
upon binary code
5000 instruction / second
8
Cryptographic System Components
In mathematics, computing, linguistics, and
related disciplines, an algorithm is a procedure
(a finite set of well-defined instructions) for
accomplishing some task which, given an initial
state, will terminate in a defined end-state.
Cryptographic Key
9
Mathematical
Algorithm
The algorithms are publicly known. A
cryptographic key is a piece of information
that controls the operation of a cryptography
algorithm. The keys are responsible for
keeping the algorithm execution secret.
Three Major Types of Encryption
ƒ Symmetric Keys
ƒ Asymmetric Keys
ƒ Hash
Systems May Use Both
10
Symmetric Key (DES 1975 )
ƒ One Key
ƒ Used for Both Encryption and Decryption
ƒ Requires Lower Computing Power
11
Asymmetric Key (ron Rivest, adi Shamir et len Adleman)
ƒ Uses Private and Public Key Pair
– Can’t be Derived from Each Other
– Data Encrypted with One Can Only Be Decrypted With the Other
12
Certificates
ƒ
Digital document that give evidence that a public key’s belongs to whom it may concern. It
contains at least the information listed below:
– Public Key
– Certificate owner’s Identity
– Expiration Date
– Signature from a third part
– An utilization
CN=JM Darees
540116
O=SNIA,C=FR
ƒ
13
Sample of use:
– Tax Declarations Online
– Secure Internet
– Internet Authentication Mechanisms
04/28/09
04/28/09
Hashing
ƒ
Hashing does not encrypt data, but provides transformation used to verify data integrity
– Hash algorithm digests data and represents its bits and bit patterns by fixedsize equivalent - a Hash Value
• Size of the value is fixed by the algorithm (SHA-1 is 20 bytes)
• Algorithm is non-reversible: cannot reproduce data from hash
• Single bit change in data may change half of the bits in hash
ƒ
Hash also used as “digital signature”
Pay US$ 100 to JM Darees =
5064c498576ec57e9e75fbb04ee8ccaa58c29c1a
Pay US$ 100 to JM Dares =
83a8e63994fba9d9c927dd6fcf7c92ddc3185063
14
SSL combines symmetric and Asymmetric
15
How do Digital Signatures Work?
All major digital signature signing techniques involve first hashing the
data then signing the hash.
Hash
Function
Alice
Alice’s
message
hash
Alice “signs” the hash ( encrypts the
hash with a private key)
hash
Bob decrypts the
signed hash with
Alice’s public key
hash
Bob
Alice’s
message
Bob hashes the text
to derive the hash
Bob can be sure that the message came from Alice!
16
If the hashes match:
f
Only Alice could
have signed
f The message didn’t
change in transit
Cryptographic Algorithms And Their Use
Symmetric
Asymmetric
Hash
SYM
ASYM
HASH
Digital
SESSION
Signature
ASYM
SYM (Session Key)
HASH
ASYM
HASH
Private
Public
Confidentiality
X
X
X
Integrity
X
X
Authentication
X
X
X
Non-Repudiation
X
X
X
DES
Key algorithms
T-DES
AES
MD5
RSA
DSA
MAC
MDC
SHA
17
Secure Key encryption : Master Key protection and HSM
Hardware Security
Module
Master Key
Applications Keys
encrypted with MK
Security
officers
Data to encrypt
Encrypted data
+ Master Key zeroization in case
of tampering attempt
FIPS 140-2 Certification
18
The Key Management Problem
19
Many Key Uses
ƒ
Private signature key
ƒ
Private key transport key
ƒ
Public signature verification key
ƒ
Public Key Transport Key
ƒ
Symmetric authentication key
ƒ
Symmetric Key Agreement Key
ƒ
Private authentication key
ƒ
Private Static Key Agreement Key
ƒ
Public authentication key
ƒ
Public Static Key Agreement Key
ƒ
Symmetric data encryption key
ƒ
Private Ephemeral Key Agreement Key
ƒ
Symmetric key wrapping key
ƒ
Public Ephemeral Key Agreement Key
ƒ
Symmetric and asymmetric random
number generation keys
ƒ
Symmetric Authorization Key
ƒ
Private Authorization Key
ƒ
Public Authorization Key
20
Key Management VS Time
ƒ
Key and Data Lifetime
ƒ Forever
ƒ Assure Access to Data Years from Now
ƒ For a Limited Time Period
ƒ Ephemeral – Milliseconds, Seconds
ƒ Weeks, Months, Years
ƒ
What Happens at End of Life?
ƒ Mandatory Re-Encryption
ƒ Destruction of Data
ƒ Destruction of Key
21
Key Management Process
ƒ
22
Policies
– Who Can Establish Keys?
– Who Can Delete Keys?
– What is the Lifetime of a Key?
– Can the Key be Archived?
– Are the Keys Changed Periodically?
– Are Keys Automatically Deleted or
Archived?
– Who Else Can Use the Key?
ƒ
Auditing
– Track the Key over it’s Lifetime
– Who Created the Key and When?
– Who Changed the Key and When?
– Who Created a Copy of the Key and
When?
– Where are the Copies of the Key
– Who Deleted the Key and When?
The encryption positioning a difficult choice
23
Encryption everywhere
Server
Applications
End user devices
Network
Storage
24
The eight steps method
25
1.
Understand Drivers
2.
Inventory Data Assets
3.
Classify Data Assets
4.
Perform Data Flow Analysis
5.
Choose Points-of-Encryption
6.
Design Encryption Solution
7.
Implement Solution
8.
Activate encryption
Conclusion : l’ubiquité de la cryptologie au
XXIème siècle
26
27