CS 537 Notes, Section #31: Security Improvements, Encryption


Security Improvements

Solutions: nothing works perfectly, but here are some possibilities:


Encryption

Key technology: encryption. Store and transmit information in an encoded form that does not make any sense.

The basic mechanism:


encryption Function

Decryption Function

All of this only works under three conditions:

Public key encryption: new mechanism for encryption where knowing the encryption key does not help you to find decryption key, or vice versa.

Safe mail:

It is a nice scheme because the user only has to remember one key, and all senders can use the same key. However, how does receiver know for sure who it is getting mail from?

Digital Signatures

Positive identification: can also use public keys to certify identity:

This is really even better than signatures: harder to forge, and can change if compromised. Note that this idea was developed by an undergraduate (Loren Kohnfelder) in 1978 as part of his undergraduate thesis (at MIT).

These two forms of encryption can be combined together. To identify sender in secure mail, encrypt first with your private key, then with receiver's public key. The encryption/decryption functions to send from B to A are:


Signature Formulas

Digital Signature

Encryption appears to be a great way to thwart listeners. It does not help with Trojan Horses, though.

Old dederal Data Encryption Standard (DES). Is not public-key based, but as implemented efficiently and appeared to be relatively safe.

More recently, there is the Advanced Encryption Standard (AES), called Ryndal (pronounced "rine doll"). ***more on AES here****

General problem: how do we know that an encryption mechanism is safe? It is extremely hard to prove. This is a hot topic for research: theorists are trying to find provably hard problems, and use them for proving safety of encryption.

Summary of Protection: very hard, but is increasingly important as things like electronic funds transfer become more and more prevalent.



Copyright © 2010, 2013 Barton P. Miller