cis0-cyptography-mini

advertisement
CIS0
Cryptography – “Scrambling Information”
Background
Summary: The objective of cryptography is to scramble a message
(also called plaintext) so that only the intended recipient is able to
recover the original plaintext. As illustrated in Figure 1, Bob (the
sender) wishes to send a secret message to Alice (the recipient). He
encrypts the plaintext using an encryption algorithm. The encryption
process scrambles the plaintext to produce what is known as
ciphertext. Alice recovers the plaintext using the process of
decryption. The encryption/decryption algorithm is usually not secret.
What makes the ciphertext difficult to decipher is the use of one or more keys
in the encryption/decryption process. In private key (or symmetric)
encryption, one key is used and is known only to Bob and Alice. In public
key (or asymmetric) encryption both Bob and Alice own a pair of unique
keys. The pair consists of a private key and a public key. The public key is
known by the public, but only Bob and Alice know their respective private
keys. Figure 1 shows public key encryption.
Figure 1
Description: The word cryptography is derived from the Greek words, krypto, meaning hidden,
and graphein, meaning to write. Thus, cryptography is the process of making and using codes
(or ciphertext) to secure transmission of information. The codes are obtained by converting
plaintext (words, or phrases) into encrypted data.
Risk: When private information is sent over a network (like the Internet) in plaintext, the
message can be intercepted and stolen. When you store unencrypted information on a hard
drive, or on removable media; others are able to read that information should they get access to
it through theft or other means. The consequences for these unfortunate mishaps could range
from identity theft to loss of money and other assets.
Example of Occurrence. The following excerpt is from the New York times, dated August 17, 2009:
The man who prosecutors said had masterminded some of the most brazen thefts of credit and debit
card numbers in history was charged on Monday with an even larger set of digital break-ins.
In an indictment, the Justice Department said that Albert Gonzalez, 28, of Miami and two unnamed
Russian conspirators made off with more than 130 million credit and debit card numbers from late 2006 to
early 2008.
Prosecutors called it the largest case of computer crime and identity theft ever prosecuted. According
to the government, the culprits infiltrated the computer networks of Heartland Payment Systems, a
payment processor in Princeton, N.J.; 7-Eleven Inc.; Hannaford Brothers, a regional supermarket chain;
and two unnamed national retailers.
An unspecified portion of the stolen credit and debit card numbers were then sold online, and some
were used to make unauthorized purchases and withdrawals from banks, according to the indictment,
which was filed in United States District Court in Newark…
Richard Wang, manager of SophosLabs, a security company, said the case provided more evidence
that retailers and banks needed to strengthen industry standards and encrypt credit card numbers when
they are transmitted between computers. Currently, major banks agree to encrypt such data only when it
is stored.http://www.nytimes.com/2009/08/18/technology/18card.html?_r=2&ref=business
1
CIS0
How to Protect Yourself with Cryptography
Figure 2: Encryption with Word
1. Encrypt your personal files: Encrypt important files on your
hard drive and removable media.
2. Encrypt wireless network data: To protect the data that
travels through your wireless network against eavesdropping,
you should encrypt it. The available encryption choices in
increasing order of security are: none (no data encryption is
performed), Wired Equivalent Privacy (WEP), Temporal Key
Integrity Protocol (TKIP) and Advanced Encryption Standard
(AES).
3. Encrypt sensitive email: If the software which you use to
send e-mail allows it, you should encrypt sensitive e-mail so
that only the recipient of the e-mail is able to read it.
4. Check that businesses encrypt your personal data: You
should ensure that companies and other organization with whom you do business encrypt
your personal data, such as credit card numbers and social security numbers, before they
are stored or transmitted over a network.
5. Use secure transaction over the Internet: Ensure that personal transaction over the
Internet are secure.
Example 1: You can encrypt a file in MS Word 2007 using the steps shown in the Figure 2.
Example 2: Encrypting with Encrypted File System (EFS) on Windows Vista
 How to use it: To encrypt a file using EFS, right click on the file or folder, select properties
and follow the direction in Figure 3.
 Encryption: EFS automatically creates a public key pair. (This is done only once. It is not
repeated for encryption of future files.) However, a unique key called the file encryption key
(FEK) is automatically generated every time the user needs to encrypt a file. After encrypting
a file, EFS uses the user’s public key to encrypt the FEK. It also encrypts the FEK using the
recovery agent’s public key.
 Decryption: When you log into your account and try to open an encrypted file, Windows
retrieves your private key, decrypts the FEK, and uses it to decrypt the contents of the file as
it is read from the hard disk.
 EFS is a feature of the NTFS file
system. Files encrypted with EFS
remain encrypted only while they
reside on the NTFS volume. Vista
Home Basic, Home Premium (and
Starter Edition) do not support it.
 Only the original owner and the
computer’s designated recovery
agent can access encrypted files.
Figure 3: Encryption with EFS
2
CIS0
Laboratory/Homework Assignment
Checklist: Complete the following checklist:
Vulnerability
Security checklist
Course
Unprotected Sensitive Data
Check:
Yes/No - describe
CIS0
N/A
1. Are your personal files encrypted?
2. Is your wireless data encrypted?
3. Are your sensitive e-mail messages
encrypted?
4. Do the companies and other organization
you do business with encrypt sensitive data
about you that they store on their systems
or communicate over networks?
5. Are the e-transactions you conduct over the
Internet secure?
If you answered no to any of the above questions, then your data is vulnerable to theft and
misuse.
Discussion:
1. What is the difference between private key encryption and public key encryption?
2. How many public/private key pairs does the EFS system automatically generate if a user
encrypts 10 files—one at a time? How many file encryption keys (FEKs) are generated in
this case? Explain.
3. Discuss how you would use public key encryption to encrypt a symmetric private key which
you used to encrypt a message to be sent to Alice. Describe how Alice would recover the
message? (Note: The encrypted symmetric key accompanies the message to Alice.)
4. Which key does EFS use to encrypt the FEK?
5. If a file encrypted with EFS is e-mailed to another user, does that file remain encrypted?
Explain?
6. If a file encrypted with EFS on your hard disk is copied to a removable drive, does it remain
encrypted?
Exercises:
Figure 4
1. Encrypt a document using Microsoft Word 2007.
2. Encrypt a file and a folder using EFS.
3
Download