SlideShare una empresa de Scribd logo
1 de 43
Descargar para leer sin conexión
Public key cryptography: a practical
                  approach

                             Israel Herraiz
                           <isra@herraiz.org>
                        <israel.herraiz@upm.es>

                            KeyID FE0A7AF3

                               Fingerprint
           D0DA E915 BFDD E5CD 8BA0     B159 7E97 2ACB FE0A 7AF3

                          Slides and additional info at
                     http://mat.caminos.upm.es/~iht/pkc/


                                                                   1

http://herraiz.org
Privacy in electronic communicatios



                        Can we ensure
                     privacy in electronic
                      communications?




                                             2

http://herraiz.org
Reaching Google
              1      10.8.0.1 (10.8.0.1)
              2      192.168.1.1 (192.168.1.1)
              3      62.81.125.179.static.user.ono.com (62.81.125.179)
              4      10.115.49.217 (10.115.49.217)
              5      10.127.151.49 (10.127.151.49)
              6      10.127.10.137 (10.127.10.137)
              7      10.127.10.133 (10.127.10.133)
              8      10.127.3.82 (10.127.3.82)
              9      213.242.71.21 (213.242.71.21)
             10      ae-5-5.ebr1.Paris1.Level3.net (4.69.141.42)
             11      ae-45-45.ebr1.London1.Level3.net (4.69.143.101)
             12      ae-1-51.edge3.London1.Level3.net (4.69.139.73)
             13      unknown.Level3.net (212.113.15.186)
             14      209.85.255.78 (209.85.255.78)
             15      66.249.95.173 (66.249.95.173)
             16      216.239.49.45 (216.239.49.45)
             17      * * *
             18      ww-in-f147.1e100.net (209.85.229.147)


                                                                         3

http://herraiz.org
Reaching Google
              1      10.8.0.1 (10.8.0.1)
              2      192.168.1.1 (192.168.1.1) Getafe
              3      62.81.125.179.static.user.ono.com (62.81.125.179)
              4      10.115.49.217 (10.115.49.217)
              5      10.127.151.49 (10.127.151.49)     Barcelona
              6      10.127.10.137 (10.127.10.137)
              7      10.127.10.133 (10.127.10.133)
              8      10.127.3.82 (10.127.3.82)
              9      213.242.71.21 (213.242.71.21)   Minneapolis
             10      ae-5-5.ebr1.Paris1.Level3.net (4.69.141.42)   Paris
             11      ae-45-45.ebr1.London1.Level3.net (4.69.143.101)
             12      ae-1-51.edge3.London1.Level3.net (4.69.139.73)
                                                                   London
             13      unknown.Level3.net (212.113.15.186)
             14      209.85.255.78 (209.85.255.78) Atlanta
             15      66.249.95.173 (66.249.95.173) New York
             16      216.239.49.45 (216.239.49.45) Los Angeles
             17      * * *
             18      ww-in-f147.1e100.net (209.85.229.147) Atlanta


                                                                            4

http://herraiz.org
Hops while attempting to reach
                     Google




                                           5

http://herraiz.org
Is it that bad?



                     What kind of private
                     Information can be
                          captured?




                                            6

http://herraiz.org
Non-cyphered information
    ●   Geolocalization
        ●   Using your IP address
    ●   Web browser and operating system
    ●   Any info written in a form
        ●   Including passwords
    ●   Cookies
        ●   Have a look and take care
             –   http://www.youtube.com/watch?v=yyLdxO6xvh8
             –   http://www.youtube.com/watch?v=1FgKL2ywrX0
                                                              7

http://herraiz.org
Is it important?
                                                      ●   Strong PK crypto illegal
                                                          in France up to 2004
                                                      ●   PK implementations in
                                                          software considered
                                                          weapons in the US
                                                      ●   Software export
                                                          restrictions in EU and US
                                                       http://en.wikipedia.org/wiki/Cryptography_law
                                                       http://en.wikipedia.org/wiki/Key_disclosure_law



    http://en.wikipedia.org/wiki/Phil_Zimmermann

        http://en.wikipedia.org/wiki/Export_of_cryptography_in_the_United_States#History             8

http://herraiz.org
Solution

                     Enforce cyphering
                      using public key
                       cryptography


                                         9

http://herraiz.org
Cryptography
    ●   Traditionally, cyphering was done using a
        password and an algorithm
    ●   Symmetric approach
        ●   Password shared by both peers
    ●   Public key cryptography
        ●   Insecure channel
        ●   Private and secure communication without any
            previous physical contact


                                                           10

http://herraiz.org
Public key cryptography (PKP)




        Pub      Pri            Pub   Pri




                                            11

http://herraiz.org
Public key cryptography




        Pub      Pri                         Pub   Pri



                           Keyserver


                                 Pub   Pub
                                                         12

http://herraiz.org
Criptografía de clave pública


                       Hi there!




        Pub      Pri                             Pub   Pri



                               Keyserver


                                     Pub   Pub
                                                             13

http://herraiz.org
Public key cryptography

                       Pub

                       0F231A5




        Pub      Pri                           Pub   Pri



                             Keyserver


                                   Pub   Pub
                                                           14

http://herraiz.org
Public key cryptography

                                         Pub

                                         0F231A5




        Pub      Pri                           Pub   Pri



                           Keyserver


                                 Pub   Pub
                                                           15

http://herraiz.org
Public key cryptography


                                         Hi there!




        Pub      Pri                             Pub   Pri



                           Keyserver


                                 Pub   Pub
                                                             16

http://herraiz.org
How does it work?
    ●   PKP Algorithms
        ●   Prime number factorization
    ●   From a mathematical point of view, all
        messages can be decrypted
    ●   From a computational point of view, decrypting
        a message without the private key takes too
        long
             –   Key length is a crucial property


                                                     17

http://herraiz.org
Public key sample
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2.0.19 (GNU/Linux)

JeP5F/eRS9G8EE1fObRRW6mRf+bGSeluFEMiOi3UB/5P0GBx8iM0QIjezR0R+2n8
bMjuJmWHTjvEeplnx9iual4J4BT/9FznFs7o4tFVVfYBacFrhWjQyAf2xoP3gyn3
5OlV55VHVB+oidXUVNSNHZbXwrd1sH42x7x8o17PDFJrWjiq4kAb2EfSOIuSS6na
K9Y06bqh3yRbVtRdZOuCLcY8QJwt/mx//uQqG6NuSvYhx1QyC6g==XuDESOIuSSa
mQINBEtUTeQBEACejdGQhscmsDXM7xG2/ZYFpMQg/GmPlJ85uJJUkLr2T+5Rw8Xv
VfZjNZkMwsq94BGFrBxu477tKhQ5wiUBBz/jJ01a39Wrazgp21fvEon2T0Vay45t
2BYbU4AF815UL6o74YlW5SLdAofwylZS8pX4CKjGAB0T+fDiwkAepQl45nzX0ulv

-----END PGP PUBLIC KEY BLOCK-----




                                                            18

http://herraiz.org
Private key sample
-----BEGIN PGP PRIVATE KEY BLOCK-----
Version: GnuPG v2.0.19 (GNU/Linux)

mQINBEtUTeQBEACejdGQhscmsDXM7xG2/ZYFpMQg/GmPlJ85uJJUkLr2T+5Rw8Xv
JeP5F/eRS9G8EE1fObRRW6mRf+bGSeluFEMiOi3UB/5P0GBx8iM0QIjezR0R+2n8
VfZjNZkMwsq94BGFrBxu477tKhQ5wiUBBz/jJ01a39Wrazgp21fvEon2T0Vay45t
2BYbU4AF815UL6o74YlW5SLdAofwylZS8pX4CKjGAB0T+fDiwkAepQl45nzX0ulv
bMjuJmWHTjvEeplnx9iual4J4BT/9FznFs7o4tFVVfYBacFrhWjQyAf2xoP3gyn3
5OlV55VHVB+oidXUVNSNHZbXwrd1sH42x7x8o17PDFJrWjiq4kAb2EfSOIuSS6na
K9Y06bqh3yRbVtRdZOuCLcY8QJwt/mx//uQqG6NuSvYhx1QyC6g==XuDESOIuSSa

-----END PGP PRIVATE KEY BLOCK-----




                                                            19

http://herraiz.org
Keyservers
    ●   Internet hosts that contain public keys
    ●   Federated services
        ●   All servers contain all the public keys in the world
    ●   Public keyserver in Spain thanks to RedIRIS
        ●   URL: pgp.rediris.es




                                                                   20

http://herraiz.org
Message signing


                       Hi there!




        Pub      Pri                             Pub   Pri



                               Keyserver


                                     Pub   Pub
                                                             21

http://herraiz.org
Message signing
                                       Created with the
                                         private key

                       Hi there!




        Pub      Pri                                      Pub   Pri



                               Keyserver


                                     Pub    Pub
                                                                      22

http://herraiz.org
Message signing


                                           Hi there!




        Pub      Pri                              Pub   Pri



                         Keyserver


                               Pub   Pub
                                                              23

http://herraiz.org
Signing and encrypting


                       Hi there!




        Pub      Pri                             Pub   Pri



                               Keyserver


                                     Pub   Pub
                                                             24

http://herraiz.org
Signing and encrypting

                       Pub

                       FAD43A




        Pub      Pri                              Pub   Pri



                                Keyserver


                                      Pub   Pub
                                                              25

http://herraiz.org
Signing and encrypting

                                        Pub

                                            FAD43A




        Pub      Pri                                 Pub   Pri



                          Keyserver


                                Pub   Pub
                                                                 26

http://herraiz.org
Signing and encrypting


                                        Hi there!




        Pub      Pri                            Pub   Pri



                          Keyserver


                                Pub   Pub
                                                            27

http://herraiz.org
Signing and encrypting


                                        Hi there!




        Pub      Pri                            Pub   Pri



                          Keyserver


                                Pub   Pub
                                                            28

http://herraiz.org
Identity certification

               How do you know that
             public keys belong to their
                legitimate owners?


                     Public key   Can we ensure that the
                 Barack Obama       key does belong to
                                      Barack Obama?


                                                           29

http://herraiz.org
Identity certification


               Certificate Authorities



                        Trust chain


                                              30

http://herraiz.org
Public key signing
    ●   Public keys are plain text documents that can
        be cryptographically signed
    ●   Mutual public signing adds identity certification
        to PKP schemes




                                                            31

http://herraiz.org
Public key signing
      Barack Obama




        Pub      Pri                        Pub   Pri



                          Keyserver


                                Pub   Pub
                                                        32

http://herraiz.org
Public key signing
      Barack Obama
                       Key FE0A7AF2
                       Name Barack Obama
                       Fingerprint
                         D0DA E915 BFDD E5CD 8BA0
                         B159 7E97 2ACB FE0A 7AF2




        Pub      Pri                                      Pub   Pri



                                Keyserver


                                          Pub       Pub
                                                                      33

http://herraiz.org
Public key signing
      Barack Obama
                               Key FE0A7AF2
                               Name Barack Obama
                               Fingerprint
                                 D0DA E915 BFDD E5CD 8BA0
                                 B159 7E97 2ACB FE0A 7AF2




        Pub      Pri                                    Pub   Pri



                          Keyserver


                                Pub      Pub
                                                                    34

http://herraiz.org
Public key signing
                                                                Show me
                                                              your passport
      Barack Obama
                               Key FE0A7AF2
                               Name Barack Obama
                               Fingerprint
                                 D0DA E915 BFDD E5CD 8BA0
                                 B159 7E97 2ACB FE0A 7AF2




        Pub      Pri                                    Pub     Pri



                          Keyserver


                                Pub      Pub
                                                                          35

http://herraiz.org
Public key signing
                                                                        Show me
                                                                      your passport
      Barack Obama
                                       Key FE0A7AF2
                                       Name Barack Obama
                                       Fingerprint
                       Passport          D0DA E915 BFDD E5CD 8BA0
                       Barack            B159 7E97 2ACB FE0A 7AF2
                       Obama



        Pub      Pri                                            Pub     Pri



                                  Keyserver


                                        Pub      Pub
                                                                                  36

http://herraiz.org
Public key signing

               Pub
                                     Key FE0A7AF2
          Barack Obama               Name Barack Obama
    D0DA E915 BFDD E5CD 8BA0         Fingerprint
    B159 7E97 2ACB FE0A 7AF2           D0DA E915 BFDD E5CD 8BA0
                                       B159 7E97 2ACB FE0A 7AF2




                               Download key FE0A7AF2          Pub   Pri



                                Keyserver


                                       Pub     Pub
                                                                          37

http://herraiz.org
Public key signing

               Pub
                                    Key FE0A7AF2
          Barack Obama              Name Barack Obama
    D0DA E915 BFDD E5CD 8BA0        Fingerprint
    B159 7E97 2ACB FE0A 7AF2          D0DA E915 BFDD E5CD 8BA0
                                      B159 7E97 2ACB FE0A 7AF2




                                                             Pub   Pri



                               Keyserver


                                     Pub      Pub
                                                                         38

http://herraiz.org
Public key signing

               Pub
                                    Key FE0A7AF2
          Barack Obama              Name Barack Obama
    D0DA E915 BFDD E5CD 8BA0        Fingerprint
    B159 7E97 2ACB FE0A 7AF2          D0DA E915 BFDD E5CD 8BA0
                                      B159 7E97 2ACB FE0A 7AF2




                                                             Pub   Pri



                               Keyserver


                                     Pub      Pub
                                                                         39

http://herraiz.org
Public key signing
      Barack Obama




                         Key signing is
                         often mutual
        Pub      Pri                        Pub   Pri



                          Keyserver


                                Pub   Pub
                                                        40

http://herraiz.org
Public key signing

                                    Barack Obama
                     Trust chain
      Pub



      Pub

                                                   Is he Barack
      Pub                                             Obama?




                                                                  41

http://herraiz.org
Signing party




                                     42

http://herraiz.org
Take away

                PK Cryptog.
                                  Each user creates
              Secure comms.
                                   a public-private
                  through
                                      key pair
              insec. channels



                                    Trust chain
                Keyservers
                                    Identity cert.
               contain every
                                       through
              key in the world
                                  public key signing

                                                       43

http://herraiz.org

Más contenido relacionado

La actualidad más candente

La actualidad más candente (6)

Soi Cầu XSMB - Soi Cầu MB - Dự Đoán Xổ Số Miền Bắc Hôm Nay
Soi Cầu XSMB - Soi Cầu MB - Dự Đoán Xổ Số Miền Bắc Hôm NaySoi Cầu XSMB - Soi Cầu MB - Dự Đoán Xổ Số Miền Bắc Hôm Nay
Soi Cầu XSMB - Soi Cầu MB - Dự Đoán Xổ Số Miền Bắc Hôm Nay
 
Bitcoin Investment Forum USA
Bitcoin Investment Forum USABitcoin Investment Forum USA
Bitcoin Investment Forum USA
 
Vundle: Managing Vim Plugins With Sanity
Vundle: Managing Vim Plugins With SanityVundle: Managing Vim Plugins With Sanity
Vundle: Managing Vim Plugins With Sanity
 
Bitcoin Community Forums USA
Bitcoin Community Forums USABitcoin Community Forums USA
Bitcoin Community Forums USA
 
Tracker
TrackerTracker
Tracker
 
Bitcoin Mining Forum Australia
Bitcoin Mining Forum AustraliaBitcoin Mining Forum Australia
Bitcoin Mining Forum Australia
 

Destacado

Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
anusachu .
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
raf_slide
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
Amit Debnath
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil Kaware
Prof. Swapnil V. Kaware
 
Alice & bob public key cryptography 101
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101
Joshua Thijssen
 

Destacado (20)

Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 
Cryptography
CryptographyCryptography
Cryptography
 
6.hash mac
6.hash mac6.hash mac
6.hash mac
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography
 
IDRBT Project: Application Development in Java for public key cryptography
IDRBT Project: Application Development in Java for public key cryptographyIDRBT Project: Application Development in Java for public key cryptography
IDRBT Project: Application Development in Java for public key cryptography
 
Kerberos using public key cryptography
Kerberos using public key cryptographyKerberos using public key cryptography
Kerberos using public key cryptography
 
Cryptography - key sharing - RSA
Cryptography - key sharing - RSACryptography - key sharing - RSA
Cryptography - key sharing - RSA
 
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption StandardComputer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
 
Ch09
Ch09Ch09
Ch09
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil Kaware
 
public-key cryptography Shamir
public-key cryptography Shamirpublic-key cryptography Shamir
public-key cryptography Shamir
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Alice & bob public key cryptography 101
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101
 

Similar a Public Key Cryptography

MNSEC 2018 - Observations from the APNIC Community Honeynet Project
MNSEC 2018 -  Observations from the APNIC Community Honeynet Project MNSEC 2018 -  Observations from the APNIC Community Honeynet Project
MNSEC 2018 - Observations from the APNIC Community Honeynet Project
MNCERT
 
Security of Go Modules and Vulnerability Scanning in GoCenter and VSCode
Security of Go Modules and Vulnerability Scanning in GoCenter and VSCodeSecurity of Go Modules and Vulnerability Scanning in GoCenter and VSCode
Security of Go Modules and Vulnerability Scanning in GoCenter and VSCode
Deep Datta
 
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
Zoltan Balazs
 

Similar a Public Key Cryptography (20)

OSINT tools for security auditing with python
OSINT tools for security auditing with pythonOSINT tools for security auditing with python
OSINT tools for security auditing with python
 
MNSEC Conference 2023: Mining Bots
MNSEC Conference 2023: Mining BotsMNSEC Conference 2023: Mining Bots
MNSEC Conference 2023: Mining Bots
 
MNSEC 2018 - Observations from the APNIC Community Honeynet Project
MNSEC 2018 -  Observations from the APNIC Community Honeynet Project MNSEC 2018 -  Observations from the APNIC Community Honeynet Project
MNSEC 2018 - Observations from the APNIC Community Honeynet Project
 
Observations from the APNIC Community Honeynet Project, presentation by Adli ...
Observations from the APNIC Community Honeynet Project, presentation by Adli ...Observations from the APNIC Community Honeynet Project, presentation by Adli ...
Observations from the APNIC Community Honeynet Project, presentation by Adli ...
 
Open Operating Systems and Mozilla´s vision on the future - Movistar Move - 2...
Open Operating Systems and Mozilla´s vision on the future - Movistar Move - 2...Open Operating Systems and Mozilla´s vision on the future - Movistar Move - 2...
Open Operating Systems and Mozilla´s vision on the future - Movistar Move - 2...
 
GOTO Paris | @see Gopher
GOTO Paris | @see GopherGOTO Paris | @see Gopher
GOTO Paris | @see Gopher
 
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptx
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptxDemystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptx
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptx
 
Preso fcul
Preso fculPreso fcul
Preso fcul
 
When a robot is smart enough?
When a robot is smart enough?When a robot is smart enough?
When a robot is smart enough?
 
38th TWNIC OPM: Observations and mitigation of Mozi botnet
38th TWNIC OPM: Observations and mitigation of Mozi botnet 38th TWNIC OPM: Observations and mitigation of Mozi botnet
38th TWNIC OPM: Observations and mitigation of Mozi botnet
 
Manual de autodefensa digital (INGLÉS)
Manual de autodefensa digital (INGLÉS)Manual de autodefensa digital (INGLÉS)
Manual de autodefensa digital (INGLÉS)
 
Webrtc 동향과 이슈 2016.08
Webrtc 동향과 이슈 2016.08Webrtc 동향과 이슈 2016.08
Webrtc 동향과 이슈 2016.08
 
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet dataPacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
 
Encode polkadot club
Encode polkadot club  Encode polkadot club
Encode polkadot club
 
Security of Go Modules and Vulnerability Scanning in GoCenter and VSCode
Security of Go Modules and Vulnerability Scanning in GoCenter and VSCodeSecurity of Go Modules and Vulnerability Scanning in GoCenter and VSCode
Security of Go Modules and Vulnerability Scanning in GoCenter and VSCode
 
Security of go modules and vulnerability scanning in go center (1)
Security of go modules and vulnerability scanning in go center (1)Security of go modules and vulnerability scanning in go center (1)
Security of go modules and vulnerability scanning in go center (1)
 
Wi-Fi Hotspot Attacks
Wi-Fi Hotspot AttacksWi-Fi Hotspot Attacks
Wi-Fi Hotspot Attacks
 
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
 
儲かるドキュメント
儲かるドキュメント儲かるドキュメント
儲かるドキュメント
 
WebRTC: A front-end perspective
WebRTC: A front-end perspectiveWebRTC: A front-end perspective
WebRTC: A front-end perspective
 

Más de Israel Herraiz

Más de Israel Herraiz (8)

intensive metrics software evolution
intensive metrics software evolutionintensive metrics software evolution
intensive metrics software evolution
 
Statistical Distribution of Metrics
Statistical Distribution of MetricsStatistical Distribution of Metrics
Statistical Distribution of Metrics
 
¿MATLAB? Yo uso Octave UPM
¿MATLAB? Yo uso Octave UPM¿MATLAB? Yo uso Octave UPM
¿MATLAB? Yo uso Octave UPM
 
The Ultimate Debian Database
The Ultimate Debian DatabaseThe Ultimate Debian Database
The Ultimate Debian Database
 
Evaluating the presence and impact of bias in bug-fix datasets
Evaluating the presence and impact of bias in bug-fix datasetsEvaluating the presence and impact of bias in bug-fix datasets
Evaluating the presence and impact of bias in bug-fix datasets
 
Software size distribution - Why we always underestimate software cost
Software size distribution - Why we always underestimate software costSoftware size distribution - Why we always underestimate software cost
Software size distribution - Why we always underestimate software cost
 
The dynamics of software evolution - EVOLUMONS 2011
The dynamics of software evolution - EVOLUMONS 2011The dynamics of software evolution - EVOLUMONS 2011
The dynamics of software evolution - EVOLUMONS 2011
 
Mining Software Repositories
Mining Software RepositoriesMining Software Repositories
Mining Software Repositories
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Último (20)

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

Public Key Cryptography

  • 1. Public key cryptography: a practical approach Israel Herraiz <isra@herraiz.org> <israel.herraiz@upm.es> KeyID FE0A7AF3 Fingerprint D0DA E915 BFDD E5CD 8BA0 B159 7E97 2ACB FE0A 7AF3 Slides and additional info at http://mat.caminos.upm.es/~iht/pkc/ 1 http://herraiz.org
  • 2. Privacy in electronic communicatios Can we ensure privacy in electronic communications? 2 http://herraiz.org
  • 3. Reaching Google 1 10.8.0.1 (10.8.0.1) 2 192.168.1.1 (192.168.1.1) 3 62.81.125.179.static.user.ono.com (62.81.125.179) 4 10.115.49.217 (10.115.49.217) 5 10.127.151.49 (10.127.151.49) 6 10.127.10.137 (10.127.10.137) 7 10.127.10.133 (10.127.10.133) 8 10.127.3.82 (10.127.3.82) 9 213.242.71.21 (213.242.71.21) 10 ae-5-5.ebr1.Paris1.Level3.net (4.69.141.42) 11 ae-45-45.ebr1.London1.Level3.net (4.69.143.101) 12 ae-1-51.edge3.London1.Level3.net (4.69.139.73) 13 unknown.Level3.net (212.113.15.186) 14 209.85.255.78 (209.85.255.78) 15 66.249.95.173 (66.249.95.173) 16 216.239.49.45 (216.239.49.45) 17 * * * 18 ww-in-f147.1e100.net (209.85.229.147) 3 http://herraiz.org
  • 4. Reaching Google 1 10.8.0.1 (10.8.0.1) 2 192.168.1.1 (192.168.1.1) Getafe 3 62.81.125.179.static.user.ono.com (62.81.125.179) 4 10.115.49.217 (10.115.49.217) 5 10.127.151.49 (10.127.151.49) Barcelona 6 10.127.10.137 (10.127.10.137) 7 10.127.10.133 (10.127.10.133) 8 10.127.3.82 (10.127.3.82) 9 213.242.71.21 (213.242.71.21) Minneapolis 10 ae-5-5.ebr1.Paris1.Level3.net (4.69.141.42) Paris 11 ae-45-45.ebr1.London1.Level3.net (4.69.143.101) 12 ae-1-51.edge3.London1.Level3.net (4.69.139.73) London 13 unknown.Level3.net (212.113.15.186) 14 209.85.255.78 (209.85.255.78) Atlanta 15 66.249.95.173 (66.249.95.173) New York 16 216.239.49.45 (216.239.49.45) Los Angeles 17 * * * 18 ww-in-f147.1e100.net (209.85.229.147) Atlanta 4 http://herraiz.org
  • 5. Hops while attempting to reach Google 5 http://herraiz.org
  • 6. Is it that bad? What kind of private Information can be captured? 6 http://herraiz.org
  • 7. Non-cyphered information ● Geolocalization ● Using your IP address ● Web browser and operating system ● Any info written in a form ● Including passwords ● Cookies ● Have a look and take care – http://www.youtube.com/watch?v=yyLdxO6xvh8 – http://www.youtube.com/watch?v=1FgKL2ywrX0 7 http://herraiz.org
  • 8. Is it important? ● Strong PK crypto illegal in France up to 2004 ● PK implementations in software considered weapons in the US ● Software export restrictions in EU and US http://en.wikipedia.org/wiki/Cryptography_law http://en.wikipedia.org/wiki/Key_disclosure_law http://en.wikipedia.org/wiki/Phil_Zimmermann http://en.wikipedia.org/wiki/Export_of_cryptography_in_the_United_States#History 8 http://herraiz.org
  • 9. Solution Enforce cyphering using public key cryptography 9 http://herraiz.org
  • 10. Cryptography ● Traditionally, cyphering was done using a password and an algorithm ● Symmetric approach ● Password shared by both peers ● Public key cryptography ● Insecure channel ● Private and secure communication without any previous physical contact 10 http://herraiz.org
  • 11. Public key cryptography (PKP) Pub Pri Pub Pri 11 http://herraiz.org
  • 12. Public key cryptography Pub Pri Pub Pri Keyserver Pub Pub 12 http://herraiz.org
  • 13. Criptografía de clave pública Hi there! Pub Pri Pub Pri Keyserver Pub Pub 13 http://herraiz.org
  • 14. Public key cryptography Pub 0F231A5 Pub Pri Pub Pri Keyserver Pub Pub 14 http://herraiz.org
  • 15. Public key cryptography Pub 0F231A5 Pub Pri Pub Pri Keyserver Pub Pub 15 http://herraiz.org
  • 16. Public key cryptography Hi there! Pub Pri Pub Pri Keyserver Pub Pub 16 http://herraiz.org
  • 17. How does it work? ● PKP Algorithms ● Prime number factorization ● From a mathematical point of view, all messages can be decrypted ● From a computational point of view, decrypting a message without the private key takes too long – Key length is a crucial property 17 http://herraiz.org
  • 18. Public key sample -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v2.0.19 (GNU/Linux) JeP5F/eRS9G8EE1fObRRW6mRf+bGSeluFEMiOi3UB/5P0GBx8iM0QIjezR0R+2n8 bMjuJmWHTjvEeplnx9iual4J4BT/9FznFs7o4tFVVfYBacFrhWjQyAf2xoP3gyn3 5OlV55VHVB+oidXUVNSNHZbXwrd1sH42x7x8o17PDFJrWjiq4kAb2EfSOIuSS6na K9Y06bqh3yRbVtRdZOuCLcY8QJwt/mx//uQqG6NuSvYhx1QyC6g==XuDESOIuSSa mQINBEtUTeQBEACejdGQhscmsDXM7xG2/ZYFpMQg/GmPlJ85uJJUkLr2T+5Rw8Xv VfZjNZkMwsq94BGFrBxu477tKhQ5wiUBBz/jJ01a39Wrazgp21fvEon2T0Vay45t 2BYbU4AF815UL6o74YlW5SLdAofwylZS8pX4CKjGAB0T+fDiwkAepQl45nzX0ulv -----END PGP PUBLIC KEY BLOCK----- 18 http://herraiz.org
  • 19. Private key sample -----BEGIN PGP PRIVATE KEY BLOCK----- Version: GnuPG v2.0.19 (GNU/Linux) mQINBEtUTeQBEACejdGQhscmsDXM7xG2/ZYFpMQg/GmPlJ85uJJUkLr2T+5Rw8Xv JeP5F/eRS9G8EE1fObRRW6mRf+bGSeluFEMiOi3UB/5P0GBx8iM0QIjezR0R+2n8 VfZjNZkMwsq94BGFrBxu477tKhQ5wiUBBz/jJ01a39Wrazgp21fvEon2T0Vay45t 2BYbU4AF815UL6o74YlW5SLdAofwylZS8pX4CKjGAB0T+fDiwkAepQl45nzX0ulv bMjuJmWHTjvEeplnx9iual4J4BT/9FznFs7o4tFVVfYBacFrhWjQyAf2xoP3gyn3 5OlV55VHVB+oidXUVNSNHZbXwrd1sH42x7x8o17PDFJrWjiq4kAb2EfSOIuSS6na K9Y06bqh3yRbVtRdZOuCLcY8QJwt/mx//uQqG6NuSvYhx1QyC6g==XuDESOIuSSa -----END PGP PRIVATE KEY BLOCK----- 19 http://herraiz.org
  • 20. Keyservers ● Internet hosts that contain public keys ● Federated services ● All servers contain all the public keys in the world ● Public keyserver in Spain thanks to RedIRIS ● URL: pgp.rediris.es 20 http://herraiz.org
  • 21. Message signing Hi there! Pub Pri Pub Pri Keyserver Pub Pub 21 http://herraiz.org
  • 22. Message signing Created with the private key Hi there! Pub Pri Pub Pri Keyserver Pub Pub 22 http://herraiz.org
  • 23. Message signing Hi there! Pub Pri Pub Pri Keyserver Pub Pub 23 http://herraiz.org
  • 24. Signing and encrypting Hi there! Pub Pri Pub Pri Keyserver Pub Pub 24 http://herraiz.org
  • 25. Signing and encrypting Pub FAD43A Pub Pri Pub Pri Keyserver Pub Pub 25 http://herraiz.org
  • 26. Signing and encrypting Pub FAD43A Pub Pri Pub Pri Keyserver Pub Pub 26 http://herraiz.org
  • 27. Signing and encrypting Hi there! Pub Pri Pub Pri Keyserver Pub Pub 27 http://herraiz.org
  • 28. Signing and encrypting Hi there! Pub Pri Pub Pri Keyserver Pub Pub 28 http://herraiz.org
  • 29. Identity certification How do you know that public keys belong to their legitimate owners? Public key Can we ensure that the Barack Obama key does belong to Barack Obama? 29 http://herraiz.org
  • 30. Identity certification Certificate Authorities Trust chain 30 http://herraiz.org
  • 31. Public key signing ● Public keys are plain text documents that can be cryptographically signed ● Mutual public signing adds identity certification to PKP schemes 31 http://herraiz.org
  • 32. Public key signing Barack Obama Pub Pri Pub Pri Keyserver Pub Pub 32 http://herraiz.org
  • 33. Public key signing Barack Obama Key FE0A7AF2 Name Barack Obama Fingerprint D0DA E915 BFDD E5CD 8BA0 B159 7E97 2ACB FE0A 7AF2 Pub Pri Pub Pri Keyserver Pub Pub 33 http://herraiz.org
  • 34. Public key signing Barack Obama Key FE0A7AF2 Name Barack Obama Fingerprint D0DA E915 BFDD E5CD 8BA0 B159 7E97 2ACB FE0A 7AF2 Pub Pri Pub Pri Keyserver Pub Pub 34 http://herraiz.org
  • 35. Public key signing Show me your passport Barack Obama Key FE0A7AF2 Name Barack Obama Fingerprint D0DA E915 BFDD E5CD 8BA0 B159 7E97 2ACB FE0A 7AF2 Pub Pri Pub Pri Keyserver Pub Pub 35 http://herraiz.org
  • 36. Public key signing Show me your passport Barack Obama Key FE0A7AF2 Name Barack Obama Fingerprint Passport D0DA E915 BFDD E5CD 8BA0 Barack B159 7E97 2ACB FE0A 7AF2 Obama Pub Pri Pub Pri Keyserver Pub Pub 36 http://herraiz.org
  • 37. Public key signing Pub Key FE0A7AF2 Barack Obama Name Barack Obama D0DA E915 BFDD E5CD 8BA0 Fingerprint B159 7E97 2ACB FE0A 7AF2 D0DA E915 BFDD E5CD 8BA0 B159 7E97 2ACB FE0A 7AF2 Download key FE0A7AF2 Pub Pri Keyserver Pub Pub 37 http://herraiz.org
  • 38. Public key signing Pub Key FE0A7AF2 Barack Obama Name Barack Obama D0DA E915 BFDD E5CD 8BA0 Fingerprint B159 7E97 2ACB FE0A 7AF2 D0DA E915 BFDD E5CD 8BA0 B159 7E97 2ACB FE0A 7AF2 Pub Pri Keyserver Pub Pub 38 http://herraiz.org
  • 39. Public key signing Pub Key FE0A7AF2 Barack Obama Name Barack Obama D0DA E915 BFDD E5CD 8BA0 Fingerprint B159 7E97 2ACB FE0A 7AF2 D0DA E915 BFDD E5CD 8BA0 B159 7E97 2ACB FE0A 7AF2 Pub Pri Keyserver Pub Pub 39 http://herraiz.org
  • 40. Public key signing Barack Obama Key signing is often mutual Pub Pri Pub Pri Keyserver Pub Pub 40 http://herraiz.org
  • 41. Public key signing Barack Obama Trust chain Pub Pub Is he Barack Pub Obama? 41 http://herraiz.org
  • 42. Signing party 42 http://herraiz.org
  • 43. Take away PK Cryptog. Each user creates Secure comms. a public-private through key pair insec. channels Trust chain Keyservers Identity cert. contain every through key in the world public key signing 43 http://herraiz.org