An Explanation of Cryptographic Key Fingerprint Visualization Technology Joe Awni

[email protected]

Joe Awni

An Explanation of Cryptographic Key [email protected] Visualization Technology1 / 19

Outline

1

Introduction to Asymmetric Cryptography

2

Key Fingerprint

3

Key Fingerprint Use

4

Cryptographic Key Visualizations

Joe Awni

An Explanation of Cryptographic Key [email protected] Visualization Technology2 / 19

What is Cryptography? Etymologically : from Greek , “hidden writing” The practice and study of secure communication

Joe Awni

An Explanation of Cryptographic Key [email protected] Visualization Technology3 / 19

What is Asymmetric Cryptography (AC)? AC refers to algorithms capable of using two different keys for encryption and decryption. Because the keys share mathematical relation, they are referred to as asymmetrical. (i.e.: One key is used to encrypt the message and only a second key may decipher)

Figure: The purple icon represents the cipher-text. Joe Awni

An Explanation of Cryptographic Key [email protected] Visualization Technology4 / 19

Why is Asymmetric Cryptography widely known as Public-key Cryptography?

Although the distinction is arbitrary, users of PGP/GPG Software keep one key private, and disseminate a second, public key. PGP/GPG software is not nearly the most widely used format of asymmetric key algorithm technology; HTTPS is. Thus, it does not make sense to refer to this field of cryptography as public-key. Frankly, key-pair cryptography would be the most straight-forward name.

Joe Awni

An Explanation of Cryptographic Key [email protected] Visualization Technology5 / 19

Why is Asymmetric Cryptography important?

Encrypted messages may be exchanged without prior arrangement on an encryption algorithm and key. Thus, this technology is widely used on the World Wide Web (WWW). You are already using it, whether-or-not you know it.

Joe Awni

An Explanation of Cryptographic Key [email protected] Visualization Technology6 / 19

How does it work? Randomly chosen large prime numbers are used to generate two keys that protect the clear-text message with a computational barrier. Without the encryption key’s pair, it would take an extremely long time to decipher the clear-text.

Figure: RSA key generation algorithm

Joe Awni

An Explanation of Cryptographic Key [email protected] Visualization Technology7 / 19

What is the vulnerability?

Since asymmetric cryptography makes it easy to set up encrypted two-party communication without prior arrangement on an algorithm and key, the challenge is identifying the remote party. Basically, to set up encryption “on the fly” is no problem, but knowing who you are “talking” to is a fundamental issue with modern cryptosystems.

Joe Awni

An Explanation of Cryptographic Key [email protected] Visualization Technology8 / 19

What is a key fingerprint?

A cryptographic hash of a key An example in typical hexadecimal format: 1f:0d:00:0c:bd:ba:cb:a0:39:75:ee:91:7d:16:d1:fe

Joe Awni

An Explanation of Cryptographic Key [email protected] Visualization Technology9 / 19

What is a Cryptographic hash? Also known as digest Takes arbitrary data and returns a fixed-size bit string such that It is infeasible to generate a message given a hash (one directional) It is infeasible to modify the message without changing the hash

Figure: Cryptographic Hash Function Flow Chart Joe Awni

An Explanation of Cryptographic Key Fingerprint [email protected] Visualization Technology 10 / 19

What is the significance of a key fingerprint?

Basically, it addresses the issue of, “who am I talking to.” A key fingerprint, generated from an encryption key, and compared to a known value can be used to authenticate a remote party. Note: It is important to generate the fingerprint on your computer from the remote party’s encryption key, rather than rely on a third party for authentication.

Joe Awni

An Explanation of Cryptographic Key Fingerprint [email protected] Visualization Technology 11 / 19

Common uses:

SSL ( includes all https:// sites ) S/MIME ( encrypted email ) PGP / GPG ( encrypted email ) SSH ( secure terminal ) SFTP ( secure file transfer )

Joe Awni

An Explanation of Cryptographic Key Fingerprint [email protected] Visualization Technology 12 / 19

Secure Sockets Layer ( SSL )

Trusted CAs (Certificate Authorities) cryptographically sign key fingerprints to produce certificates used to identify web servers. The most widely used form of asymmetric encryption Remote hosts are reached by unencrypted DNS entries Third party CAs are used to authenticate the remote host Public Key Infrastructure ( PKI )

Joe Awni

An Explanation of Cryptographic Key Fingerprint [email protected] Visualization Technology 13 / 19

Secure Shell ( SSH ) User is asked to positively identify the remote party by comparing a key fingerprint to a known value Asks user to authenticate remote host by key fingerprint If you ever used SSH before you are familiar with : The authenticity of host ’[target.net]:23 ([69.141.191.69]:226)’ can’t be established. ECDSA key fingerprint is 1f:0d:00:0c:bd:ba:cb:a0:39:75:ee:91:7d:16:d1:fe. Are you sure you want to continue connecting (yes/no)?

Joe Awni

An Explanation of Cryptographic Key Fingerprint [email protected] Visualization Technology 14 / 19

GNU Privacy Guard / Pretty Good Privacy ( GPG / PGP )

Users can chooses to trust others, and trust others to identify/introduce others. Relies on key fingerprints and Web of Trust ( https://en.wikipedia.org/wiki/Web_of_trust ) Decentralized alternative to PKI Basically extends some cryptographic authenticity to “friends of friends”

Joe Awni

An Explanation of Cryptographic Key Fingerprint [email protected] Visualization Technology 15 / 19

Strengths and Weakness of Modern Cryptosystems

Choosing a decentralized model for future technologies of the WWW is of strategic importance. Just as mission critical facilities have generators to restore power in the event of a black-out, the WWW should have no single point of failure. Web browsers use of PKI (centralized system) should be balanced by incorporating a fault-tolerant distributed system.

Joe Awni

An Explanation of Cryptographic Key Fingerprint [email protected] Visualization Technology 16 / 19

Visualization Uses Rather than require users to memorize key fingerprints to identify remote parties or identification authorities, a memorable visualization can be used to aid PKI, Web of Trust, or any encryption technology. Visualizing key fingerprint means authentication can be as simple as asking a user, do you remember this face?”

Joe Awni

Figure:AnCryptographic key visualization Explanation of Cryptographic Key Fingerprint [email protected] Visualization Technology 17 / 19

Full Size Face Visualization

Joe Awni

An Explanation of Cryptographic Key Fingerprint [email protected] Visualization Technology 18 / 19

Joe Awni

An Explanation of Cryptographic Key Fingerprint [email protected] Visualization Technology 19 / 19

An Explanation of Cryptographic Key Fingerprint Visualization ...

The authenticity of host '[target.net]:23. ([69.141.191.69]:226)' can't be established. ECDSA key fingerprint is. 1f:0d:00:0c:bd:ba:cb:a0:39:75:ee:91:7d:16:d1:fe.

458KB Sizes 0 Downloads 304 Views

Recommend Documents

Download Cryptographic Key Management Issues ...
Book synopsis. To interact with various services in the cloud and to store the data generated/processed by those services, several security capabilities are ...

Cryptographic Key Generation from Biometric Data Using ... - CiteSeerX
Department of Computing, Electronics, and Mechatronics. Universidad de las ... is reported in [2]. One more research that uses on-line handwritten signatures to ..... RVP is encrypted using the advanced encryption standard. (AES) encryption ...

Bimodal Biometric System for Cryptographic Key ...
architecture of the proposed system considers three secu- rity factors, namely ...... attacker has full access to the information contained in the token including the ...

Key and Explanation for Cambridge IELTS Reading Tests_ZIM.VN.pdf ...
KEY & EXPLANATION. CAMBRIDGE. READING TESTS. á»® ZIM. Page 3 of 160. Main menu. Displaying Key and Explanation for Cambridge IELTS Reading ...

An Incomplete Markets Explanation of the UIP Puzzle
Nov 6, 2015 - present business cycle stylized facts and results from a UIP regression of simulated model data, together with ... exogenously each period, following a bivariate autoregressive process of order 1: ( yt y∗ t ) = ( ρ ψ ..... some busi

Simon, What Is an Explanation of Behavior.pdf
Page 1 of 30. This excerpt from. Mind Readings. Paul Thagard, editor. © 1998 The MIT Press. is provided in screen-viewable form for personal use only by ...