SlideShare a Scribd company logo
2017#apricot2017
RSA and ECDSA
Geoff Huston
APNIC
2017#apricot2017
It’s all about Cryptography
2017#apricot2017
Why use Cryptography?
Public	key	cryptography	can	be	used	in	a	number	of	ways:
– protecting	a	session	from	third	party	eavesdroppers
Encryption	using	a	session	key	that	is	known	only	to	the	parties	to	the	conversation
– protecting	a	session	from	interference
Injection	(or	removal)	of	part	of	a	session	can	only	be	undertaken	by	the	parties	to	the	
session
– authentication	and	non-repudiation
What	is	received	is	exactly	what	the	other	party	sent,	and	cannot	be	repudiated
2017#apricot2017
Symmetric Crypto
A	symmetric	crypto	algorithm	uses	the	same	key	to
– Convert	a	plaintext	message	to	a	crypted message
– Convert	a	crypted message	to	its	plaintext	message
• They	are	generally	fast	and	simple
BUT	they	use	a	shared	key
– This	key	distribution	problem	can	be	a	critical	weakness	in	the	crypto	
framework
2017#apricot2017
Asymmetric Crypto
This	is	a	class	of	asymmetric	transforms	applied	to	a	message	such	that:
Messages	encrypted	using	Key	A	and	algorithm	X	can	only	be	translated	back	to	the	
original	message	using	Key	B	and	algorithm	X
This	also	holds	in	reverse
This	can	address	the	shared	key	problem:
If	I	publish	Key	A	and	keep	Key	B	a	secret	then	you	can	send	me	a	secret	by	
encrypting	it	using	my	public	key	A
2017#apricot2017
The Asymmetric Crypto Challenge
Devise	an	algorithm	(encoding)	and	
keys	such	that:
– Messages	encoded	with	one	key	can	
only	be	decoded	with	the	other	key
– Knowledge	of	the	value	of	one	key	does	
not	infer	the	value	of	the	other	key
http://bit.ly/2iQ0oi7
2017#apricot2017
RSA
Select	two	large	(>	256	bit)	prime	numbers,	p and	q,	then:
n	=	p.q
⏀(n)	=	(p-1).(q-1)	(the	number	of	numbers	that	are	relatively	prime	to	n)
Pick	an	e	that	is	relatively	prime	to	⏀(n)
The	PUBLIC	KEY	is	<e,n>
Pick	a	value	for	d such	that	d.e =	1	mod	⏀(n)
The	PRIVATE	KEY	is	<d,n>
For	any	x,			xde ≡ x	(mod	n)
2017#apricot2017
Why does RSA work?
Encryption	using	the	public	key	consists	of	taking	a	message	x and	
raising	it	to	the	power	e
Crypt	=	xe
Decryption	consists	of	taking	an	encrypted	message	and	raising	it	
to	the	power	d,	mod	n
Decrypt	=	Cryptd mod	n	=	(xe)d mod	n	=	xed mod	n	=	x
Similarly,	one	can	encrypt	a	message	with	the	private	key	(xd )	and	
decrypt	with	the	public	key	((xd )	e mod	n	=	x)
2017#apricot2017
Why does RSA work?
If	you	know	e and	n	(the	public	key)	then	how	can	you	calculate	d (the	
private	key)?
Now	d.e =	1	mod	⏀(n)
If	you	know	⏀(n)	you	can	calculate	d
But	⏀(n)	=	(p-1).(q-1),	where	p.q =	n
i.e.	you	need	to	find	the	prime	factors	of	n,	a	large	composite	number	that	
is	the	product	of	two	primes
2017#apricot2017
The ‘core’ of RSA
(xe)d ≡	x mod n
As	long	as	d and	n are	relatively	large,	and	n is	
the	product	of	two	large	prime	numbers,	then	
finding	the	value	of	d when	you	already	know	
the	values	of	e and	n is	computationally	
expensive
2017#apricot2017
The ‘core’ of RSA
(xe)d ≡	x mod n
As	long	as	d and	n are	relatively	large,	and	n is	
the	product	of	two	large	prime	numbers,	then	
finding	the	value	of	d when	you	already	know	
the	values	of	e and	n is	computationally	
expensive
2017#apricot2017
The ‘core’ of RSA
(xe)d ≡	x mod n
As	long	as	d and	n are	relatively	large,	and	n is	
the	
product	of	two	large	prime	numbers,	then	
finding	the	value	of	d when	you	already	know	
the	values	of	e and	n is	computationally	
expensive
2017#apricot2017
Why is this important?
Because much of the foundation of
Internet Security rests upon this
relationship
2017#apricot2017
How big can RSA go?
In	theory	we	can	push	this	to	very	large	sizes	of	n to	generate	RSA	
private	keys
The	algorithm	is	not	itself	arbitrarily	limited	in	terms	of	key	size
But	as	the	numbers	get	larger	there	is	higher	computation	overhead	to	
generate	and	manipulate	these	keys
So	we	want	it	large	enough	not	to	be	‘broken’	by	most	forms	of	brute	
force,	but	small	enough	to	be	computed	by	our	everyday	processors
2017#apricot2017
How big should RSA go?
You	need	to	consider	time as	well
How	long	do	you	want	or	need	your	secret	to	remain	a	secret?
Because	if	the	attacker	has	enough	time	a	brute	force	attack	may	work
Also	time	is	on	the	attacker’s	side:	keys	that	are	considered	robust	today	may	not	
be	as	robust	tomorrow,	assuming	that	feasible	compute	capabilities	rise	over	time
So	you	want	to	pick	a	key	size	that	is	resistant	to	attempts	to	brute	force	the	
key	both	today	and	tomorrow
2017#apricot2017
Bigger and bigger?
Well,	no	– the	larger	the	key	sizes	compared	to	compute	
capabilities	means:
– Longer	times	to	generate	keys
– Longer	times	to	encrypt	(and	decrypt)	messages
– More	space	to	represent	the	key	values
So	you	need	to	use	big	keys,	but	no	bigger	then	necessary!
2017#apricot2017
Be Specific!
Time	to	consult	the	experts!
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57Pt3r1.pdf
2017#apricot2017
RSA is everywhere…
2017#apricot2017
My Bank…(I hope!)
2017#apricot2017
TLS: Protecting the session
https://rhsecurity.wordpress.com/tag/tls/
2017#apricot2017
The Key to My Bank
Yes, the fine print says my
bank is using a 2048-bit RSA
Public key to as the foundation
of the session key used to
secure access to my bank
2017#apricot2017
I trust its my bank because …
• The	server	has	demonstrated	knowledge	of	a	private	key	that	
is	associated	with	a	public	key	that	I	have	been	provided
• The	public	key	has	been	associated	with	a	particular	domain	
name	by	a	Certificate	Authority
• My	browser	trusts	that	this	Certificate	Authority	never	lies	
about	such	associations
• So	if	the	server	can	demonstrate	that	it	has	the	private	key	
then	my	browser	will	believe	that	its	my	bank!
2017#apricot2017
DNSSEC and the DNS
Another	major	application	for	crypto	in	the	Internet	is	securing	
the	DNS
You	want	to	be	assured	that	the	response	you	get	to	from	DNS	
query	is:
– Authentic
– Complete
– Current
2017#apricot2017
DNSSEC Interlocking Signatures
.	(root)
.com
.example.com
www.example.com
.	Key-Signing	Key	– signs	over
.	Zone-Signing	Key	– signs	over
DS	for	.com	(Key-Signing	Key)
.com	Key-Signing	Key	– signs	over
.com	Zone-Signing	Key	– signs	over
DS	for	example	.com	(Key-Signing	Key)
example.com Key-Signing	Key	– signs	over
example.com Zone-Signing	Key	– signs	over
www.example.com
2017#apricot2017
DNSSEC Interlocking Signatures
.	(root)
.com
.example.com
www.example.com IN	A	192.0.1
.	Key-Signing	Key	– signs	over
.	Zone-Signing	Key	– signs	over
DS	for	.com	(Key-Signing	Key)
.com	Key-Signing	Key	– signs	over
.com	Zone-Signing	Key	– signs	over
DS	for	example	.com	(Key-Signing	Key)
example.com Key-Signing	Key	– signs	over
example.com Zone-Signing	Key	– signs	over
www.example.com
2017#apricot2017
DNSSEC Interlocking Signatures
.	(root)
.com
.example.com
www.example.com IN	A	192.0.1
.	Key-Signing	Key	– signs	over
.	Zone-Signing	Key	– signs	over
DS	for	.com	(Key-Signing	Key)
.com	Key-Signing	Key	– signs	over
.com	Zone-Signing	Key	– signs	over
DS	for	example	.com	(Key-Signing	Key)
example.com Key-Signing	Key	– signs	over
example.com Zone-Signing	Key	– signs	over
www.example.com
Is the signature for this record valid?
Is the ZSK for example.com valid?
Is the KSK for example.com valid?
Is this DS equal to the hash of the KSK?
Is the signature for this record valid?
Is the ZSK for .com valid?
Is the KSK for .com valid?
Is this DS equal to the hash of the KSK?
Is the signature for this record valid?
Is the ZSK for . valid?
Is the KSK for . valid?
2017#apricot2017
DNSSEC Interlocking Signatures
.	(root)
.com
.example.com
www.example.com IN	A	192.0.1
.	Key-Signing	Key	– signs	over
.	Zone-Signing	Key	– signs	over
DS	for	.com	(Key-Signing	Key)
.com	Key-Signing	Key	– signs	over
.com	Zone-Signing	Key	– signs	over
DS	for	example	.com	(Key-Signing	Key)
example.com Key-Signing	Key	– signs	over
example.com Zone-Signing	Key	– signs	over
www.example.com
Is the signature for this record valid?
Is the ZSK for example.com valid?
Is the KSK for example.com valid?
Is this DS equal to the hash of the KSK?
Is the signature for this record valid?
Is the ZSK for .com valid?
Is the KSK for .com valid?
Is this DS equal to the hash of the KSK?
Is the signature for this record valid?
Is the ZSK for . valid?
Is the KSK for . valid?
As long as you have a valid
local trust anchor for the
root zone then you can
validate a signed DNS
response by constructing
this backward path to the
local root trust anchor
2017#apricot2017
A DNSSEC response using RSA
$ dig +dnssec u5221730329.s1425859199.i5075.vcf100.5a593.z.dotnxdomain.net
; <<>> DiG 9.9.6-P1 <<>> +dnssec u5221730329.s1425859199.i5075.vcf100.5a593.z.dotnxdomain.net
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25461
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 2, AUTHORITY: 4, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;u5221730329.s1425859199.i5075.vcf100.5a593.z.dotnxdomain.net. IN A
;; ANSWER SECTION:
u5221730329.s1425859199.i5075.vcf100.5a593.z.dotnxdomain.net. 1 IN A 199.102.79.186
u5221730329.s1425859199.i5075.vcf100.5a593.z.dotnxdomain.net. 1 IN RRSIG A 5 4 3600 20200724235900 20130729104013 1968 5a593.z.dotnxdomain.net. ghHPoQd71aZtsdH823eW
;; AUTHORITY SECTION:
33d23a33.3b7acf35.9bd5b553.3ad4aa35.09207c36.a095a7ae.1dc33700.103ad556.3a564678.16395067.a12ec545.6183d935.c68cebfb.41a4008e.4f291b87.479c6f9e.5ea48f86.7d1187f1.7572d59a
33d23a33.3b7acf35.9bd5b553.3ad4aa35.09207c36.a095a7ae.1dc33700.103ad556.3a564678.16395067.a12ec545.6183d935.c68cebfb.41a4008e.4f291b87.479c6f9e.5ea48f86.7d1187f1.7572d59a
5a593.z.dotnxdomain.net. 3599 IN NS nsz1.z.dotnxdomain.net.
5a593.z.dotnxdomain.net. 3600 IN RRSIG NS 5 4 3600 20200724235900 20130729104013 1968 5a593.z.dotnxdomain.net. ntxWo5UwL1vQjOHY0z5DCVNDDScnd3Tglgd0PsBRRhk3B9iJ
;; Query time: 1052 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
;; WHEN: Thu Mar 12 03:59:57 UTC 2015
;; MSG SIZE rcvd: 937
RSA	signed	response	– 937	octets
2017#apricot2017
$ dig +dnssec DNSKEY org
; <<>> DiG 9.11.0-P1 <<>> +dnssec DNSKEY org
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53713
;; flags: qr rd ra; QUERY: 1, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;org. IN DNSKEY
;; ANSWER SECTION:
org. 900 IN DNSKEY 256 3 7 AwEAAXxsMmN/JgpEE9Y4uFNRJm7Q9GBwmEYUCsCxuKlgBU9WrQEFRrvA eMamUBeX4SE
org. 900 IN DNSKEY 256 3 7 AwEAAayiVbuM+ehlsKsuAL1CI3mA+5JM7ti3VeY8ysmogElVMuSLNsX7 HFyq9O6qhZV
org. 900 IN DNSKEY 257 3 7 AwEAAcMnWBKLuvG/LwnPVykcmpvnntwxfshHlHRhlY0F3oz8AMcuF8gw 9McCw+BoC2Y
org. 900 IN DNSKEY 257 3 7 AwEAAZTjbIO5kIpxWUtyXc8avsKyHIIZ+LjC2Dv8naO+Tz6X2fqzDC1b dq7HlZwtkaq
org. 900 IN RRSIG DNSKEY 7 1 900 20170207153219 20170117143219 3947 org. S6+vpFWz6hfPmvI7zxRa4
org. 900 IN RRSIG DNSKEY 7 1 900 20170207153219 20170117143219 9795 org. iEyiroy02ljtH5hf5RIdf
org. 900 IN RRSIG DNSKEY 7 1 900 20170207153219 20170117143219 17883 org. A2hLUswcas+W4h8gZYpA
;; Query time: 475 msec
;; SERVER: 203.133.248.1#53(203.133.248.1)
;; WHEN: Thu Jan 19 23:37:38 UTC 2017
;; MSG SIZE rcvd: 1625
Another DNSSEC response using RSA
RSA	signed	response	– 1,625	octets
2017#apricot2017
Not every application can tolerate
large keys…
The	DNS	and	DNSSEC	is	a	problem	here:
– including	the	digital	signature	increases	the	response	size
– Large	responses	generate	packet	fragmentation
– Fragments	are	commonly	filtered	by	firewalls
– IPv6	Fragments	required	IPv6	Extension	Headers,	and	
packets	with	Extension	Headers	are	commonly	filtered
– DNS	over	TCP	imposes	server	load
– DNS	over	TCP	is	commonly	filtered
If	you	can avoid	large	responses	in	the	DNS,	you	should!
2017#apricot2017
The search for small keys
• Large	keys	and	the	DNS	don’t	mix	very	well:
– We	try	and	make	UDP	fragmentation	work	reliably	(for	once!)
– Or	we	switch	the	DNS	to	use	TCP
– Or	we	look	for	smaller	keys
2017#apricot2017
Enter Elliptic Curves
y2 =	x3 +	ax +	b
2017#apricot2017
y2 =	x3 +	ax +	b
Enter Elliptic Curves
“It	is	not	immediately	obvious	why	
verification	even	functions	correctly.”	!!
2017#apricot2017
ECDSA P-256
Elliptic	Curve	Cryptography	allows	for	the	construction	
of	“strong”	public/private	key	pairs	with	key	lengths	
that	are	far	shorter	than	equivalent	strength	keys	using	
RSA	
A	256-bit	ECC	key	should	provide	comparable	security	
to	a	3072-bit	RSA	key
2017#apricot2017
ECDSA vs RSS
$ dig +dnssec u5221730329.s1425859199.i5075.vcf100.5a593.y.dotnxdomain.net
; <<>> DiG 9.9.6-P1 <<>> +dnssec u5221730329.s1425859199.i5075.vcf100.5a593.y.dotnxdomain.net
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61126
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 2, AUTHORITY: 4, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;u5221730329.s1425859199.i5075.vcf100.5a593.y.dotnxdomain.net. IN A
;; ANSWER SECTION:
u5221730329.s1425859199.i5075.vcf100.5a593.y.dotnxdomain.net. 1 IN A 144.76.167.10
u5221730329.s1425859199.i5075.vcf100.5a593.y.dotnxdomain.net. 1 IN RRSIG A 13 4 3600 20200724235900 20150301105936 35456 5a593.y.dotnxdomain.net. IMXSIJ/uKixSAt8GXsh6Lm8CvEOmK5n/5bPgs
;; AUTHORITY SECTION:
ns1.5a593.y.dotnxdomain.net. 1 IN NSEC x.5a593.y.dotnxdomain.net. A RRSIG NSEC
ns1.5a593.y.dotnxdomain.net. 1 IN RRSIG NSEC 13 5 1 20200724235900 20150301105936 35456 5a593.y.dotnxdomain.net. vM+5YEkAc8B9iYHV3ZO3r9v+RvICn3qfWRfneytLP+nHCOku66X31pzB
5a593.y.dotnxdomain.net. 3598 IN NS ns1.5a593.y.dotnxdomain.net.
5a593.y.dotnxdomain.net. 3600 IN RRSIG NS 13 4 3600 20200724235900 20150301105936 35456 5a593.y.dotnxdomain.net. dzFik3O4HhiEg8TXcn3dCFdCfXCzLj7V0y5qIkCNYXYQ5EfoiWMhUh1s Lb9I0CQk
;; Query time: 1880 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
;; WHEN: Thu Mar 12 03:59:42 UTC 2015
;; MSG SIZE rcvd: 527
$ dig +dnssec u5221730329.s1425859199.i5075.vcf100.5a593.z.dotnxdomain.net
; <<>> DiG 9.9.6-P1 <<>> +dnssec u5221730329.s1425859199.i5075.vcf100.5a593.z.dotnxdomain.net
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25461
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 2, AUTHORITY: 4, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;u5221730329.s1425859199.i5075.vcf100.5a593.z.dotnxdomain.net. IN A
;; ANSWER SECTION:
u5221730329.s1425859199.i5075.vcf100.5a593.z.dotnxdomain.net. 1 IN A 199.102.79.186
u5221730329.s1425859199.i5075.vcf100.5a593.z.dotnxdomain.net. 1 IN RRSIG A 5 4 3600 2020072423590
;; AUTHORITY SECTION:
33d23a33.3b7acf35.9bd5b553.3ad4aa35.09207c36.a095a7ae.1dc33700.103ad556.3a564678.16395067.a12ec545.6183
33d23a33.3b7acf35.9bd5b553.3ad4aa35.09207c36.a095a7ae.1dc33700.103ad556.3a564678.16395067.a12ec545.6183
5a593.z.dotnxdomain.net. 3599 IN NS nsz1.z.dotnxdomain.net.
5a593.z.dotnxdomain.net. 3600 IN RRSIG NS 5 4 3600 20200724235900 20130729104013 1968 5a593.
;; Query time: 1052 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
;; WHEN: Thu Mar 12 03:59:57 UTC 2015
;; MSG SIZE rcvd: 937
ECDSA	signed	response	– 527	octets RSA	signed	response	– 937	octets
2017#apricot2017
ECDSA has a history…
2017#apricot2017
ECDSA and OpenSSL
• OpenSSL	added	ECDSA	support	as	from	0.9.8	(2005)	
• Other	bundles	and	specific	builds	added	ECDSA	support	later
• But	deployed	systems	often	lag	behind	the	latest	bundles,	and	
therefore	still	do	not	include	ECC	support	in	their	running	
configuration
2017#apricot2017
Is ECDSA viable?
What	does	NIST	say?
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57Pt3r1.pdf
2017#apricot2017
Do folk use ECDSA for public keys?
$ dig +dnssec www.cloudflare-dnssec-auth.com
; <<>> DiG 9.9.6-P1 <<>> +dnssec www.cloudflare-dnssec-auth.com
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7049
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 6, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;www.cloudflare-dnssec-auth.com. IN A
;; ANSWER SECTION:
www.cloudflare-dnssec-auth.com. 300 IN A 104.20.23.140
www.cloudflare-dnssec-auth.com. 300 IN A 104.20.21.140
www.cloudflare-dnssec-auth.com. 300 IN A 104.20.19.140
www.cloudflare-dnssec-auth.com. 300 IN A 104.20.22.140
www.cloudflare-dnssec-auth.com. 300 IN A 104.20.20.140
www.cloudflare-dnssec-auth.com. 300 IN RRSIG A 13 3 300 20150317021923 20150315001923 35273
cloudflare-dnssec-auth.com. pgBvfQkU4Il8ted2hGL9o8NspvKksDT8/jvQ+4o4h4tGmAX0fDBEoorb
tLiW7mcdOWYLoOnjovzYh3Q0Odu0Xw==
;; Query time: 237 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
;; WHEN: Mon Mar 16 01:19:24 UTC 2015
;; MSG SIZE rcvd: 261
Algorithm 13 is ECDSA P-256
Signed response is 261 octets long!
2017#apricot2017
So lets use ECDSA for DNSSEC
Or	maybe	we	should	look	before	we	leap...
– Is	ECDSA	a	“well	supported”	crypto	protocol?	*
– If	you	signed	using	ECDSA	would	resolvers	
validate	the	signature?
It’s	not	that	crypto	libraries	deliberately	exclude	ECDSA	support	these	days.	
The	more	likely	issue	appears	to	be	the	operational	practic es of	some	ISPs	
who	use	crufty old	software	sets	to	support	DNS	resolvers	which	are	now	
running	old	libraries	that	predate	the	incorporation	of	ECDSA	into	Open	SSL	
*
2017#apricot2017
Where are the users who can validate
ECDSA-signed DNSSEC records?
https://stats.labs.apnic.net/ecdsa
2017#apricot2017
And where ECDSA support is
missing
https://stats.labs.apnic.net/ecdsa
2017#apricot2017
Today we’re in Vietnam…
2017#apricot2017
Today we’re in Vietnam…
2017#apricot2017
The Top 5 Vietnam ISPs
And	the	extent	to	which	their	uses	perform	DNSSEC	validation	with	ECDSA	and	RSA
2017#apricot2017
And it if wasn’t for Google…
There would probably be no DNSSEC at all!
And no ECDSA!
2017#apricot2017
APNIC Labs Report on ECDSA use
https://stats.labs.apnic.net/ecdsa
2017#apricot2017
Me: gih@apnic.net

More Related Content

What's hot

Routing Algorithm
Routing AlgorithmRouting Algorithm
Routing Algorithm
Kamal Acharya
 
Contract Practice with Remix
Contract Practice with RemixContract Practice with Remix
Contract Practice with Remix
KC Tam
 
Secure Hash Algorithm
Secure Hash AlgorithmSecure Hash Algorithm
Secure Hash Algorithm
Vishakha Agarwal
 
Ethereum
EthereumEthereum
Ethereum
Brian Yap
 
Blockchain Consensus Protocols
Blockchain Consensus ProtocolsBlockchain Consensus Protocols
Blockchain Consensus Protocols
Melanie Swan
 
Overview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsOverview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus Mechanisms
Johannes Ahlmann
 
File Encryption
File EncryptionFile Encryption
File Encryption
brittanyjespersen
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
Mohsin Ali
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
 
Network security Lab manual
Network security Lab manual Network security Lab manual
Network security Lab manual
Vivek Kumar Sinha
 
Consensus Algorithms.pptx
Consensus Algorithms.pptxConsensus Algorithms.pptx
Consensus Algorithms.pptx
Rajapriya82
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
Cysinfo Cyber Security Community
 
Ds practical file
Ds practical fileDs practical file
Ds practical file
Khushboo Pal
 
Types of Blockchains
Types of BlockchainsTypes of Blockchains
Types of Blockchains
Vikram Khanna
 
Shortest path algorithm
Shortest  path algorithmShortest  path algorithm
Shortest path algorithm
Subrata Kumer Paul
 
Elgamal &amp; schnorr digital signature scheme copy
Elgamal &amp; schnorr digital signature scheme   copyElgamal &amp; schnorr digital signature scheme   copy
Elgamal &amp; schnorr digital signature scheme copy
North Cap University (NCU) Formely ITM University
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
Ruchi Maurya
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Message authentication
Message authenticationMessage authentication
Message authentication
CAS
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
vinitha96
 

What's hot (20)

Routing Algorithm
Routing AlgorithmRouting Algorithm
Routing Algorithm
 
Contract Practice with Remix
Contract Practice with RemixContract Practice with Remix
Contract Practice with Remix
 
Secure Hash Algorithm
Secure Hash AlgorithmSecure Hash Algorithm
Secure Hash Algorithm
 
Ethereum
EthereumEthereum
Ethereum
 
Blockchain Consensus Protocols
Blockchain Consensus ProtocolsBlockchain Consensus Protocols
Blockchain Consensus Protocols
 
Overview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsOverview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus Mechanisms
 
File Encryption
File EncryptionFile Encryption
File Encryption
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Network security Lab manual
Network security Lab manual Network security Lab manual
Network security Lab manual
 
Consensus Algorithms.pptx
Consensus Algorithms.pptxConsensus Algorithms.pptx
Consensus Algorithms.pptx
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Ds practical file
Ds practical fileDs practical file
Ds practical file
 
Types of Blockchains
Types of BlockchainsTypes of Blockchains
Types of Blockchains
 
Shortest path algorithm
Shortest  path algorithmShortest  path algorithm
Shortest path algorithm
 
Elgamal &amp; schnorr digital signature scheme copy
Elgamal &amp; schnorr digital signature scheme   copyElgamal &amp; schnorr digital signature scheme   copy
Elgamal &amp; schnorr digital signature scheme copy
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
 

Viewers also liked

RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Shashank Shetty
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
Indra97065
 
RSA and RAD 8.5 Top New Value Features
RSA and RAD 8.5 Top New Value FeaturesRSA and RAD 8.5 Top New Value Features
RSA and RAD 8.5 Top New Value Features
Roger Snook
 
2013 Good Design is Good Business mobile and RSA
2013 Good Design is Good Business mobile and RSA2013 Good Design is Good Business mobile and RSA
2013 Good Design is Good Business mobile and RSA
Roger Snook
 
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Source Conference
 
Controller encryption using RSA public-key encryption scheme (Asian Control C...
Controller encryption using RSA public-key encryption scheme (Asian Control C...Controller encryption using RSA public-key encryption scheme (Asian Control C...
Controller encryption using RSA public-key encryption scheme (Asian Control C...
Kiminao Kogiso
 
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
Denim Group
 
Chapter 09
Chapter 09Chapter 09
Chapter 09
cclay3
 
Pluggable Authentication Module
Pluggable Authentication ModulePluggable Authentication Module
Pluggable Authentication Module
SinarShebl
 
Lecture 3b public key_encryption
Lecture 3b public key_encryptionLecture 3b public key_encryption
Lecture 3b public key_encryption
rajakhurram
 
Running a Local Copy of the DNS Root Zone
Running a Local Copy of the DNS Root ZoneRunning a Local Copy of the DNS Root Zone
Running a Local Copy of the DNS Root Zone
APNIC
 
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Akamai Technologies
 
Introduction to Bitcoin and ECDSA
Introduction to Bitcoin and ECDSAIntroduction to Bitcoin and ECDSA
Introduction to Bitcoin and ECDSA
Nikesh Mistry
 
Authentication Modules For Linux - PAM Architecture
Authentication Modules For Linux - PAM ArchitectureAuthentication Modules For Linux - PAM Architecture
Authentication Modules For Linux - PAM Architecture
Priyank Kapadia
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
phanleson
 
Using ~300 Billion DNS Queries to Analyse the TLD Name Collision Problem
Using ~300 Billion DNS Queries to Analyse the TLD Name Collision ProblemUsing ~300 Billion DNS Queries to Analyse the TLD Name Collision Problem
Using ~300 Billion DNS Queries to Analyse the TLD Name Collision Problem
APNIC
 
Digital signature
Digital signatureDigital signature
Digital signature
Hossain Md Shakhawat
 
TLD Anycast DNS servers to ISPs
TLD Anycast DNS servers to ISPsTLD Anycast DNS servers to ISPs
TLD Anycast DNS servers to ISPs
APNIC
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
raf_slide
 

Viewers also liked (20)

RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
RSA and RAD 8.5 Top New Value Features
RSA and RAD 8.5 Top New Value FeaturesRSA and RAD 8.5 Top New Value Features
RSA and RAD 8.5 Top New Value Features
 
2013 Good Design is Good Business mobile and RSA
2013 Good Design is Good Business mobile and RSA2013 Good Design is Good Business mobile and RSA
2013 Good Design is Good Business mobile and RSA
 
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
 
Controller encryption using RSA public-key encryption scheme (Asian Control C...
Controller encryption using RSA public-key encryption scheme (Asian Control C...Controller encryption using RSA public-key encryption scheme (Asian Control C...
Controller encryption using RSA public-key encryption scheme (Asian Control C...
 
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
 
Chapter 09
Chapter 09Chapter 09
Chapter 09
 
Pluggable Authentication Module
Pluggable Authentication ModulePluggable Authentication Module
Pluggable Authentication Module
 
Lecture 3b public key_encryption
Lecture 3b public key_encryptionLecture 3b public key_encryption
Lecture 3b public key_encryption
 
Running a Local Copy of the DNS Root Zone
Running a Local Copy of the DNS Root ZoneRunning a Local Copy of the DNS Root Zone
Running a Local Copy of the DNS Root Zone
 
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
 
Introduction to Bitcoin and ECDSA
Introduction to Bitcoin and ECDSAIntroduction to Bitcoin and ECDSA
Introduction to Bitcoin and ECDSA
 
Authentication Modules For Linux - PAM Architecture
Authentication Modules For Linux - PAM ArchitectureAuthentication Modules For Linux - PAM Architecture
Authentication Modules For Linux - PAM Architecture
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
Using ~300 Billion DNS Queries to Analyse the TLD Name Collision Problem
Using ~300 Billion DNS Queries to Analyse the TLD Name Collision ProblemUsing ~300 Billion DNS Queries to Analyse the TLD Name Collision Problem
Using ~300 Billion DNS Queries to Analyse the TLD Name Collision Problem
 
Digital signature
Digital signatureDigital signature
Digital signature
 
TLD Anycast DNS servers to ISPs
TLD Anycast DNS servers to ISPsTLD Anycast DNS servers to ISPs
TLD Anycast DNS servers to ISPs
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 

Similar to Cryptography - RSA and ECDSA

Practical Cryptography and Security Concepts for Developers
Practical Cryptography and Security Concepts for DevelopersPractical Cryptography and Security Concepts for Developers
Practical Cryptography and Security Concepts for Developers
Gökhan Şengün
 
Dnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defsDnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defs
AFRINIC
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal
 
DNSSEC for Registrars by .ORG & Afilias
DNSSEC for Registrars by .ORG & AfiliasDNSSEC for Registrars by .ORG & Afilias
DNSSEC for Registrars by .ORG & Afilias
ORG, The Public Interest Registry
 
Encryption Techniques
Encryption TechniquesEncryption Techniques
Encryption Techniques
Del Elson
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
 
Cryptography
CryptographyCryptography
Cryptography
amiable_indian
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
Sylvain Maret
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
Ahmed Raza Shaikh
 
ARC306_High Resiliency & Availability Of Online Entertainment Communities Usi...
ARC306_High Resiliency & Availability Of Online Entertainment Communities Usi...ARC306_High Resiliency & Availability Of Online Entertainment Communities Usi...
ARC306_High Resiliency & Availability Of Online Entertainment Communities Usi...
Amazon Web Services
 
Implementing a Secure and Effective PKI on Windows Server 2012 R2
Implementing a Secure and Effective PKI on Windows Server 2012 R2Implementing a Secure and Effective PKI on Windows Server 2012 R2
Implementing a Secure and Effective PKI on Windows Server 2012 R2
Frank Lesniak
 
Why DANE?
Why DANE?Why DANE?
Why DANE?
APNIC
 
Pki by Steve Lamb
Pki by Steve LambPki by Steve Lamb
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam Bowne
SecurityTube.Net
 
Ch12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.comCh12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.com
phanleson
 
Encryption
EncryptionEncryption
Encryption Primer por Cathy Nolan
Encryption Primer por Cathy NolanEncryption Primer por Cathy Nolan
Encryption Primer por Cathy Nolan
Joao Galdino Mello de Souza
 
Phreebird Suite 1.0: Introducing the Domain Key Infrastructure
Phreebird Suite 1.0:  Introducing the Domain Key InfrastructurePhreebird Suite 1.0:  Introducing the Domain Key Infrastructure
Phreebird Suite 1.0: Introducing the Domain Key Infrastructure
Dan Kaminsky
 
Introduction DNSSec
Introduction DNSSecIntroduction DNSSec
Introduction DNSSec
AFRINIC
 

Similar to Cryptography - RSA and ECDSA (20)

Practical Cryptography and Security Concepts for Developers
Practical Cryptography and Security Concepts for DevelopersPractical Cryptography and Security Concepts for Developers
Practical Cryptography and Security Concepts for Developers
 
Dnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defsDnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defs
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
DNSSEC for Registrars by .ORG & Afilias
DNSSEC for Registrars by .ORG & AfiliasDNSSEC for Registrars by .ORG & Afilias
DNSSEC for Registrars by .ORG & Afilias
 
Encryption Techniques
Encryption TechniquesEncryption Techniques
Encryption Techniques
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
ARC306_High Resiliency & Availability Of Online Entertainment Communities Usi...
ARC306_High Resiliency & Availability Of Online Entertainment Communities Usi...ARC306_High Resiliency & Availability Of Online Entertainment Communities Usi...
ARC306_High Resiliency & Availability Of Online Entertainment Communities Usi...
 
Implementing a Secure and Effective PKI on Windows Server 2012 R2
Implementing a Secure and Effective PKI on Windows Server 2012 R2Implementing a Secure and Effective PKI on Windows Server 2012 R2
Implementing a Secure and Effective PKI on Windows Server 2012 R2
 
Why DANE?
Why DANE?Why DANE?
Why DANE?
 
Pki by Steve Lamb
Pki by Steve LambPki by Steve Lamb
Pki by Steve Lamb
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam Bowne
 
Ch12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.comCh12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.com
 
Encryption
EncryptionEncryption
Encryption
 
Encryption Primer por Cathy Nolan
Encryption Primer por Cathy NolanEncryption Primer por Cathy Nolan
Encryption Primer por Cathy Nolan
 
Phreebird Suite 1.0: Introducing the Domain Key Infrastructure
Phreebird Suite 1.0:  Introducing the Domain Key InfrastructurePhreebird Suite 1.0:  Introducing the Domain Key Infrastructure
Phreebird Suite 1.0: Introducing the Domain Key Infrastructure
 
Introduction DNSSec
Introduction DNSSecIntroduction DNSSec
Introduction DNSSec
 

More from APNIC

APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
APNIC
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
APNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
APNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
APNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APNIC
 

More from APNIC (20)

APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 

Recently uploaded

不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 

Recently uploaded (20)

不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 

Cryptography - RSA and ECDSA

  • 3. 2017#apricot2017 Why use Cryptography? Public key cryptography can be used in a number of ways: – protecting a session from third party eavesdroppers Encryption using a session key that is known only to the parties to the conversation – protecting a session from interference Injection (or removal) of part of a session can only be undertaken by the parties to the session – authentication and non-repudiation What is received is exactly what the other party sent, and cannot be repudiated
  • 4. 2017#apricot2017 Symmetric Crypto A symmetric crypto algorithm uses the same key to – Convert a plaintext message to a crypted message – Convert a crypted message to its plaintext message • They are generally fast and simple BUT they use a shared key – This key distribution problem can be a critical weakness in the crypto framework
  • 6. 2017#apricot2017 The Asymmetric Crypto Challenge Devise an algorithm (encoding) and keys such that: – Messages encoded with one key can only be decoded with the other key – Knowledge of the value of one key does not infer the value of the other key http://bit.ly/2iQ0oi7
  • 8. 2017#apricot2017 Why does RSA work? Encryption using the public key consists of taking a message x and raising it to the power e Crypt = xe Decryption consists of taking an encrypted message and raising it to the power d, mod n Decrypt = Cryptd mod n = (xe)d mod n = xed mod n = x Similarly, one can encrypt a message with the private key (xd ) and decrypt with the public key ((xd ) e mod n = x)
  • 9. 2017#apricot2017 Why does RSA work? If you know e and n (the public key) then how can you calculate d (the private key)? Now d.e = 1 mod ⏀(n) If you know ⏀(n) you can calculate d But ⏀(n) = (p-1).(q-1), where p.q = n i.e. you need to find the prime factors of n, a large composite number that is the product of two primes
  • 10. 2017#apricot2017 The ‘core’ of RSA (xe)d ≡ x mod n As long as d and n are relatively large, and n is the product of two large prime numbers, then finding the value of d when you already know the values of e and n is computationally expensive
  • 11. 2017#apricot2017 The ‘core’ of RSA (xe)d ≡ x mod n As long as d and n are relatively large, and n is the product of two large prime numbers, then finding the value of d when you already know the values of e and n is computationally expensive
  • 12. 2017#apricot2017 The ‘core’ of RSA (xe)d ≡ x mod n As long as d and n are relatively large, and n is the product of two large prime numbers, then finding the value of d when you already know the values of e and n is computationally expensive
  • 13. 2017#apricot2017 Why is this important? Because much of the foundation of Internet Security rests upon this relationship
  • 14. 2017#apricot2017 How big can RSA go? In theory we can push this to very large sizes of n to generate RSA private keys The algorithm is not itself arbitrarily limited in terms of key size But as the numbers get larger there is higher computation overhead to generate and manipulate these keys So we want it large enough not to be ‘broken’ by most forms of brute force, but small enough to be computed by our everyday processors
  • 15. 2017#apricot2017 How big should RSA go? You need to consider time as well How long do you want or need your secret to remain a secret? Because if the attacker has enough time a brute force attack may work Also time is on the attacker’s side: keys that are considered robust today may not be as robust tomorrow, assuming that feasible compute capabilities rise over time So you want to pick a key size that is resistant to attempts to brute force the key both today and tomorrow
  • 16. 2017#apricot2017 Bigger and bigger? Well, no – the larger the key sizes compared to compute capabilities means: – Longer times to generate keys – Longer times to encrypt (and decrypt) messages – More space to represent the key values So you need to use big keys, but no bigger then necessary!
  • 20. 2017#apricot2017 TLS: Protecting the session https://rhsecurity.wordpress.com/tag/tls/
  • 21. 2017#apricot2017 The Key to My Bank Yes, the fine print says my bank is using a 2048-bit RSA Public key to as the foundation of the session key used to secure access to my bank
  • 22. 2017#apricot2017 I trust its my bank because … • The server has demonstrated knowledge of a private key that is associated with a public key that I have been provided • The public key has been associated with a particular domain name by a Certificate Authority • My browser trusts that this Certificate Authority never lies about such associations • So if the server can demonstrate that it has the private key then my browser will believe that its my bank!
  • 23. 2017#apricot2017 DNSSEC and the DNS Another major application for crypto in the Internet is securing the DNS You want to be assured that the response you get to from DNS query is: – Authentic – Complete – Current
  • 24. 2017#apricot2017 DNSSEC Interlocking Signatures . (root) .com .example.com www.example.com . Key-Signing Key – signs over . Zone-Signing Key – signs over DS for .com (Key-Signing Key) .com Key-Signing Key – signs over .com Zone-Signing Key – signs over DS for example .com (Key-Signing Key) example.com Key-Signing Key – signs over example.com Zone-Signing Key – signs over www.example.com
  • 25. 2017#apricot2017 DNSSEC Interlocking Signatures . (root) .com .example.com www.example.com IN A 192.0.1 . Key-Signing Key – signs over . Zone-Signing Key – signs over DS for .com (Key-Signing Key) .com Key-Signing Key – signs over .com Zone-Signing Key – signs over DS for example .com (Key-Signing Key) example.com Key-Signing Key – signs over example.com Zone-Signing Key – signs over www.example.com
  • 26. 2017#apricot2017 DNSSEC Interlocking Signatures . (root) .com .example.com www.example.com IN A 192.0.1 . Key-Signing Key – signs over . Zone-Signing Key – signs over DS for .com (Key-Signing Key) .com Key-Signing Key – signs over .com Zone-Signing Key – signs over DS for example .com (Key-Signing Key) example.com Key-Signing Key – signs over example.com Zone-Signing Key – signs over www.example.com Is the signature for this record valid? Is the ZSK for example.com valid? Is the KSK for example.com valid? Is this DS equal to the hash of the KSK? Is the signature for this record valid? Is the ZSK for .com valid? Is the KSK for .com valid? Is this DS equal to the hash of the KSK? Is the signature for this record valid? Is the ZSK for . valid? Is the KSK for . valid?
  • 27. 2017#apricot2017 DNSSEC Interlocking Signatures . (root) .com .example.com www.example.com IN A 192.0.1 . Key-Signing Key – signs over . Zone-Signing Key – signs over DS for .com (Key-Signing Key) .com Key-Signing Key – signs over .com Zone-Signing Key – signs over DS for example .com (Key-Signing Key) example.com Key-Signing Key – signs over example.com Zone-Signing Key – signs over www.example.com Is the signature for this record valid? Is the ZSK for example.com valid? Is the KSK for example.com valid? Is this DS equal to the hash of the KSK? Is the signature for this record valid? Is the ZSK for .com valid? Is the KSK for .com valid? Is this DS equal to the hash of the KSK? Is the signature for this record valid? Is the ZSK for . valid? Is the KSK for . valid? As long as you have a valid local trust anchor for the root zone then you can validate a signed DNS response by constructing this backward path to the local root trust anchor
  • 28. 2017#apricot2017 A DNSSEC response using RSA $ dig +dnssec u5221730329.s1425859199.i5075.vcf100.5a593.z.dotnxdomain.net ; <<>> DiG 9.9.6-P1 <<>> +dnssec u5221730329.s1425859199.i5075.vcf100.5a593.z.dotnxdomain.net ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25461 ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 2, AUTHORITY: 4, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags: do; udp: 4096 ;; QUESTION SECTION: ;u5221730329.s1425859199.i5075.vcf100.5a593.z.dotnxdomain.net. IN A ;; ANSWER SECTION: u5221730329.s1425859199.i5075.vcf100.5a593.z.dotnxdomain.net. 1 IN A 199.102.79.186 u5221730329.s1425859199.i5075.vcf100.5a593.z.dotnxdomain.net. 1 IN RRSIG A 5 4 3600 20200724235900 20130729104013 1968 5a593.z.dotnxdomain.net. ghHPoQd71aZtsdH823eW ;; AUTHORITY SECTION: 33d23a33.3b7acf35.9bd5b553.3ad4aa35.09207c36.a095a7ae.1dc33700.103ad556.3a564678.16395067.a12ec545.6183d935.c68cebfb.41a4008e.4f291b87.479c6f9e.5ea48f86.7d1187f1.7572d59a 33d23a33.3b7acf35.9bd5b553.3ad4aa35.09207c36.a095a7ae.1dc33700.103ad556.3a564678.16395067.a12ec545.6183d935.c68cebfb.41a4008e.4f291b87.479c6f9e.5ea48f86.7d1187f1.7572d59a 5a593.z.dotnxdomain.net. 3599 IN NS nsz1.z.dotnxdomain.net. 5a593.z.dotnxdomain.net. 3600 IN RRSIG NS 5 4 3600 20200724235900 20130729104013 1968 5a593.z.dotnxdomain.net. ntxWo5UwL1vQjOHY0z5DCVNDDScnd3Tglgd0PsBRRhk3B9iJ ;; Query time: 1052 msec ;; SERVER: 127.0.0.1#53(127.0.0.1) ;; WHEN: Thu Mar 12 03:59:57 UTC 2015 ;; MSG SIZE rcvd: 937 RSA signed response – 937 octets
  • 29. 2017#apricot2017 $ dig +dnssec DNSKEY org ; <<>> DiG 9.11.0-P1 <<>> +dnssec DNSKEY org ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53713 ;; flags: qr rd ra; QUERY: 1, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags: do; udp: 4096 ;; QUESTION SECTION: ;org. IN DNSKEY ;; ANSWER SECTION: org. 900 IN DNSKEY 256 3 7 AwEAAXxsMmN/JgpEE9Y4uFNRJm7Q9GBwmEYUCsCxuKlgBU9WrQEFRrvA eMamUBeX4SE org. 900 IN DNSKEY 256 3 7 AwEAAayiVbuM+ehlsKsuAL1CI3mA+5JM7ti3VeY8ysmogElVMuSLNsX7 HFyq9O6qhZV org. 900 IN DNSKEY 257 3 7 AwEAAcMnWBKLuvG/LwnPVykcmpvnntwxfshHlHRhlY0F3oz8AMcuF8gw 9McCw+BoC2Y org. 900 IN DNSKEY 257 3 7 AwEAAZTjbIO5kIpxWUtyXc8avsKyHIIZ+LjC2Dv8naO+Tz6X2fqzDC1b dq7HlZwtkaq org. 900 IN RRSIG DNSKEY 7 1 900 20170207153219 20170117143219 3947 org. S6+vpFWz6hfPmvI7zxRa4 org. 900 IN RRSIG DNSKEY 7 1 900 20170207153219 20170117143219 9795 org. iEyiroy02ljtH5hf5RIdf org. 900 IN RRSIG DNSKEY 7 1 900 20170207153219 20170117143219 17883 org. A2hLUswcas+W4h8gZYpA ;; Query time: 475 msec ;; SERVER: 203.133.248.1#53(203.133.248.1) ;; WHEN: Thu Jan 19 23:37:38 UTC 2017 ;; MSG SIZE rcvd: 1625 Another DNSSEC response using RSA RSA signed response – 1,625 octets
  • 30. 2017#apricot2017 Not every application can tolerate large keys… The DNS and DNSSEC is a problem here: – including the digital signature increases the response size – Large responses generate packet fragmentation – Fragments are commonly filtered by firewalls – IPv6 Fragments required IPv6 Extension Headers, and packets with Extension Headers are commonly filtered – DNS over TCP imposes server load – DNS over TCP is commonly filtered If you can avoid large responses in the DNS, you should!
  • 31. 2017#apricot2017 The search for small keys • Large keys and the DNS don’t mix very well: – We try and make UDP fragmentation work reliably (for once!) – Or we switch the DNS to use TCP – Or we look for smaller keys
  • 33. 2017#apricot2017 y2 = x3 + ax + b Enter Elliptic Curves “It is not immediately obvious why verification even functions correctly.” !!
  • 35. 2017#apricot2017 ECDSA vs RSS $ dig +dnssec u5221730329.s1425859199.i5075.vcf100.5a593.y.dotnxdomain.net ; <<>> DiG 9.9.6-P1 <<>> +dnssec u5221730329.s1425859199.i5075.vcf100.5a593.y.dotnxdomain.net ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61126 ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 2, AUTHORITY: 4, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags: do; udp: 4096 ;; QUESTION SECTION: ;u5221730329.s1425859199.i5075.vcf100.5a593.y.dotnxdomain.net. IN A ;; ANSWER SECTION: u5221730329.s1425859199.i5075.vcf100.5a593.y.dotnxdomain.net. 1 IN A 144.76.167.10 u5221730329.s1425859199.i5075.vcf100.5a593.y.dotnxdomain.net. 1 IN RRSIG A 13 4 3600 20200724235900 20150301105936 35456 5a593.y.dotnxdomain.net. IMXSIJ/uKixSAt8GXsh6Lm8CvEOmK5n/5bPgs ;; AUTHORITY SECTION: ns1.5a593.y.dotnxdomain.net. 1 IN NSEC x.5a593.y.dotnxdomain.net. A RRSIG NSEC ns1.5a593.y.dotnxdomain.net. 1 IN RRSIG NSEC 13 5 1 20200724235900 20150301105936 35456 5a593.y.dotnxdomain.net. vM+5YEkAc8B9iYHV3ZO3r9v+RvICn3qfWRfneytLP+nHCOku66X31pzB 5a593.y.dotnxdomain.net. 3598 IN NS ns1.5a593.y.dotnxdomain.net. 5a593.y.dotnxdomain.net. 3600 IN RRSIG NS 13 4 3600 20200724235900 20150301105936 35456 5a593.y.dotnxdomain.net. dzFik3O4HhiEg8TXcn3dCFdCfXCzLj7V0y5qIkCNYXYQ5EfoiWMhUh1s Lb9I0CQk ;; Query time: 1880 msec ;; SERVER: 127.0.0.1#53(127.0.0.1) ;; WHEN: Thu Mar 12 03:59:42 UTC 2015 ;; MSG SIZE rcvd: 527 $ dig +dnssec u5221730329.s1425859199.i5075.vcf100.5a593.z.dotnxdomain.net ; <<>> DiG 9.9.6-P1 <<>> +dnssec u5221730329.s1425859199.i5075.vcf100.5a593.z.dotnxdomain.net ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25461 ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 2, AUTHORITY: 4, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags: do; udp: 4096 ;; QUESTION SECTION: ;u5221730329.s1425859199.i5075.vcf100.5a593.z.dotnxdomain.net. IN A ;; ANSWER SECTION: u5221730329.s1425859199.i5075.vcf100.5a593.z.dotnxdomain.net. 1 IN A 199.102.79.186 u5221730329.s1425859199.i5075.vcf100.5a593.z.dotnxdomain.net. 1 IN RRSIG A 5 4 3600 2020072423590 ;; AUTHORITY SECTION: 33d23a33.3b7acf35.9bd5b553.3ad4aa35.09207c36.a095a7ae.1dc33700.103ad556.3a564678.16395067.a12ec545.6183 33d23a33.3b7acf35.9bd5b553.3ad4aa35.09207c36.a095a7ae.1dc33700.103ad556.3a564678.16395067.a12ec545.6183 5a593.z.dotnxdomain.net. 3599 IN NS nsz1.z.dotnxdomain.net. 5a593.z.dotnxdomain.net. 3600 IN RRSIG NS 5 4 3600 20200724235900 20130729104013 1968 5a593. ;; Query time: 1052 msec ;; SERVER: 127.0.0.1#53(127.0.0.1) ;; WHEN: Thu Mar 12 03:59:57 UTC 2015 ;; MSG SIZE rcvd: 937 ECDSA signed response – 527 octets RSA signed response – 937 octets
  • 37. 2017#apricot2017 ECDSA and OpenSSL • OpenSSL added ECDSA support as from 0.9.8 (2005) • Other bundles and specific builds added ECDSA support later • But deployed systems often lag behind the latest bundles, and therefore still do not include ECC support in their running configuration
  • 39. 2017#apricot2017 Do folk use ECDSA for public keys? $ dig +dnssec www.cloudflare-dnssec-auth.com ; <<>> DiG 9.9.6-P1 <<>> +dnssec www.cloudflare-dnssec-auth.com ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7049 ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 6, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags: do; udp: 4096 ;; QUESTION SECTION: ;www.cloudflare-dnssec-auth.com. IN A ;; ANSWER SECTION: www.cloudflare-dnssec-auth.com. 300 IN A 104.20.23.140 www.cloudflare-dnssec-auth.com. 300 IN A 104.20.21.140 www.cloudflare-dnssec-auth.com. 300 IN A 104.20.19.140 www.cloudflare-dnssec-auth.com. 300 IN A 104.20.22.140 www.cloudflare-dnssec-auth.com. 300 IN A 104.20.20.140 www.cloudflare-dnssec-auth.com. 300 IN RRSIG A 13 3 300 20150317021923 20150315001923 35273 cloudflare-dnssec-auth.com. pgBvfQkU4Il8ted2hGL9o8NspvKksDT8/jvQ+4o4h4tGmAX0fDBEoorb tLiW7mcdOWYLoOnjovzYh3Q0Odu0Xw== ;; Query time: 237 msec ;; SERVER: 127.0.0.1#53(127.0.0.1) ;; WHEN: Mon Mar 16 01:19:24 UTC 2015 ;; MSG SIZE rcvd: 261 Algorithm 13 is ECDSA P-256 Signed response is 261 octets long!
  • 40. 2017#apricot2017 So lets use ECDSA for DNSSEC Or maybe we should look before we leap... – Is ECDSA a “well supported” crypto protocol? * – If you signed using ECDSA would resolvers validate the signature? It’s not that crypto libraries deliberately exclude ECDSA support these days. The more likely issue appears to be the operational practic es of some ISPs who use crufty old software sets to support DNS resolvers which are now running old libraries that predate the incorporation of ECDSA into Open SSL *
  • 41. 2017#apricot2017 Where are the users who can validate ECDSA-signed DNSSEC records? https://stats.labs.apnic.net/ecdsa
  • 42. 2017#apricot2017 And where ECDSA support is missing https://stats.labs.apnic.net/ecdsa
  • 45. 2017#apricot2017 The Top 5 Vietnam ISPs And the extent to which their uses perform DNSSEC validation with ECDSA and RSA
  • 46. 2017#apricot2017 And it if wasn’t for Google… There would probably be no DNSSEC at all! And no ECDSA!
  • 47. 2017#apricot2017 APNIC Labs Report on ECDSA use https://stats.labs.apnic.net/ecdsa