SlideShare a Scribd company logo
‫קריפטוגרפיה‬
‫מאי‬2018
‫תכנית‬
•‫תיאוריה‬/‫שילון‬ ‫אופק‬
•‫גלובלית‬ ‫תשתית‬/‫בר‬ ‫דן‬-‫אור‬
•‫פרצות‬/‫שרון‬ ‫קונסטנטין‬
1.‫תאוריה‬
‫צפנים‬
•‫החלפה‬:
•:XOR(‫חסכונית‬ ‫החלפה‬)
01000001
A
01011010
Z
‫א‬‫ת‬
‫ב‬‫ש‬
‫ג‬8
‫ד‬
XOR
00011011
XOR
00011011
‫צפנים‬
•‫ערבוב‬,
•‫תוים‬ ‫בין‬,‫ביטים‬,‫אקראיים‬ ‫בלוקים‬ ‫או‬
•‫וערבובים‬ ‫החלפות‬ ‫של‬ ‫שלבים‬ ‫מספר‬,
•‫קודמים‬ ‫שלבים‬ ‫בתוצאות‬ ‫תלויים‬ ‫ערבוב‬ ‫וסדר‬ ‫החלפה‬ ‫מפתחות‬
AES
‫מוצפנת‬ ‫הודעה‬ ‫לפענח‬ ‫בשביל‬,‫צריך‬
‫ולמפענח‬ ‫למצפין‬ ‫משותף‬ ‫סודי‬ ‫ידע‬.
" ==‫מפתח‬."
‫חידה‬:‫המניאק‬ ‫הדוור‬
Alice Bob
Eve
‫חידה‬:‫המניאק‬ ‫הדוור‬
G
KD
‫חידה‬:‫המניאק‬ ‫הדוור‬
D K
G
‫חידה‬:‫המניאק‬ ‫הדוור‬
D K
G
K
‫חידה‬:‫המניאק‬ ‫הדוור‬
D K
G
K
‫חידה‬:‫המניאק‬ ‫הדוור‬
D K
G
K
K
‫ומפתח‬ ‫מנעול‬
•‫נעילה‬=‫הצפנה‬=
‫הודעה‬ ‫על‬ ‫טרנספורמציה‬,‫לעשות‬ ‫יכול‬ ‫אחד‬ ‫שכל‬
•‫פתיחה‬=‫פענוח‬=
‫הפוכה‬ ‫טרנספורמציה‬(‫מוצפנת‬ ‫הודעה‬ ‫על‬),
‫שדורשת‬‫למפענח‬ ‫פרטי‬ ‫ידע‬
‫שימושית‬ ‫תופעה‬
•‫לכל‬a
𝑎5
= 𝑎(𝑚𝑜𝑑 5)
•‫לכל‬a
𝑎4
= 𝑎(𝑚𝑜𝑑 12)
•‫לקבוע‬ ‫ניתן‬m, n‫שלכל‬ ‫כך‬a-
𝑎 𝑚
= 𝑎(𝑚𝑜𝑑 𝑛)
‫דוגמא‬:145 = 537,824
‫דוגמא‬:
144
= 38,416
14 𝑚𝑜𝑑 12 = 2
38,416 𝑚𝑜𝑑 12 = 2
‫שימושית‬ ‫תופעה‬
𝑎 𝑚
= 𝑎(𝑚𝑜𝑑 𝑛)
•‫את‬ ‫נפרק‬ ‫אם‬ ‫ומה‬m‫למכפלה‬?...
𝐸 ∙ 𝐷 = 𝑚
𝑎 𝐸 𝐷
= 𝑎 𝐸∙𝐷 = 𝑎 𝑚
= 𝑎(𝑚𝑜𝑑 𝑛)
Encrypt
Decrypt
RSA
𝑎 𝐸
𝑚𝑜𝑑 𝑛
𝐷
𝑚𝑜𝑑 𝑛
= 𝑎 𝐸∙𝐷 = 𝑎 𝑚
= 𝑎(𝑚𝑜𝑑 𝑛)
Encrypt – anyone who knows E,n can
Decrypt – only the one who knows D can
Public Key: E, n
Private Key: D
RSA-‫דוגמא‬
M(essage) = 6, n=77, E(ncrypt)=37, D(ecrypt)=13
𝑀 𝐸
𝑚𝑜𝑑 𝑛 = 637
𝑚𝑜𝑑 77 = 41 = 𝐶
𝐶 𝐷
𝑚𝑜𝑑 𝑛 = 4113
𝑚𝑜𝑑 77 = 6 = 𝑀
‫אבטחה‬ ‫רמת‬
•‫בעקרון‬‫להסיק‬ ‫ניתן‬
‫את‬D‫מ‬-E+N!
•‫יקח‬‫מליוני‬‫שנות‬
‫מחשוב‬,
‫עבור‬RSA2048
‫נספחים‬
•‫אחרים‬ ‫פתרונות‬ ‫קיימים‬,RSA–‫הפופולרי‬.
•‫ניתן‬‫ב‬ ‫להשתמש‬RSA‫הודעה‬ ‫להצפנת‬,‫להחלפת‬ ‫משמש‬ ‫בפועל‬
‫מפתח‬.
‫דיגיטלית‬ ‫חתימה‬
("I′
m Ofek") 𝐷
𝑚𝑜𝑑 𝑛
𝐸
= ("I′
m Ofek") 𝐸∙𝐷
𝑚𝑜𝑑 𝑛
= "I′
m Ofek"
Sign – Only the one who knows D can
Verify – Anyone who knows E,n can
2. PKI
Public key infrastructure
‫מוגנים‬ ‫ממה‬,‫לא‬ ‫וממה‬?
D K
G
‫מוגנים‬ ‫ממה‬,‫לא‬ ‫וממה‬?
D K
G
‫הבעיה‬:‫התחזות‬( .‫אחת‬ ‫עוד‬ ‫ויש‬)..
What is PKI?
• Public Key Infrastructure
• == “Lock tree”
• CA – Certification Authority
• RA – Registration Authority
• VA – Validation Authority
K O
B
RC
A
What is a Certification Authority?
• Trusted Organizations that issues digital certificates
Chain of trust
Chain of Trust
Certificate application by server (URL)
Citibank
Bad Certificate warning
Firefox
Edge
What is SSL?
• SSL and TLS are Protocols that enables secure communication
• SSL – Secure Socket Layer
• TLS – Transport Layer Security (Later & Safer))
SSL Handshake
• After building a TCP connection, the SSL handshake is started by the
client.
• The client says "Hello" the server
• Which version of SSL/TLS it is running?
• What cipher suites it wants to use?
• What compression methods it wants to use?
• After the basic setup is done, the server sends its certificate.
3.‫והתקפות‬ ‫חולשות‬
‫והתקפות‬ ‫חולשות‬
•‫לקרוא‬ ‫מאפשרת‬ ‫אינה‬ ‫הצפנה‬ ‫מאחורי‬ ‫המתמטיקה‬
‫מוצפן‬ ‫טקסט‬
•‫אבל‬‫לא‬ ‫הפורצים‬‫ידיים‬ ‫מרימים‬!
•‫חלש‬ ‫צופן‬ ‫כגון‬ ‫מתמטיות‬ ‫חולשות‬ ‫ישנן‬
•‫מימוש‬ ‫חולשות‬ ‫גם‬ ‫ישנן‬
•‫ים‬ ִ‫ל‬ ָ‫ק‬ ְּ‫ת‬ ‫גם‬ ‫ישנם‬(‫באגים‬)‫חומרה‬ ‫של‬ ‫וגם‬ ‫מתכנתים‬ ‫של‬
‫ומתן‬ ‫משא‬–‫שלום‬ ‫אומר‬ ‫הלקוח‬
‫ומתן‬ ‫משא‬–‫שלום‬ ‫אומר‬ ‫השרת‬
‫ומתן‬ ‫משא‬–‫מפתחות‬ ‫החלפת‬
‫פועם‬ ‫לב‬(Heartbeat)
•RFC 6520 - Transport Layer Security (TLS) and Datagram Transport
Layer Security (DTLS) Heartbeat Extension
•‫תעבורה‬ ‫אין‬ ‫כאשר‬ ‫קורה‬ ‫מה‬?
•‫חי‬ ‫עדיין‬ ‫השני‬ ‫שהצד‬ ‫בודקים‬ ‫איך‬?
•‫מדי‬ ‫בזבזני‬ ‫אבל‬ ‫שוב‬ ‫ומתן‬ ‫משא‬ ‫לנהל‬ ‫אפשר‬.
•‫פתרון‬:‫ל‬ ‫הרחבה‬TLS‫מחובר‬ ‫עדיין‬ ‫שני‬ ‫הצד‬ ‫אם‬ ‫זמן‬ ‫כמה‬ ‫כל‬ ‫דוגמת‬ ‫אשר‬!
•‫מחשב‬ ‫ובעבודת‬ ‫בתעבורה‬ ‫חיסכון‬.
‫מדמם‬ ‫לב‬(Heartbleed)–‫שלב‬1
https://xkcd.com/1354/
‫מדמם‬ ‫לב‬(Heartbleed)–‫שלב‬2
https://xkcd.com/1354/
‫מדמם‬ ‫לב‬(Heartbleed)–‫שלב‬3
https://xkcd.com/1354/
‫מדמם‬ ‫לב‬(Heartbleed)–‫שלב‬4
https://xkcd.com/1354/
‫מדמם‬ ‫לב‬(Heartbleed)–‫שלב‬5
https://xkcd.com/1354/
‫מדמם‬ ‫לב‬(Heartbleed)–‫שלב‬6
https://xkcd.com/1354/
‫מדמם‬ ‫לב‬–‫טכני‬ ‫קצת‬
‫בגודל‬ ‫תשובה‬ ‫מבקשים‬
‫עצמה‬ ‫מהתשובה‬ ‫גדול‬ ‫יותר‬
‫מיועד‬ ‫שלא‬ ‫מידע‬ ‫ומקבלים‬
‫עבורנו‬.
‫ב‬ ‫ל‬ֶּ‫ק‬ ֶּ‫ת‬OPENSSL
unsigned int payload;
/* Read type and payload length first */
hbtype = *p++;
n2s(p, payload);
pl = p;1
….
/* Enter response type, length and copy payload */
*bp++ = TLS1_HB_RESPONSE;
s2n(payload, bp);
memcpy(bp, pl, payload); ‫מקום‬ ‫בשום‬ ‫גודל‬ ‫בדיקת‬ ‫אין‬!
‫ב‬ ‫תיקון‬OPENSSL
unsigned int payload;
/* Read type and payload length first */
if (1 + 2 + 16 > s->s3->rrec.length)
return 0; /* silently discard */
hbtype = *p++;
n2s(p, payload);
if (1 + 2 + payload + 16 > s->s3->rrec.length)
return 0; /* silently discard per RFC 6520 sec. 4 */
‫תוקן‬ ‫ומתי‬ ‫נמצא‬ ‫מתי‬
•2012–‫הוצא‬RFC 6520‫לב‬ ‫לפעימות‬
•2012–‫יצא‬OPENSSL 1.0.1‫הבעייתי‬ ‫המימוש‬ ‫עם‬
•2014‫מרץ‬ ‫סוף‬–‫דווחה‬ ‫הבעיה‬
•2014‫אפריל‬ ‫תחילת‬–‫בגרסת‬ ‫תוקנה‬ ‫הבעיה‬OPENSSL
1.0.1g
•‫לכולם‬ ‫רלוונטית‬ ‫בעיה‬:‫שרתים‬,‫קצה‬ ‫מחשבי‬,‫מכשירים‬
‫סלולריים‬,‫והתקנים‬ ‫נתבים‬‫אחרים‬.
•‫עובדת‬ ‫התקיפה‬‫בשני‬‫הכיוונים‬!
‫בעולם‬ ‫שימוש‬–‫עם‬ ‫בעיה‬YAHOO
https://twitter.com/markloman/status/453502888447586304/
Do not login to Yahoo! The OpenSSL bug
#heartbleed allows extraction of usernames and
plain passwords!
‫אחרות‬ ‫והתקפות‬ ‫חולשות‬
• DROWN (Decrypting RSA with Obsolete and Weakened eNcryption) (CVE-2016-0800)
• POODLE (Padding Oracle On Downgraded Legacy Encryption) (CVE-2014-3566)
• BEAST (The Browser Exploit Against SSL/TLS) (CVE-2011-3389)
• CRIME (Compression Ratio Info-leak Made Easy) (CVE-2012-4929)
• BREACH (Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext)
(CVE-2013-3587)
• Heartbleed (CVE-2014-0160)
• Logjam
• FREAK ("Factoring RSA Export Keys")
• ROBOT (Return Of Bleichenbacher's Oracle Threat)
‫שימושיים‬ ‫קישורים‬
• https://www.acunetix.com/blog/articles/tls-vulnerabilities-attacks-
final-part/
• https://security.stackexchange.com/questions/55343/how-to-
explain-heartbleed-without-technical-terms

More Related Content

Featured

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
Skeleton Technologies
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
GetSmarter
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
Project for Public Spaces & National Center for Biking and Walking
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
DevGAMM Conference
 

Featured (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

מבוא לקריפטוגרפיה

Editor's Notes

  1. להקפיד על הצבעים לוותר על מודולו?
  2. עץ המנעולים!
  3. עד כמה שידוע כיום
  4. משפט פרמה הקטן משפט אוילר
  5. RSA: Rivest Shamir Adelman, 1977
  6. P=7 Q=11 N = 77 Phi = 6*10=60
  7. היצירה של N כוללת הכפלה של שני ראשוניים גדולים ההסקה של D כוללת פירוק של N לראשוניים, פעולה יקרה כיום
  8. Public Key Infrastructure Method of asserting the identity and validity of a person (or entity) that you have not previously met or interacted with. Uses certificates containing identity information and public keys. Certificates are issued by CA – Certification Authorities PKI accomplishes this by defining a central authority who is mutually trusted by all users of the system.  
  9. Public Key Infrastructure Method of asserting the identity and validity of a person (or entity) that you have not previously met or interacted with. Uses certificates containing identity information and public keys. Certificates are issued by CA – Certification Authorities PKI accomplishes this by defining a central authority who is mutually trusted by all users of the system.  
  10. Trusted Organization that issues SSL Certificates Authentic because the CA has verified the identity CAs issue millions of Digital Certificates each year, and these certificates are used to protect information, encrypt billions of transactions, and enable secure communication. CA must meet detailed criteria to be accepted as a member
  11. Digital Certificate is an electronic document used to prove the ownership of a public key. Certificate includes information about the key, information about the identity of its owner Certificate contains the digital signature the VA that has verified the certificate's 
  12. SSL a protocol that operates directly on top of TCP When using SSL/TLS correctly, all an attacker can see on the cable is which IP and port you are connected to, roughly how much data you are sending, and what encryption and compression is used. He can also terminate the connection, but both sides will know that the connection has been interrupted by a third party. Attacker will not be able to decipher that data payload without the private key
  13. אבל ישנו מימוש מסויים של Heartbeat מOpenSSL שיש בעייה
  14. להצביע במסך Tweet מ 2012
  15. הכל ניתן לפריצה. מחשבי על – התפתחות מאפשרת bruteforce יותר מהיר בעתיד . חולשות לא בהכרח נותנות טקסט גלוי , אבל מסייעות לקבל אותו.