IoT Security Lecture 3 Notes
IoT Security Lecture 3 Notes
CRYPTOGRAPHY
— Cryptography is the science of encrypting and decryption written communication
— Word comes from Greek work ‘kryptos’ meaning ‘hidden’, and ‘graphia’ meaning
‘writing’
— Cryptography is a method of storing and transmitting data in a form that only those it is
intended for can read and process
— Cryptography is an effective way of protecting sensitive information as it is stored on
media or transmitted through network communications
EXAMPLE
PRINCIPLE
CRYPTOGRAPHY ALGORITHMS
SYMMETRIC KEY
ASYMMETRIC KEY
SYMMETRIC VS ASYMMETRIC KEYS
ASYMMETRIC KEYS
MAN-IN-THE-MIDDLE ATTACK
DIGITAL SIGNATURE
— The receiver still does not know who sent the data. It could have been sent by a
hacker
— so the sender needs to let the receiver know that the data is indeed sent by the sender
— this process is called signing
— Signing is done by attaching a small piece of additional data called the signature
— Hashing is a typical way to make digital signature for the receiver
HASHING
— Hashing is a method of cryptography that converts any form of data into a unique
string of text
— Any piece of data can be hashed, no matter its size or type
— A hash is designed to act as a one-way function, i.e. you can put data into a hashing
algorithm and get a unique string, but if you come upon a new hash, you cannot
decipher the input data it represents
— A unique piece of data will always produce the same hash
— Hashing is a mathematical operation that is easy to perform, but extremely difficult to
reverse
— The difference between hashing and encryption is that encryption can be reversed, or
decrypted, using a specific key
EXAMPLE
— A cryptographic hash function (specifically SHA-1) at work. A small change in the
input (in the word ‘over’) drastically changes the output (digest). This is the so called
avalanche effect
HASHING
— The primary application of hash functions in cryptography is message integrity
— The hash value provides a digital fingerprint of a message’s contents, which ensures
that the message has not been altered by an intruder, virus, or by other means
— Hash algorithms are effective because of the extremely low probability that two
different plaintext messages will yield the same hash value
HOW DIGITAL SIGNATURE WORKS
IoT AUTHENTICATION METHODS
— Public key infrastructure (PKI): a set of roles, policies, and procedures needed to
create, manage, distribute, use, store and revoke digital certificates and manage public-
key encryption
— The purpose of a PKI is to facilitate the secure electronic transfer of information for a
range of network activities such as e-commerce, internet banking, and confidential
email
PUBLIC KEY INFRASTRUCTURE
SUMMARY
— IoT Gateway Solution
— Cryptography
o Symmetric
o Asymmetric keys
o Hashing
— IoT Authentication Methods
o Public key infrastructure