CIM3681 - Cryptograhic Concepts Overview1 Cryptographic Concepts Overview Chapter 2- Cryptography and Network Security by Stallings for Details.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Sri Lanka Institute of Information Technology
Making “Good” Encryption Algorithms
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
1 Foundations The problem of providing secret communication over insecure media is the most traditional and basic problem of cryptography.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption Methods By: Michael A. Scott
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Cryptography Week-6.
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Cryptography, Authentication and Digital Signatures
Chapter 20: Network Security Business Data Communications, 4e.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Message Authentication and Hash Functions Chapter 11.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
1 Message Authentication and Hash Functions G 何采宭.
資管三 C 網路建構實習課 加解密概念 3/18. 埃及人的故事 Every Egyptian received two names, which were known respectively as the true name and the good name, or the great name.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
INCS 741: Cryptography Overview and Basic Concepts.
6.033 Quiz3 Review Spring How can we achieve security? Authenticate agent’s identity Verify the integrity of the request Check the agent’s authorization.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
CIT 380: Securing Computer Systems
ISA 400 Management of Information Security
Cryptography Why Cryptography Symmetric Encryption
Encryption
Cryptography.
Security through Encryption
Chapter 6 Cryptography CISSP Study Guide BIS 4113/6113.
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Unit 2: Cryptography & Cryptographic Algorithm
Basic of Modern Cryptography
Basics Of Symmetric Encryption
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

CIM Cryptograhic Concepts Overview1 Cryptographic Concepts Overview Chapter 2- Cryptography and Network Security by Stallings for Details

CIM Cryptograhic Concepts Overview 2 Cryptographic Concepts Overview Basic Concepts Glossary Symmetric Cipher Model – p24 Public-Key Cryptosystems – p260 Message Authentication Codes – p.313 Basic Functionality of Cryptographic algorithms Strengths and weaknesses of cryptographic algorithms, and Effect of key length

CIM Cryptograhic Concepts Overview 3 Basic Concepts History Goals of Cryptography

CIM Cryptograhic Concepts Overview 4 History Caesar Cipher 密碼  Shift of letters American Civil War (Code books for substitution ( 替換 ) and transposition ( 換位 )) Ultra vs Enigma (American Vs German)

CIM Cryptograhic Concepts Overview 5 Goals of Cryptography Confidentiality 機密性  Ensures that a message remains private during transmission between 2 or more parties. Integrity 完整性  Ensures that a message is not altered while in transit Authentication 鑑別 鑑定 鑑認  Verifies the claimed identity of system users and is a major function of cryptosystems Non-repudiation 抗抵賴性 不得否認  Provides assurance to the recipient that the message was actually originated by the sender and not someone masquerading as the sender.

CIM Cryptograhic Concepts Overview 6 Glossary Asymmetric 不對稱的 Encryption : A form of cryptosystem in which encryption and decryption are performed using two different keys, one of which is referred to as the public key and one of which is referred to as the private key. Also known as public-key encryption. Authentication: A process used to verify the integrity of transmitted data, especially a message. Message Authentication Code (MAC) – Cryptographic checksum. Symmetric Encryption: A form of cryptosystem in which encryption and decryption are performed using the same key. Digital Signature: An authentication mechanism that enables the creator of a message to attach a code that acts as a signature. The signature guarantees the source and integrity of the messages. Encryption 加密 : The conversion of plaintext or data into unintelligible form by means of a reversible translation, based on a translation table or algorithm. Also called enciphering. Decryption 解密 : The translation of encrypted text or data (called ciphertext) into original text or data (called plaintext). Also called deciphering.

CIM Cryptograhic Concepts Overview 7 Symmetric Cipher Model 5 ingredients: Plaintext, Encryption algorithm, Secret key, Ciphertext, and Decryption algorithm

CIM Cryptograhic Concepts Overview 8 Symmetric Cipher Model Plaintext 明文 - the original intelligible message Encryption Algorithm ( 加密演算法 處理步驟 ) – performs various substitution and transformations on the plaintext Secret Key 秘密鑰匙 – The input to the encryption algorithm Ciphertext 密文 - the coded message Decryption Algorithm ( 解密演算法 處理步驟 ) – reverse run of the encryption algorithm so as to produce the plaintext

CIM Cryptograhic Concepts Overview 9 Public-Key Cryptosystems Six ingredients: plaintext, encryption algorithm, public and private key, ciphertext, decryption algorithm

CIM Cryptograhic Concepts Overview 10 Public-Key Cryptosystems Public and private key ( 公開和私人的鑰匙 ) : if one is used for encryption, the other is used for decryption Public key – this is placed in a public register or other accessible file

CIM Cryptograhic Concepts Overview 11 Message Authentication Codes (MAC) An authentication techniques ( 鑑別技術 ) involves the use of a secret key to generate a small fixed-size block of data, known as a cryptographic checksum ( 校驗和 ) or MAC that is appended ( 附加 ) to the message.

CIM Cryptograhic Concepts Overview 12 Basic Functionality of Cryptographic algorithms Two basic operations to obscure plaintext messages: confusion ( 混亂 ) and diffusion ( 蔓延 ) Confusion occurs when the relationship between the plaintext and the key is so complicated that an attacker can’t merely continue altering the plain text and analyzing the resulting ciphertext ( 密文 ) to determine the key. Diffusion occurs when a change in the plaintext results in multiple changes spread out throughout the ciphertext.

CIM Cryptograhic Concepts Overview 13 Factors affecting strengths and weaknesses of cryptographic algorithms, and Effect of key length The key size  The longer the key size is, the more difficult to crack the key. The nature ( 本質 )of the algorithm  There is no unbreakable ( 不能破解的 )algorithm. It’s a matter of time. Timing attack ( 適時 )  The life cycle for the key is shorter than the cracking time.

CIM Cryptograhic Concepts Overview 14 Strengths and weaknesses of symmetric algorithm Strength 強度, 抵抗力  Operate at a great speed  Apply in hardware implementation ( 實施 ) to acquire at even high speed Weaknesses  Key distribution is a major problem.  Symmetric key cryptography does not implement nonrepudiation.  The algorithm is not scalable 規模可伸縮性.  Keys must be regenerated ( 再生 ) often

CIM Cryptograhic Concepts Overview 15 Strengths and weaknesses of asymmetric algorithm Strength  The addition of new users requires the generation of only one public/private key pair.  Users can be removed far more easily from asymmetric systems.  Key regeneration is required only when a user’s private key is compromised.  Asymmetric key encryption provides nonrepdudiation.  Key distribution ( 分發 ) is a simple process. Weaknesses  Operate at a slow speed.