 Cryptography Melissa Pollis. What is Cryptography?  the science or study of the techniques of secret writing, especially code and cipher systems 

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Cryptography encryption authentication digital signatures
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Chapter 11: Cryptography
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
Cryptography The science of writing in secret code.
Secure communication Informatics for economists II Jan Přichystal
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Network Security – Part 1 Spring 2005 V.T. Raja, Ph.D., Oregon State University.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Security Module – Part 1 Spring 2006 V.T. Raja, Ph.D., Oregon State University.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Fmdszqujpo! Encryption!. Encryption  Group Activity 1:  Take the message you were given, and create your own encryption.  You can encrypt it anyway.
Cryptography Week-6.
Cryptanalysis. The Speaker  Chuck Easttom  
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Cryptography, Authentication and Digital Signatures
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Lecture 2: Introduction to Cryptography
Overview of Cryptography & Its Applications
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Cryptography and Its Algorithms Scott Chappell. What is Cryptography?  Definition: the art of writing or solving codes.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
CSCI-235 Micro-Computers in Science Privacy & Security.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Encryption Encryption: Transforms Message so that Interceptor Cannot Read it –Plaintext (original message) Not necessarily text; Can be graphics, etc.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
INCS 741: Cryptography Overview and Basic Concepts.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.
Cryptography.
DISSERTATION ON CRYPTOGRAPHY.
Fluency with Information Technology Lawrence Snyder
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

 Cryptography Melissa Pollis

What is Cryptography?  the science or study of the techniques of secret writing, especially code and cipher systems  Important security countermeasure  Used by corporations, businesses, or any organization that wants to secure it’s information  Use of mathematical operations to protect messages traveling between parties or stored on a computer

Roots of Cryptography  2000 BC  Egyptian practice of hieroglyphics  first known use of a modern cipher was by Julius Caesar (100 BC- 44 BC)  Did not trust messengers communicating with governors  “Caesar Cipher” – shifted each letter four places through the alphabet

Roots of Cryptography  Ancient Chinese – used ideographic nature of their language to hide the meaning of certain words  India – government had secret codes to communicate with network of spies throughout their country  Polybius – invented 5 x 5 Polybius square, which is widely used in many cryptographic systems

Polybius Square cipher

Roots of Cryptography  During World War Two, machines were invented that made the ciphers more complicated and difficult to break, and today, computers have made them even stronger still  Evolved from simple ciphers to corporations possibly looking towards new ways to secure their data, because of cracking abilities

Roots of Cryptography  Started as basic transposition ciphers, which assign each letter of the alphabet a particular value  Example is to assign each letter a progressively higher number, where A=1, B=2, and so forth. Using this formula for example, the word "wiseGEEK", once encrypted, would read " ”  Similar to Polybius Square ciphers

Basic Vocabulary  Terminology:  Plaintext:  This refers to the original unencrypted message  The term was coined in the early days when encryption was mostly text-based  Today, plaintext messages can be:  Images,  Sounds,  Videos, or  A combination of several data formats.

Basic Vocabulary  Encryption and Ciphertext:  Encryption is a cryptographic process that turns plaintext into seemingly random streams of bits called ciphertext  The sender sends this ciphertext to the receiver  Eavesdroppers will not be able to make sense of the ciphertext if they do intercept it  However, the receiver will be able to decrypt the ciphertext, turning it back into the original plaintext

Encryption and Decryption  Encryption and decryption require two things  The first is cipher  Cipher:  This is a specific mathematical process used in encryption and decryption.  there are many ciphers, they all operate differently.  Both sides must have the same cipher for the receiver to be able to decrypt the message.  The second requirement is the key

The Key  The Key:  The key is a random string of 40 to 4,000 bits (ones and zeros)  Longer keys are harder to guess and provide stronger confidentiality  For a given cipher, different keys will generate different cipher texts from the same plaintext

Key Length  If there is a key of length N bits, then there are 2 N possible keys  On average, the cryptographer will have to try half of all keys before succeeding  Each additional bit in the key doubles the time it will take to crack it  Some countries have restricted symmetric key lengths in exported products to 40 bits  This is to preserve the ability of govt. agencies to crack the key when they need to

The Simple Cipher  The Simple Cipher:  This cipher works on letters of the alphabet  There are three columns  The first has the text:  Nowisthetime. (Capitals & spaces removed for simplicity)  The second has the key  The key is a series of numbers between 1 and 26  The third column is the ciphertext to be transmitted

Cryptography  The Simple Cipher: PlaintextKeyCiphertext N4R O8W W15L I16… S23… T16… H3… E9… T12… I20… M6… E25…

Cryptography  The simple Cipher:  In this cipher, the plaintext letter is changed to the letter N places later in the alphabet, where N is the number in the key for that letter  So if a plaintext letter is B and the key value is 2, the ciphertext symbol will be D  When you get to the end of the alphabet and have not exhausted N, you continue with A to get the N count  Note: the most common letter in the English alphabet is E. This letter occurs twice in this example but it has different key values each time.  Using a random key each time makes it impossible to analyze the text by letter frequency

Symmetric Key Encryption  Symmetric Key Encryption Ciphers:  Symmetric key encryption uses many specific ciphers that work in the same general way but function very differently in their details  Communication partners must choose a specific symmetric key encryption cipher in order to communicate securely  Only a few common symmetric key encryption ciphers have been well tested, and it is important to select from these few:  RC4, DES, 3DES, and AES

Data Encryption Standard  DES: The Data Encryption Standard.  Created by the National Bureau of Standards in 1977, now called the National Institute of Standards and Technology (NIST)  It quickly became the most widely used symmetric key encryption method  It is still widely used because:  It has survived everything except brute-force exhaustive search attacks  It is widely available, and because  It is supported by hardware accelerators.

Why Use Cryptography?  Original purpose was encryption for confidentiality  Take legible, readable data, and transforming it into unreadable data for the purpose of secure transmission  Use a key to transform it back into readable data once it reaches final destination

Modern Cryptography  Cryptography concerns itself with four main objectives (cryptosystems):  Confidentiality  Integrity  Non-repudiation  Authentication

Modern Cryptography  Confidentiality: information cannot be understood by anyone unintended to see  Integrity: information cannot be altered without detection  Non-repudiation: creator cannot deny at later state his/her intentions  Authentication: sender/receiver can confirm each other’s identity

Government and Cryptography  Battleground of some of the world's best mathematicians and computer scientists  Do not want certain entities in and out of their countries  Do not want other companies to have access to receive and send hidden information  Threat to national interests

Issues of Cryptography  Sender/receiver can fail to keep the key secret  Eavesdropper may learn the key and read the messages  Only works if company enforces organizational processes that do not compromise the technical strengths of cryptography  Poor communication discipline  Example- Japanese Navy in WWII sent messages when there was little need, giving allied cryptologists a large base of messages to examine

References  Pearson Custom Business Resources. N.p.: Pearson Learning Solutions, Print.  "Brief History of Cryptography." Crypto Challenge. Thwate, Inc., Web. 12 Nov  "What is Cryptography?" wiseGeek. Conjecture Corporation, Web. 12 Nov  In-class notes