Encryption Power Crunch Tyler Morgan. Encryption & Cryptography What it is, methods, and brief description of cryptography.

Slides:



Advertisements
Similar presentations
Chapter 1  Introduction 1 Introduction Chapter 1  Introduction 2 The Cast of Characters  Alice and Bob are the good guys  Trudy is the bad guy 
Advertisements

1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
CS470, A.SelcukSSL/TLS & SET1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Cryptography and Network Security
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Chapter 7 Web Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
SSL AND E- COMMERCE S ECURITY gz2155 Guangwei Zhang.
White-Box Cryptography
Computer and Network Security Mini Lecture by Milica Barjaktarovic.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Secure Design Principles  secure the weakest link  reduce the attack surface  practice defense in depth  minimize privilege  compartmentalize  fail.
Cryptography The science of writing in secret code.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
© 2004, The Technology Firm SSL Packet Decodes From Wikipedia, the free encyclopedia.  Secure Sockets Layer (SSL) is a cryptographic.
Cryptography and Network Security Chapter 17
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
CS1001 Lecture 24. Overview Encryption Encryption Artificial Intelligence Artificial Intelligence Homework 4 Homework 4.
Chapter 8 Web Security.
Introduction to Cryptography
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Engineering Secure Software. Recap  Symmetric key: Benefit: fastest, mathematically the strongest Drawback: distributing the keys  Public key: Benefit:
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
CS 4001Mary Jean Harrold1 Class 9 ŸQuestions about term paper—list of possible topics available on line—proposal due 9/27 ŸCommunications assignment—discuss.
Databases and security continued CMSC 461 Michael Wilson.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
Cryptography By, Anthony Lonigro & Valentine Mbah.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
TLS/SSL - How and Why PCI Flags it but why do we care? By: MadHat Unspecific.
Kerberos. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open source or in supported commercial software.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic.
Can SSL and TOR be intercepted? Secure Socket Layer.
Public Key Encryption, Secure WWW Transactions & Digital Signatures.
Intro to Cryptography Lesson Introduction
CSCI-235 Micro-Computers in Science Privacy & Security.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Cyber Threat Dr. John P. Abraham Professor University of Texas Pan American.
INCS 741: Cryptography Overview and Basic Concepts.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
ENGR 101 Compression and Encryption. Todays Lecture  Encryption  Symmetric Ciphers  Public Key Cryptography  Hashing.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
By Collin Donaldson Man in the Middle Attack: Password Sniffing and Cracking.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Modeling security 1. Models - encryption r Alice and Bob have the same key k r Alice and Bob exchange encrypted messages r Eve wants to get the plaintext.
Effective Password Management Neil Kownacki. Passwords we use today PINs, smartphone unlock codes, computer accounts, websites Passwords are used to protect.
Encryption with Keys and Passwords
Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch.
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
Security through Encryption
Encryption with Keys and Passwords
Encryption with Keys and Passwords
Intrusion.
Presentation transcript:

Encryption Power Crunch Tyler Morgan

Encryption & Cryptography What it is, methods, and brief description of cryptography.

What is Encryption? Using Cryptography Protects data In transit At rest Verification of secured connection

What is Cryptography? Writing or solving codes Uses algorithms Public key Private key

Types of Cryptography One way (Hash) SHA1decrypted-text  f fe087232b517028e2257da0a9db42e9f MD5decrypted-text  4d ac2486f8fcf969e002b3d38 SHA256decrypted-text  a24976d07742d855ccb962a707fd95c087dd bd379e085ba5d96ef58f Two way Caesar cipher using key: 16 decrypted-text  qrpelcgrq-grkg  decrypted-text Base64 decrypted-text  ZGVjcnlwdGVkLXRleHQ=  decrypted-text 3DES Key: 66c9aef783a6adabd86422e80abec09d5f84a3643d64ef01 Init Vector(IV): d decrypted-text  43408aa71e6798beb3ad387374f245f2  decrypted-text

Where is Encryption being used? Military Communications, signals, purchases, etc. Residential Phones, data, and backups Commercial Card purchases and transactions Corporation Secrets, hard drives, data, Intellectual property, etc. Underground Communications, transactions, websites, leaked information, et.

Why is Encryption being used? Value Secretive Identity Tampering Privacy

Encryption Strengths and Weaknesses Where encryption is strong, where it is weak, and how it is considered weak

Weaknesses of Encryption Attacks Leaks Reverse Engineering Quantum Computers Computing Power Available Resources

Types of Attack Brute Force Dictionary Attack Rainbow Tables Every Combo Side Channel Timing Power-monitoring Electromagnetic Acoustic cryptanalysis Differential fault analysis Data remanence Collision Hello Fagergrgegrelgkrlg

HeartBleed Vs. CacheBleed Internet based exploit TLS/SSL openSSL Physical based exploit Complex Not seen in wild More Info

TLS vs SSL By Port Explicit Expects security negotiations SSL 3.0 POODLE Vulnerability Not used by Government Prior to POODLE By Protocol Implicit Insecure then encrypted TLS 1.0 – BEAST attack TLS 1.1 and 1.2 standard

Weak Security vs No Security Protects Value depended Exposure depended Risk Analysis

“ ” If there is a will there a way… About “Unbreakable” Encryption Encryption is able to be broken, all about in what time frame

About “Unbreakable” Encryption Improved Computing Power Assuming strong complex password Successful by 75% of estimated time

Government & Backdoors When and why encryption was banned, about “backdoors”, how governments could effect the future of encryption.

Ban of Exporting Crypto Technology Crypto regulated after WWII Banned until 1992 Gradually eased until 2000 Some restrictions still remained Could be charged with Treason More Information

What is a Backdoor? Not well defined Could be: Deliberate bug inside software Ability to bypass security Ability to record without person knowing Weakening underlying security Ability to access remotely

Why not to Have a Backdoor Compromises security Improves successful hack chances Further problems when not patched

Governments Shaping the Future Ability to perform mass surveillance “unbreakable” encryption easily accessed Strong as the weakest link Trust vs Power Underground market Closed vs Open sourced projects