Encryption Power Crunch Tyler Morgan
Encryption & Cryptography What it is, methods, and brief description of cryptography.
What is Encryption? Using Cryptography Protects data In transit At rest Verification of secured connection
What is Cryptography? Writing or solving codes Uses algorithms Public key Private key
Types of Cryptography One way (Hash) SHA1decrypted-text f fe087232b517028e2257da0a9db42e9f MD5decrypted-text 4d ac2486f8fcf969e002b3d38 SHA256decrypted-text a24976d07742d855ccb962a707fd95c087dd bd379e085ba5d96ef58f Two way Caesar cipher using key: 16 decrypted-text qrpelcgrq-grkg decrypted-text Base64 decrypted-text ZGVjcnlwdGVkLXRleHQ= decrypted-text 3DES Key: 66c9aef783a6adabd86422e80abec09d5f84a3643d64ef01 Init Vector(IV): d decrypted-text 43408aa71e6798beb3ad387374f245f2 decrypted-text
Where is Encryption being used? Military Communications, signals, purchases, etc. Residential Phones, data, and backups Commercial Card purchases and transactions Corporation Secrets, hard drives, data, Intellectual property, etc. Underground Communications, transactions, websites, leaked information, et.
Why is Encryption being used? Value Secretive Identity Tampering Privacy
Encryption Strengths and Weaknesses Where encryption is strong, where it is weak, and how it is considered weak
Weaknesses of Encryption Attacks Leaks Reverse Engineering Quantum Computers Computing Power Available Resources
Types of Attack Brute Force Dictionary Attack Rainbow Tables Every Combo Side Channel Timing Power-monitoring Electromagnetic Acoustic cryptanalysis Differential fault analysis Data remanence Collision Hello Fagergrgegrelgkrlg
HeartBleed Vs. CacheBleed Internet based exploit TLS/SSL openSSL Physical based exploit Complex Not seen in wild More Info
TLS vs SSL By Port Explicit Expects security negotiations SSL 3.0 POODLE Vulnerability Not used by Government Prior to POODLE By Protocol Implicit Insecure then encrypted TLS 1.0 – BEAST attack TLS 1.1 and 1.2 standard
Weak Security vs No Security Protects Value depended Exposure depended Risk Analysis
“ ” If there is a will there a way… About “Unbreakable” Encryption Encryption is able to be broken, all about in what time frame
About “Unbreakable” Encryption Improved Computing Power Assuming strong complex password Successful by 75% of estimated time
Government & Backdoors When and why encryption was banned, about “backdoors”, how governments could effect the future of encryption.
Ban of Exporting Crypto Technology Crypto regulated after WWII Banned until 1992 Gradually eased until 2000 Some restrictions still remained Could be charged with Treason More Information
What is a Backdoor? Not well defined Could be: Deliberate bug inside software Ability to bypass security Ability to record without person knowing Weakening underlying security Ability to access remotely
Why not to Have a Backdoor Compromises security Improves successful hack chances Further problems when not patched
Governments Shaping the Future Ability to perform mass surveillance “unbreakable” encryption easily accessed Strong as the weakest link Trust vs Power Underground market Closed vs Open sourced projects