ENGR 101 Compression and Encryption. Todays Lecture  Encryption  Symmetric Ciphers  Public Key Cryptography  Hashing.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Network Security: Lab#2 J. H. Wang Apr. 28, 2011.
DNSSEC Cryptography Review DNSSEC Tutorial February 21, 2011 Hong Kong Will.i.am Hervey Allen.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
NSRC Workshop Some fundamental security concerns... Confidentiality - could someone else read my data? Integrity - has my data been changed? Authentication.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Services and Security through Cryptography ccTLD Workshop November 27, 2007 Amman, Jordan Hervey Allen.
Security through Cryptography PacNOG 6 Hervey Allen.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Cryptography Basic (cont)
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
CSCI 6962: Server-side Design and Programming
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography, Authentication and Digital Signatures
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
SECURITY Chapter 7.3 – 7.5 Presentation by Deepthi Reddy.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Lecture 2: Introduction to Cryptography
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Hervey Allen Phil Regnauld 15 June 2009 Papeete, French Polynesia DNSSEC Tutorial: Public / Private.
Security through Cryptography SA-E Workshop May 13, 2009 Cairo, Egypt Hervey Allen.
Symmetric Cryptography
Cryptography Basics and Symmetric Cryptography
The Secure Sockets Layer (SSL) Protocol
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

ENGR 101 Compression and Encryption

Todays Lecture  Encryption  Symmetric Ciphers  Public Key Cryptography  Hashing

2 Motivating stories  papers-a-win-for-encryption-backers papers-a-win-for-encryption-backers  help-crack-iphone/ help-crack-iphone/

Encryption  We start with plain text. Something you can read.  We apply a mathematical algorithm to the plain text.  The algorithm is the cipher.  The plain text is turned in to cipher text.  Almost all ciphers were kept secret until recently.  Creating a secure cipher is HARD.

Symmetric Cipher  Same key is used to both encrypt and decrypt

Keys  To create cipher text and turn it back to plain text we apply a key to the cipher.  The security of the cipher text rests with the key.  This is a critical point. If someone gets your key, your data is compromised.  This type of key is called a shared key.  This type of cipher system is efficient for large amounts of data.  This is asymmetric cipher.

Examples of Symmetric Ciphers  DES- 56 bit key length, designed by IBM and the NSA  3DES- effective key length 112 bits  AES(Advanced Encryption Standard) - 128to 256bit key length  Blowfish- 128 bits, optimized for fast operatio non 32-bit microprocessors  IDEA- 128 bits, patented (requires a license for commercial use)

Features of Symmetric Ciphers  Fast to encrypt and decrypt, suitable for large volumes of data  A well-designed cipher is only subject to brute-force attack; the strength is therefore directly related to the key length.  Current recommendation is a key length of around 128bits, for data protection around20-30years.  See for a good and fun discussion.  Problem - how do you distribute the keys?

Public Key Cryptography  We generate a cipher key pair. One key is the private key, the other is the public key.  The private key remains secret and should be protected.  The public key is freely distributable. It is related mathematically to the private key, but you cannot (easily) reverse engineer the private key from the public key.  Use the public keyt o encrypt data.  Only someone with the private key can decrypt.

Public Key Cryptography  One key is used to encrypt the document, a different key is used to decrypt it.

Public Key Features  Symmetric ciphers (one private key) are much more efficient.  Public Key Cryptography requires larger keys (3248 bits for data protection around years)  Public Key Infrastructure (PKI) and Certification Authorities (CAs) used to distribute public keys  Used in many security protocols: SSL, TLS, SSH,etc  Examples include: RSA,ElGamal, Pallier, …

Hybrid Systems  Symmetric Ciphers are faster and the keys can be shorter so, we do this:  Generate a one-time shared key.  Encrypt the key using a public key.  Send it to the other side, decrypt the one- time key.  Start transmitting data using the symmetric cipher.

Hybrid Systems  Use a symmetric cipher with a random key (the "session key"). Use a public key cipher to encrypt the session key and send it along with the encrypted document.

One Way Hashing Functions  A mathematical function that generates a fixed length result regardless of the amount of datayou pass through it. Generally very fast.  You cannot generate the original data from the fixed- length result.  Hopefully you cannot find two sets of data that produce the same fixed-length result. If you do this is called a collision.

Hashing  Hashing the document gives a short fixed length message digest(checksum). Not possible to go back from the digest to the original document.

Hashing Function Examples  Unix crypt() function, based on DES, 56 bits (not secure)  MD5(Message Digest 5) bit hash (deprecated)  SHA1(Secure Hash Algorithm) - 160bits  SHA-256 SHA-512– both part of SHA2 family  SHA3– currently under development

What Use is This  You can run many megabytes of data through a hashing function, but only have to check 160* bits of information. A compact and unique document signature.  You can generate a password hash for your password.  Then when someone logs on, hash the password they give you and compare it to your list of hashed passwords.  If someone gets your password hash, they still must know your password to logon as you.  Used in digital signatures

Summary Encryption  Symmetric Ciphers  Public Key Cryptography  Hashing