Department of Computer Science Chapter 5 Introduction to Cryptography 2016 - Semester 1.

Slides:



Advertisements
Similar presentations
Cryptography encryption authentication digital signatures
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Principles of Information Security, 2nd edition1 Cryptography.
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Computer Science Lecture 22, page 1 Security in Distributed Systems Introduction Cryptography Authentication Key exchange Readings: Tannenbaum, chapter.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Encryption Coursepak little bit in chap 10 of reed.
Information Systems Security
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Cryptography, Authentication and Digital Signatures
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Cryptography Lynn Ackler Southern Oregon University.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Overview of Cryptography & Its Applications
Encryption CS110: Computer Science and the Internet.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
INCS 741: Cryptography Overview and Basic Concepts.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography and Security Technologies
Cryptography.
PART VII Security.
Fluency with Information Technology Lawrence Snyder
Cryptanalysis Network Security.
Presentation transcript:

Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1

Lecture Outline  Introduction  Methods of cryptography o Symmetric o Asymmetric  Types of ciphers  Cryptographic algorithms  Common types of attacks  Attacks on cryptography.

Introduction  Cryptology –Science of keeping things secret or hiding something. –Includes all areas of cryptography and cryptanalysis.  Cryptography –Is the area of knowledge that deals with creating methods to assure that messages are secretly sent and received.  Cryptanalysis –Encompasses the methodologies to obtain information from encoded messages

Introduction (cont.)  Cryptosystem –Manmade or computer-based systems used to encrypt or transform data for secure transmission or storage. –Designed to provide confidential transmission of data, authentication of sender identity, transmission identity and non-repudiation services between the sender and the receiver. –Upon receipt of an encrypted message, cryptosystems are used to perform decryption or decoding operations to reveal the secret message.  Find out what stenography is and how it works. You can also check out some examples.

Introduction (cont.)

Methods of cryptography  Two main methods or categories of cryptography: 1. Symmetric / Private key 2. Asymmetric / Public key  Symmetric –Uses a single key when encrypting and decrypting data.  Asymmetric –Uses a pair of keys to encrypt and decrypt messages exchanged between the sender and the receiver. –Bothe keys are independent in terms of that one cannot be feasibly computed from the other. –One key has to be public to encrypt while the other is private to decrypt.

Methods of cryptography (cont.)  Hybrid of Symmetric and Asymmetric –A symmetric encryption can be used to encrypt the main body, and the private key is encrypted using a stronger but slower asymmetric process. –This encrypted public can then be securely included within the body of the cipher text.

Kerckhoff’s [1883] Principle  A cryptosystem should be secure even if the attacker knows all the details about the system with the exception of the secret key.

Types of ciphers Block cipher and stream ciphers  Block ciphers –Breaks up the plaintext messages to be transmitted into strings called blocks. –Two main types of block ciphers: –Substitution and transportation –Substitution: Replaces numbers, letters or symbols with other number, letters or symbols –Transportation: Permutes the number, letter or symbols in a block. –Both two types of block ciphers can be combined to form a stronger encryption.

Types of ciphers (cont.)  Stream ciphers –Encrypt individual characters –Makes use of key stream. –Key stream is generated at random or using an algorithm. –The size of the key space is the number of encryption / decryption key pairs possible in a cipher system.

Other cryptographic solutions  Digital signature –Authenticates the sender –Uses public key cryptography –The receiver has to know the sender’s public key and the copy of the digital signature software. –Most popular software examples for security is Pretty Good Privacy (PGP), S/MIME and Rivest Shamir Adleman (RSA)  Virtual Private Network (VPN) –Allows business partners to exchange secure communication between their intranets over the internet. –No one outside VPN can read the data. –VPN allows remote users to access their network using the internet without any fear of security.

Cryptographic algorithms  There is no need to keep encryption algorithms a secret  Algorithms should be published to allow for research to uncover weaknesses  Effective security is maintained through the size (bit length) of the keys as well as by maintaining proper procedures and policies on key distribution.

Common types of Attacks  Known cipher text –the attacker has the cipher text and she tries to decrypt the message by generating all possible keys.  Known plaintext –the attacker has both the cipher text and the plaintext. –We are assuming that the attacker knows the algorithm that was used for the encryption.  Chosen plaintext –The cryptanalyst introduces the plaintext into the system and then watches for how that plaintext will be encrypted.  Chosen cipher text –The attacker decrypt known cipher text to discover key

Attacks on Cryptosystems  Brute force attack  Man-in-the-Middle attack  Correlation attack  Dictionary attack  Timing attack

Attacks on Cryptosystems (cont.)  Brute force attack –Guessing, trying all key possibilities. –Cipher text is repeatedly searched for clues that can lead to the algorithm’s structure.  Man-in-the-Middle attack –Intercepting the transmission of a public key –Attackers attempts to place themselves between the sender and the receiver, intercepting the request of key exchanges. –The attacker sends each participant a valid public key –Digital signatures can prevent this type of attack. The attacker cannot duplicate the signature.

Attacks on Cryptosystems (cont.)  Correlation attack –Attempt to deduce statistical relationships concerning the structure of the key and the output of the cryptosystem. –If factoring of the public key is achieved in reasonable time, allows all messages written with the key to be decrypted.  Dictionary attack –Find plaintext based on common words –Can be successful when the cipher text consists of relatively few characters, e.g. usernames and passwords.  Timing attack –Eavesdropping –Statistical analysis of the users’ typing patterns and keystrokes timings can be used.

Homework Find out how the Vigenere cipher works. Find out how the Caesar cipher works. End