1-way String Encryption Rainbows (a.k.a. Spectrums) Public Private Key Encryption HTTPS Encryption.

Slides:



Advertisements
Similar presentations
SECURE SITES. A SECURE CONNECTION TERMS Secure Sockets Layer (SSL) An older Internet protocol that allows for data transmission between server and client.
Advertisements

SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
CSE 461 Section. “Transport Layer Security” protocol Standard protocol for encrypting Internet traffic Previously known as SSL (Secure Sockets Layer),
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Securing Network Communication. 2 Security Issues in Communication Privacy  Anyone can see content Integrity  Someone might alter content Authentication.
Netprog: Cryptgraphy1 Cryptography Reference: Network Security PRIVATE Communication in a PUBLIC World. by Kaufman, Perlman & Speciner.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Security & Encryption Thomas Fenske & Joseph Minter.
Secure Sockets Layer. SSL SSL is a communications protocol layer which can be placed between TCP/IP and HTTP It intercepts web traffic and provides security.
Mar 19, 2002Mårten Trolin1 This lecture On the assignment Certificates and key management SSL/TLS –Introduction –Phases –Commands.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Electronic Transaction Security (E-Commerce)
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Network Security Secure hypertext transfer protocol (https) Cookies Public Key Cryptography.
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
CSCI 6962: Server-side Design and Programming
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
HOW ACCESS TO WWW Student Name : Hussein Alkhaldi.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Learning Aid Type Text Page 206 MGS GROUP C Svitlana Panasik.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
David Evans CS150: Computer Science University of Virginia Computer Science Class 31: Cookie Monsters and Semi-Secure.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.
Types of Electronic Infection
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
All Input is Evil (Part 1) Introduction Will not cover everything Healthy level of paranoia Use my DVD Swap Shop application (week 2)
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Data Encryption using SSL Topic 5, Chapter 15 Network Programming Kansas State University at Salina.
System Security: Cryptography Technologies CPE Operating Systems
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
Payment Systems Unit 34: E-commerce M2 - Compare two different payment systems used in e-commerce systems.
Public Key Encryption.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
PHP Secure Communications Web Technologies Computing Science Thompson Rivers University.
Joshua Fuller. - Passwords keep your information private - Never tell your password to ANYONE - Change your password regularly Basic Security.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Secure Socket Layer SSL and TLS. SSL Protocol Peer negotiation for algorithm support Public key encryptionPublic key encryption -based key exchange and.
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Secure Socket Layer Protocol Dr. John P. Abraham Professor, UTRGV.
Chapter 40 Internet Security.
Tonga Institute of Higher Education IT 141: Information Systems
Digital Signatures.
PHP Secure Communications
Encryption 1-way String Encryption Rainbows (a.k.a. Spectrums)
Chapter 8 Building the Transaction Database
Using SSL – Secure Socket Layer
Security.
Uses Of Encryption Algorithms
Topic 5: Communication and the Internet
Web Systems Development (CSC-215)
Tonga Institute of Higher Education IT 141: Information Systems
Tonga Institute of Higher Education IT 141: Information Systems
Security.
Unit 8 Network Security.
Electronic Payment Security Technologies
Q/ Compare between HTTP & HTTPS? HTTP HTTPS
Presentation transcript:

1-way String Encryption Rainbows (a.k.a. Spectrums) Public Private Key Encryption HTTPS Encryption

String Encryption You have an account on facebook, LinkedIn, YouTube etc. Your login: Your password is : bosco If this data was stored in a database, it might look like:

String Encryption The problem is if any employee at Facebook or someone who hacks into the server, got a dump of this data, they would have pairs of millions of people. People typically user their address as their userid and also do not have a many different passwords for every website they have an account on (banks, stores, stubhub, facebook, linkedIn, Google)

String Encryption - Algorithm Simple Encryption Algorithm - For each letter in the word - Change it to the next letter in the alphabet (z  a) Example 1) unencrypted password = “abc” encrypted password = “bcd” Example 2) unencrypted password = “bosco” encrypted password = “cptdp”

Database with Encrypted passwords Now the database would look like

Encryption Algorithm’s Rainbow Suppose you don’t know what the encryption algorithm does but you have access to a function that can encrypt words. encrypt(“bosco”)  “cptdp” You could compute the encrypted word for every possible unencrypted word. This computation is sometimes called the Rainbow or Spectrum of the Encryption Algorithm.

Rainbow Write a program that creates every string from 1 to 8 character of the alphabet (not numbers or any other character), then inputs them into the encryption algorithm and record the pairs in a massive table

Time to calculate the Rainbow For our example where only 8 alphabetic characters can be used, there are over 217 Trillion combinations of possible inputs that we would have to encrypt to calculate the Rainbow

Algorithm for generating Rainbow Rainbow generating algorithm looks like for every word in (a  zzzzzzzz) encryptedWord = EncryptionAlgorithm(word) writeToRainbow (word, encryptedWord)

Time and Space for Rainbow Suppose you have the latest processor 10 gigahertz (approx. 10 billion instructions/second) and you have 217 trillion instructions to do, how long would it take? 217 trillion/10 billion = 21,700 seconds = 6 hours ***Of course months would be more realistic Each pair is 16 characters and there are 217 trillion of them so [(217 trillion) * 16]/1 Gigabyte = 3 Terrabytes

Key (a.k.a Salt) Encryption The User provided an unencrypted password The website provides a salt (some word) Example ) password = “bosco” salt = “12345” Encrypt (“bosco”,”12345”) = “cqvgt” This required 2 things to encrypt a password: 1) The password (only known to the user) 2) The salt (only known to the website) A hacker would have to compute the algorithm rainbow for every salt possible

3 Encryption algorithms in PHP MD5 SHA-1 CRYPT(password, salt)

LinkedIn (2012 unsalted SHA-1) In 2012, hackers (not known if it was an inside job) go into the database of LinkedIn and dumped the password table which contained 6.5 encrypted passwords. Inputting these encrypted passwords into a SHA-1 unsalted rainbow generated table, showed English-like words being produced as unencrypted passwords.

2 Way (encryption/decryption) This simple algorithm of adding 1 letter value is decryptable. That is, if you know the encryption algorithm, since it is reversible, you know how to decrypt and encrypted word. It would be better if the encryption was one way.

1 way Encryption Simple but bad Example) Algorithm) take numerical value of all inputs and multiply them together and store the result Password = “cat” encrypted password = 3*1*20 = 60 What’s the encrypted password for “feb” ? = 6*5*2 = 60 also Even if you know the algorithm you could decrypt 60  “cat”

Public-Private Key Encryption A Encryption/Decryption public algorithm that all encrypted messages sent to you can only be decrypted by you. You ask the public algorithm for a public key and a private key You know your public and private key values. You publish your public key to anyone who wants to send an encrypted message to you. They encrypt a message using the public algorithm and your public key. You receive the message and decrypt it using you private key.

Public-Private Key Example You request a public key and private key and you get Public key: “+60+20” and Private key “-C” You publish your public key: “+60+20” on you website Someone wants to send you “bosco” encrypted so only you can see: They: Encrypt(“bosco”,“+60+20” ) = “ervfr”. You: Decrypt(“ervfr”, “-C”) = “bosco” Encryption: (+60/+20) = +3 so increment all letters by +3 Decryption –C = -3 so decrement letters by 3 There is a mathematical correlation between the public key and private key Public key: “+30-3” and Private Key: “+J” would be a valid combination for this encryption/decryption algorithm

HTTP: HyperText Transfer Protocol When you go to a website using the URL Communication is not encrypted. If a form asked you for and password and you fill it in and hit enter, a message something like will be sent along all connections from you to the website server (i.e. the coffee shop wifi you are connected) and anyone dumping data will be able to read it. To: From: IP address: port:3000 Message: password(bosco)

HTTPS: (a.k.a. Secure HTTP) When you go to a website using the URL Communication is encrypted. If a form asked you for and password and you fill it in and hit enter, a message something like Using public key private key encryption, the server sends your web browser it’s public key and encryption algorithm (you don’t even realize it) and your messages are encrypted with it and sent back to the server where the server decrypts it with the servers private key. To: From: IP address: port:3000 Message: fnbjm(hfpshf#tfjogfme.dpn) qbttxpse(cptdp)

SSL (Secure Socket Layer) SSL is the predecessor to TLS (Transport Layer Security) Certificate Authorities (CA’s) issue public/private …