CS201 Tech-Talk Two: Cryptography Michael Hsu CSULA.

Slides:



Advertisements
Similar presentations
the basics cryptography deals with techniques for secure communication in the presence of third parties (adversaries). modern cryptography uses mathematics,
Advertisements

Feb 12, 2002Mårten Trolin1 Applied Cryptography Main goal –Give some practical experience on cryptographic technics used today. –Show how to use existing.
Cryptography The science of writing in secret code.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
Computer Security CS 426 Lecture 3
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Cryptography Week-6.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Cryptography By, Anthony Lonigro & Valentine Mbah.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Feb 11, 2003Mårten Trolin1 Applied Cryptography Main goal –Give some practical experience on cryptographic technics used today. –Show how to use existing.
Modern Cryptographic Topics
Cryptograpy By Roya Furmuly W C I H D F O P S L 7.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
CRYPTOGRAPHY & NETWORK SECURITY Introduction and Basic Concepts Eng. Wafaa Kanakri Computer Engineering Umm Al-Qura University.
Software Security Seminar - 1 Chapter 10. Using Algorithms 조미성 Applied Cryptography.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Cryptology aka Cryptography Tim Cahill Ryan Church.
 Cryptography Melissa Pollis. What is Cryptography?  the science or study of the techniques of secret writing, especially code and cipher systems 
INCS 741: Cryptography Overview and Basic Concepts.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Secret Key Cryptography
Encryption with Keys and Passwords
(Principles of Informatioan security)
Web Applications Security Cryptography 1
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
CIT 380: Securing Computer Systems
Applied Cryptography Main goal
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Privacy & Security.
Identity Theft uses of Cryptography
Public Key Encryption and Digital Signatures
Taehyung Kim HPC Lab. POSTECH
Outline Desirable characteristics of ciphers Uses of cryptography
Cryptography Survey.
Chapter 3:Cryptography (16M)
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Security through Encryption
Encryption with Keys and Passwords
Introduction to Symmetric-key and Public-key Cryptography
Cryptography: Basics (2)
Cryptography Survey.
Cryptography and Network Security
The Secure Sockets Layer (SSL) Protocol
Simple Encryption- Lesson 5
Encryption with Keys and Passwords
Outline Using cryptography in networks IPSec SSL and TLS.
Lesson 7: Simple Encryption
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
DISSERTATION ON CRYPTOGRAPHY.
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
Digital Communications
CSC 774 Advanced Network Security
Fluency with Information Technology Lawrence Snyder
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Security in Distributed Systems
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

CS201 Tech-Talk Two: Cryptography Michael Hsu CSULA

What is Cryptography?  The study of secure communications between two parties in the presence of “adversaries” (bad people)  An intersection of multiple disciplines  Mathematics, computer science, electrical engineering, information technology, etc.  CS480, CS580 covers the topic in detail  You use cryptography almost every single moment of your life  SSL  Encrypted cell phone communications  Computer passwords  E-Commerce

Old Cryptography vs Modern Cryptography  Old Cryptography relies on encryption and the secrecy of the encryption process  Translate content into gibberish using secret methods using ciphers  Encryption  Only people who know how it’s done can decrypt the message  As computers and mathematics progress, through techniques such as frequency analysis, any cipher that relies on secrecy is insecure.  Modern Cryptography  Computationally Secure  Based on the assumptions that some things are hard to do (such as integer factorization)  Cannot be practically broken with practical means even if you know how it works

Example of an Simple Cipher: Caesar Cipher Each letter is replaced by a letter some fixed number of positions down the alphabet Completely insecure

Example of a Complicated Cipher: The Enigma Machine Easily broken using modern computers just by brute-force (trying every single solution) with a 77 bit key, without even considering the human errors made during WW2

Example of a Secure Modern Cryptosystem(For Now): RSA  Widely used  A Public key cryptosystem  The encryption key is public  The decryption key is secret  Based on the assumption that it is difficult to factor the product of two large prime numbers  Key Size up to 4096 bit  Use a cryptographically secure random number generator to generate the prime numbers  More in detail here: 

DO NOT Use Your Own Cryptography Scheme In Real World Applications  There are many things you can do that will make your encryption insecure. Use Algorithms/implementations that are reviewed by experts.  Java has a cryptography library   Use NIST certified Implementations:  NIST is a federal agency that develop/apply/review various standards  Example:   Interesting news: NSA backdoor in a NIST random number generator 

Security is Only as Strong as Your Weakest Link