How Secure Works Stephen Smith | November 27, 2013.

Slides:



Advertisements
Similar presentations
Cryptography The science of writing in secret code.
Advertisements

Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Internet Technology: A Sampler Ramesh Johari Massachusetts Institute of Technology
Cryptography Prof. Seth D. Bergmann Rowan University Computer Science.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Facilities for Secure Communication The Internet is insecure The Internet is a shared collection of networks. Unfortunately, that makes it insecure An.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Half a secret Linguistics 294L Modern uses of cryptography Linguistics 294L Modern uses of cryptography.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
The Secure Sockets Layer (SSL) Protocol
CS/ECE 578 Cyber-Security Dr. Attila Altay Yavuz
Outline The basic authentication problem
Data security OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013.
Digital Signatures.
Public Key Cryptography
Cryptography: an overview
Cryptography: an overview
Symmetric and Asymmetric Encryption
Applied Cryptography Main goal
Version B.00 H7076S Module 3 Slides
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
Cryptography Reference: Network Security
Cryptography Reference: Network Security
Security.
Fundamental Concepts in Security and its Application Cloud Computing
Encryption
Topic 1: Data, information, knowledge and processing
Outline Designing secure protocols Basic protocols Key exchange
BP5 – encryption - Fun gym
COMPUTER PRIVACY.
NET 311 Information Security
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
Public Key Cryptography
Pooja programmer,cse department
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
BP5 – encryption - Fun gym
Security.
CS Introduction to Operating Systems
Recap unit 2 Review cipher systems, RSA Digital signatures
The Secure Sockets Layer (SSL) Protocol
Cryptography: an overview
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Engineering Secure Software
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
COMPSCI210 Recitation 5 Oct 2012 Vamsi Thummala
Cryptography Reference: Network Security
Computer Security CIS326 Dr Rachel Shipsey.
Install AD Certificate Services
Cybersecurity and Data Encryption
Digital Signatures Reference: Pfleeger , Charles P., Security in Computing, 2nd Edition, Prentice Hall, /7/2019 Ref: Pfleeger96, Ch.4.
Diffie/Hellman Key Exchange
Public – Private Key Cryptography
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Outline Designing secure protocols Basic protocols Key exchange
Introduction to Cryptography
Computer Security CIS326 Dr Rachel Shipsey.
Chapter 5 Computer Security
Key Exchange With Public Key Cryptography
Presentation transcript:

How Secure Works Stephen Smith | November 27, 2013

Outline  Why Should I Secure My ?  Encryption  Authentication  Key Exchange  Summary  Questions

Why Should I Secure My ? AKA “Why should you not?”

Why Should I Secure My ?  contains some of our most closely guarded secrets  What we order from Amazon  What newsletters we subscribe to  Who we correspond with, and what we say to them  It’s perfectly fine to be an open book  But why not demand control of who you share with?

Why Should I Secure My ?  In business, the case is even more obvious  Competitors want your data Subject: Totally Awesome Idea We Sure Hope Nobody Steals Subject: Insider Knowledge That Would Totally Tank Our Stock If It Were Released Today Subject: Current Salary And Benefits Package For Employee Our Competitors Want To Poach

Encryption Making sure the message can’t be read

Encryption  Two different types  Symmetric and Public-Key  Symmetric  What most people think of  Password A to encrypt, Password A to decrypt  The problem with using this for  Everyone who can encrypt messages to you can also decrypt every message sent to you  Bad things.

Public-Key Cryptography  Message is encrypted with public key  Closing the padlock  Message is decrypted with private key  Literal key to lock  Many can encrypt  Only one can decrypt

Authentication Making sure the message REALLY came from them

Authentication  Reverse of encryption process  Encrypt with private key  Decrypt with public key  Adds no security  But proves you touched the message

Key Exchange AKA, “How do you send the keys securely, smart guy?”

Key Exchange  If encryption depends on keys, how do you send the keys?  Encrypt them, of course!  Wait…

Diffie-Hellman-Merkle Protocol  We each buy two jugs of paint from Home Depot  One common colour we’ve agreed on  One secret colour only we know about  We go home, mix the two colours, and send half our mixture to each other  We then mix each half together in our own houses  We are now guaranteed to have the same colour, without ever communicating it  This is why I love crypto. So cool!

Summary

 Message is encrypted with receiver’s public key  Message is signed with sender’s private key  Message is transmitted  Message authenticity and integrity are checked with sender’s public key  Message is decrypted with receiver’s private key

Questions?