(Principles of Informatioan security)

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Principles of Information Security, 2nd edition1 Cryptography.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
GROUP 11 Dhita Puspita Larasati Topan Firmansyah Dimas Kurnia Ayatullah Galih Purwanti Rahma Aprilia Handayani
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Cryptography Lynn Ackler Southern Oregon University.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Computer Security (CS4800)
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Introduction (Pendahuluan)  Information Security  Criptography.
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CS201 Tech-Talk Two: Cryptography Michael Hsu CSULA.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Secret Key Cryptography
Symmetric Cryptography
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Data Security B. R. Chandavarkar Asst. Prof., CSE Dept., NITK, Surathkal. brc.nitk.ac.in.
Cryptography Why Cryptography Symmetric Encryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Identity Theft uses of Cryptography
Introduction Of System Security
Computer and Data Security 4th Class
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter-2 Classical Encryption Techniques.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography.
Outline Some Basic Terminology Symmetric Encryption
- Stream Cipher and Block Cipher - Confusion & Diffusion
Cryptography Basics and Symmetric Cryptography
Chapter 3:Cryptography (16M)
PART VII Security.
Security in Network Communications
NET 311D Information Security
csci5233 computer security & integrity (Chap. 4)
Cryptography and Network Security
DISSERTATION ON CRYPTOGRAPHY.
Cryptography and Cryptanalysis
Digital Communications
Unit 2: Cryptography & Cryptographic Algorithm
Basic of Modern Cryptography
Computer Security Chapter Two
Basics Of Symmetric Encryption
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

(Principles of Informatioan security) CRYPTOGRAPHY (Principles of Informatioan security)

(Principles of Informatioan security) CRYPTOGRAPHY (Principles of Informatioan security)

CRYPTO GRAPHIA SECRET WRITING

definition Art and science of keeping message secure (Willliam Stallings) The art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text. (Vangie Beal) http ://www.businessdictionary.com/definition/cryptography.html

Decryption techniques data Encryption & Decryption techniques

What is Data Encryption?

Definition Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it https://digitalguardian.com/blog/what-data-encryption

Goal https://digitalguardian.com/blog/what-data-encryption The purpose of data encryption is to protect digital data confidentiality as it is stored on computer systems and transmitted using the internet or other computer networks. https://digitalguardian.com/blog/what-data-encryption

Process ENCRYPTION Plaintext Chipertext DECRYPTION

Availability Confidentiality Integrity

Encryption to be problem solver

Various of Cryptosystems

TRADITIONAL CHIPER CAESAR CHIPER

TRADITIONAL CHIPER CAESAR CHIPER

TRADITIONAL CHIPER CAESAR CHIPER

TRADITIONAL CHIPER CAESAR CHIPER

TRADITIONAL CHIPER MONOALPHABETIC & POLYALPHABETIC

TRADITIONAL CHIPER TRANSPOSITION CHIPER

MODERN CRYPTOGRAPHY ECB Ci = Ek (Pi) Pi = Dk (Ci)

MODERN CRYPTOGRAPHY ECB Pi = 01100010001110101001 Dipecah menjadi 4 bit Kunci (K) = panjangnya 4 bit (1011)

MODERN CRYPTOGRAPHY ECB Pi = 0110 0010 0011 1010 1001 K = 1011 1011 1011 1011 1011 XOR= 1101 1001 1000 0001 0010 Geser 1 bit ke kiri = 1011 0011 0001 0010 0100 Notasi Hex = B 3 1 2 4

MODERN CRYPTOGRAPHY ECB Pi = 0110 0010 0011 1010 1001 (623A9) Ci = 1011 0011 0001 0010 0100 (B3124)

Explain Otherwise cryptographic algorithms By traditional or modern