A Summary in Fifteen Minutes mas y menos

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Cryptography Ch-1 prepared by: Diwan.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 ITNS and CERIAS CISSP Luncheon Series: Cryptography Presented by Addam Schroll, CISSP.
Modern Cryptography.
SYMMETRIC CRYPTOSYSTEMS Symmetric Cryptosystems 10/06/2015 | pag. 2.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Cryptography What is cryptography? The study of message secrecy The art of writing or solving codes Heavy mathematics Information Theory Statistics Number.
Introduction to Information Security Chapter II : Classical Ciphers.
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Information Systems Security
Computer Security Fundamentals by Chuck Easttom Chapter 8 Encryption.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Exam 1 Review CS461/ECE422 Fall Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Intro to Cryptography Lesson Introduction
Chapter 2 Symmetric Encryption.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cryptography Presented By: Yogita Dey Amardeep Kahali Dipanjan Devnagar Minhaajuddin Ahmad Khan ECE4, NIT Securing the Information Age.
Secret Key Cryptography
Computer Security Revision Week
Web Applications Security Cryptography 1
Basic Encryption: methods and tools
Computer Security Fundamentals
CIT 380: Securing Computer Systems
Cracking Encrypted Systems
Data Security B. R. Chandavarkar Asst. Prof., CSE Dept., NITK, Surathkal. brc.nitk.ac.in.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Privacy & Security.
ISA 330 Introduction to Proactive System Security
Cryptographic Algorithms
Outline Desirable characteristics of ciphers Uses of cryptography
Symmetric Algorithm of Cryptography
Chapter 8 Network Security.
Cryptography CS Principles January 19, 2017.
Chapter-2 Classical Encryption Techniques.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography.
Outline Desirable characteristics of ciphers Uses of cryptography
Lecture 2.2: Private Key Cryptography II
Lecture 3: Symmetric Key Encryption
Crypto 101 & Password Cracking
History of Cryptography
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Chapter 8 Network Security.
AES (Advance Encryption Standard)
Security through Encryption
Security in Network Communications
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
Introduction to Symmetric-key and Public-key Cryptography
ICS 454: Principles of Cryptography
By: Arash Habibi Lashkari
Rotors and Secret-Key Encryption
Cryptography a Presentation Prepared by Vytautas Kondratas.
SYMMETRIC ENCRYPTION.
Unit 2: Cryptography & Cryptographic Algorithm
Fluency with Information Technology Lawrence Snyder
Modern Cryptography.
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
Feistel Cipher Structure
Blowfish Encryption Algorithm
Presentation transcript:

A Summary in Fifteen Minutes mas y menos Cryptography A Summary in Fifteen Minutes mas y menos

History of Cryptography Egyptian nonstandard hieroglyphs Spartans Scytale Caesar cipher Religion text changed in numbers (Hebrew) Poly-alphabetic cipher

History Continued Arabs and the complex principles Europeans 1379 the first manual of crypto was written 1470 cipher disk was invented Leon Battista 1586 Blaise de Vigenere

World Wars WWI Zimmerman telegram Code Talkers WWII Enigma Alan Turing Tommy Flowers

Modern Cryptography A mathematical algorithm that takes plain text and changes it into cipher text, for security purposes.

Symmetric-Key Symmetric-key One strong algorithm Two key must be kept secret.

Stream ciphers Keystream XOR operation Linear feedback Nonlinear feedback Stop-and-go generator Shrinking generator

Block ciphers Fixed length Feistel cipher Rounding functions DES AES Substitution-permutation network

Asymmetric Key aka Public key William Joven Diffie-hellman RSA MIT UK

Diffie Joven Hellman Logic Piano

Cryptanalysis, cypherpunks Attacking cipher text Two types Professional and amateur Weaknesses Brute-force Linear cryptanalysis Differential cryptanalysis

Symmetric-asymmetric cryptography Hybrid encryption PGP, Pretty Good Privacy OpenPGP

Encrypted Logons SSH Secure Shell RLogon Kerberos MIT Timestamps Session key Secret key One-way Hash

Snake Oil for Sale Snake Oil is a term used to describe commercial cryptographic methods and products which are considered bogus or fraudulent.

What to look for Secret systems Techno-Babble Larger bit claims Cracking contests Claims of setting new standards