Encryption: Image Representation Privacy/Cryptography

Slides:



Advertisements
Similar presentations
Cryptography Ch-1 prepared by: Diwan.
Advertisements

Netprog: Cryptgraphy1 Cryptography Reference: Network Security PRIVATE Communication in a PUBLIC World. by Kaufman, Perlman & Speciner.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Secure communication Informatics for economists II Jan Přichystal
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Lecture 24 Cryptography CPE 401 / 601 Computer Network Systems slides are modified from Jim Kurose and Keith Ross and Dave Hollinger.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Public Key Model 8. Cryptography part 2.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Cryptography CSPrinciples II February 12, Needs for Privacy What are some specific needs for privacy when using the internet?
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
CS110: Computers and the Internet Encryption and Certificates.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Image Representation Privacy/Cryptography CS 104 October 3, 2011.
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
Cryptography, Authentication and Digital Signatures
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Cryptography and Its Algorithms Scott Chappell. What is Cryptography?  Definition: the art of writing or solving codes.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography Presented By: Yogita Dey Amardeep Kahali Dipanjan Devnagar Minhaajuddin Ahmad Khan ECE4, NIT Securing the Information Age.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
Secure communication Informatics for economists II Jan Přichystal
Cryptography – Test Review
Digital Signatures.
Overview of Cryptography
Basics of Cryptography
CIT 380: Securing Computer Systems
Privacy & Security.
Cryptography Reference: Network Security
Cryptography Reference: Network Security
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Public-key Cryptography
Cryptography and Security Technologies
Cryptography CS Principles January 19, 2017.
Encryption
Introduction to security goals and usage of cryptographic algorithms
Cryptography.
CSCI-235 Micro-Computer Applications
IS3230 Access Security Unit 9 PKI and Encryption
Introduction to Symmetric-key and Public-key Cryptography
By: Arash Habibi Lashkari
Cryptography Reference: Network Security
Public-Key, Digital Signatures, Management, Security
Chapter 29 Cryptography and Network Security
Fluency with Information Technology Lawrence Snyder
Secure Diffie-Hellman Algorithm
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Encryption: Image Representation Privacy/Cryptography

Information Security for… Defending against external/internal hackers Defending against industrial espionage Securing E-commerce Securing bank accounts/electronic transfers Securing intellectual property Avoiding liability Pervasiveness of email/networks Online storage of sensitive information Insecure technologies (e.g., wireless) Trend towards paperless society Weak legal protection of email privacy

History 50 B.C. Julius Caesar uses cryptographic technique 1466 Leon Alberti develops a cipher disk 1861 Union forces use a cipher during Civil War 1919 Germans develop the Engima machine for encryption 1942 Navajo windtalkers help with secure communication during World War II 1948 Claude Shannon develops statistical methods for encryption/decryption 1976 IBM develops DES 1976 Diffie – Hellman develop public key / private key cryptography 1977 Rivest – Shamir – Adleman develop the RSA algorithm for public key / private key

Basic Terminology Cryptography deals with creating documents that can be shared secretly over public communication channels Cryptographic documents are decrypted with the key associated with encryption, with the knowledge of the encryptor The word cryptography comes from the Greek words: Krypto (secret) and graphein (write) Cryptanalysis deals with finding the encryption key without the knowledge of the encryptor Cryptosystems are computer systems used to encrypt data for secure transmission and storage

Types of Secret Writing Steganography Cryptography Substitution Transposition Code Cipher

Basic Terminologies Steganography is the practice of concealing messages or information within other nonsecret text or data. The goal is to hide information. Encryptions goal is to make information unreadable . Steganography does not increase file size for hidden messages

Steganography Videos https://www.youtube.com/watch?v=TWEXCYQKyDc - Watch until 5:15 https://www.youtube.com/watch?v=cgtQHi4w9yM

Steganography Examples The simplest approach to hiding data within an image file is called least significant bit (LSB) insertion. In this method, we can take the binary representation of the hidden_data and overwrite the LSB of each byte within the cover_image. If we are using 24-bit color, the amount of change will be minimal and indiscernible to the human eye. As an example, suppose that we have three adjacent pixels (nine bytes) with the following RGB encoding:

Example: 10010101 00001101 11001001 10010110 00001111 11001010 10011111 00010000 11001011 Now suppose we want to "hide" the following 9 bits of data (the hidden data is usually compressed prior to being hidden): 101101101. If we overlay these 9 bits over the LSB of the 9 bytes above, we get the following (where bits in bold have been changed): 10010101 00001100 11001001 10010111 00001110 11001011 10011111 00010000 11001011

Steganography Steganography – covered writing – is an art of hiding information Popular contemporary steganographic technologies hide information in images New York Times, August 3rd, 2001 http://www.nytimes.com/images/2001/10/30/science/sci_STEGO_011030_00.jpg

Hiding information in pictures

Hiding information in pictures

Questions Please complete the question sheet over Steganography and Cryptography.

Caesar Cipher A substitution cipher where each plaintext letter is replaced by some letter a fixed number of spaces down in the alphabet

Caesar Cipher Open the following link https://www.khanacademy.org/computing/computer-science/cryptography/crypt/v/intro-to-cryptography Watch the first two videos (What is cryptography and The Ceaser Cipher Go to the third link and open up the Ceaser Cipher Exploration and complete the worksheet.

Basic Terminologies Keys are rules used in algorithms to convert a document into a secret document Keys are of two types: Symmetric Asymmetric A key is symmetric if the same key is used both for encryption and decryption A key is asymmetric if different keys are used for encryption and decryption

ROT13 Network data encryption / decryption using ROT13 algorithm Rotates characters by 13 places ‘A’  ‘N’, ‘M’  ‘Z’, ‘a’  ‘n’, ‘m’  ‘z’ Encryption Example: ‘Hello World’ encrypts to ‘Uryyb Jbeyq’ Decryption Example: ‘Uryyb Jbeyq’ decrypts to ‘Hello World’

Public Key Cryptography Private (symmetric, secret) key – the same key used for encryption/decryption Problem of key distribution – how to get the key safely into hands of both parties Public (asymmetric) key cryptography – a public key used for encryption and private key for decryption Key distribution problem solved Very popular technique: Large Prime Numbers

Transmitting over an insecure channel Alice wants to send Bob a private message. Apublic is Alice’s public key. Aprivate is Alice’s private key. Bpublic is Bob’s public key. Bprivate is Bob’s private key.

Hello Bob, Wanna get together? Alice Bob encrypt using Bpublic decrypt using Bprivate

OK Alice, where do we meet? Bob decrypt using Aprivate encrypt using Apublic

Bob’s Dilemma: Authenticity of Communication Nobody can read the message from Alice, but anyone could produce it. How does Bob know that the message was really sent from Alice? What if it was from ex-girlfriend, Suzy? Bob may be comforted to know that only Alice can read his reply.

Alice can sign her message! Alice can create a digital signature and prove she sent the message (or someone with knowledge of her private key). The signature can be a message digest encrypted with Aprivate. Helps to prevent: Impostor attacks Content tampering

Digital Certificates Issued by trusted third parties known as Certificate Authorities (CAs) Verisign is a trusted third party Used to authenticate an individual or an organization Digital Certificates are usually given for a period of one year They can be revoked It is given at various security levels. The higher the security level, the CA verifies the authenticity of the certificate seeker more.

Digital Certificates Digital Certificates are part of the authentication mechanism. The other part is Digital Signature. When a user uses the digital signature, the user starts with their private key and encrypts the message and sends it. The receiver uses the sender’s public key and decrypts the message In traditional encryption, the sender uses the public key of the receiver and encrypts the message and sends it and the receiver decrypts the message with their private key

Potential Problems with Cryptographic Technologies? False sense of security if badly implemented Government regulation of cryptographic technologies/export restrictions Encryption prohibited in some countries

Video Example Example of public key cyrptography using color mixing http://www.youtube.com/watch?v=3QnD2c4Xovk&feature=g-all-esi

Privacy

Criminals Caught by Bits Dennis Rader, the “BTK Killer” http://en.wikipedia.org/wiki/Dennis_Rader Killed 10 people over 17 year period Arrested in 2005 From Wikipedia: “Police found metadata embedded in a deleted Microsoft Word document that was, unbeknownst to Rader, on the disk. The metadata, recovered using the forensic software EnCase, contained "Christ Lutheran Church", and the document was marked as last modified by "Dennis". A search of the church website turned up Dennis Rader as president of the congregation council. Police began surveillance of Rader.

Criminals Caught by Bits Video: 36:40 – 38:00 http://www.youtube.com/watch?v=S9UmhGV9fGE