Cracking Encrypted Systems

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptography The science of writing in secret code.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
CIS 450 – Network Security Chapter 8 – Password Security.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Crypto Bro Rigby. History
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Cryptography, Authentication and Digital Signatures
Cryptography By, Anthony Lonigro & Valentine Mbah.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
1 Public-Key Cryptography and Message Authentication.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Overview of Cryptography & Its Applications
Intro to Cryptography Lesson Introduction
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Cryptography and Its Algorithms Scott Chappell. What is Cryptography?  Definition: the art of writing or solving codes.
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Slides for Chapter 11: Security.
April 20023CSG11 Electronic Commerce Encryption John Wordsworth Department of Computer Science The University of Reading Room.
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.
Cryptography – Test Review
Public Key Cryptography
Lesson 2-18 AP Computer Science Principles
CIT 380: Securing Computer Systems
Symmetric Cryptography
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Cryptography Much of computer security is about keeping secrets
Cryptography Why Cryptography Symmetric Encryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Privacy & Security.
Identity Theft uses of Cryptography
HEY DOUG HOW ARE YOU? NKE JUAM NUC GXK EUA. HEY DOUG HOW ARE YOU? NKE JUAM NUC GXK EUA.
Security.
Outline Desirable characteristics of ciphers Uses of cryptography
Public-key Cryptography
Introduction Of System Security
Cryptography.
Networks Encryption.
Topic 1: Data, information, knowledge and processing
Outline Desirable characteristics of ciphers Uses of cryptography
Cryptography Basics and Symmetric Cryptography
Chapter 3:Cryptography (16M)
Visit for more Learning Resources
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Security.
Appendix 5: Cryptography p
Cryptography a Presentation Prepared by Vytautas Kondratas.
DISSERTATION ON CRYPTOGRAPHY.
Computer Security Chapter Two
Fluency with Information Technology Lawrence Snyder
Operating Systems Concepts
Cryptanalysis Network Security.
Secure Diffie-Hellman Algorithm
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Cracking Encrypted Systems By: Jason Schrecongost

Cryptography Derived from the Greek word “Kryptos” meaning “hidden” or “secret,” cryptography is the practice and study of hiding information. Cryptography is an ancient art dating as far back as 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs Some argue that cryptography has been around ever since writing was invented.

Cryptography:Modern Cryptography in modern times, is a combination of both mathematics and computer science. Technology relies greatly on cryptography. For example: Credit Cards Computer Passwords eCommerce

Encryption By definition, encryption is any procedure used in cryptography to convert plaintext into cipher text in order to prevent any but the intended recipient from reading that data. The result is a cryptographic key. Encryption should be used when communicating over any untrusted medium.

Key A cryptographic key determines the output of an algorithm. The key is necessary to encrypt the plain text to cipher text, without it…the algorithm would produce no result.

Cipher A cipher is the algorithm used for encrypting and decrypting data. There are two main types of these algorithms. Symmetric Key Algorithms Asymmetric Key Algorithms

Symmetric Key Algorithms Symmetric Keys are a class of algorithms that use the same key for encryption and decryption Other names for this type include: Secret-Key Single-Key Shared-Key

Asymmetric Key Algorithms Also known as Public Key Cryptography, Asymmetric keys to encrypt a message differ from the key to decrypt it. This type of key contains both a private key and a public key Private Key-kept secret Public Key-can be distributed

Asymmetric Keys(Cont.) Of the two types of keys, this is the most common and more secure method. Bob must obtain Alice’s public key to decrypt her message.

Cracking Encryption Now that you have some what of an understanding of Encryption. You can better grasp on who to crack encryption keys. This is not an easy process but it can be done by certain methods.

Cracking Encryption This is just a chart showing the cost and time it takes for one to crack encryption keys As you can see, the higher the key bit is, the more time and money it takes to crack.

Brute Force! Because there is no real weakness is encrypted systems, Brute Force is necessary to crack the key. A Brute Force attack is an exhaustive search. It tries every possibility until it guesses the key. However, the bigger bit the key is the longer it takes to crack.

“Deep Crack” In 1998, Electronic Frontier Foundation built this $250,000 brute force cracking machine. It cracked a DES encryption key in less than 56 hours. DES uses a 56-bit key meaning there was 72 quadrillion possibilities.

Dictionary Attack A dictionary attack is just what it appears to be, it searches every word in the dictionary for a possible password to decrypt the cipher text. It may be easier and more effective to do a dictionary attack. But if a dictionary attack fails it may be necessary to use a brute force method.

Aircrack-ng Aircrack-ng is an excellent program for cracking encryption on wireless networks, usually in under ten minutes. It uses brute force to crack WEP keys and a dictionary attack to crack WPA keys. The program is available for both Windows and Linux and is available at: http://www.aircrack-ng.org/doku.php

Features

Aircrack-ng Demonstration Instead of explaining how this program works, it will be more beneficial to everyone to just see how it is done. http://www.youtube.com/watch?v=TiPWUykw3uU&NR=1

Conclusion Even though encryption is a very good way of securing data, the purpose of this presentation was to show you that with the right equipment it is possible to crack encrypted systems.

Sources http://en.wikipedia.org/wiki/Aircrack http://en.wikipedia.org/wiki/Asymmetric_key_algorithm http://www.tech-faq.com/dictionary-attack.shtml http://www.aircrack-ng.org/doku.php http://www.youtube.com/watch?v=TiPWUykw3uU&NR=1 http://en.wikipedia.org/wiki/Brute-force_search http://www.mycrypto.net/encryption/encryption_crack.html http://en.wikipedia.org/wiki/Brute_force_attack