CSc 8320 Advanced Operating Systems Barnali Chakrabarty

Slides:



Advertisements
Similar presentations
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Advertisements

Cryptography The science of writing in secret code.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Security Module – Part 1 Spring 2006 V.T. Raja, Ph.D., Oregon State University.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Public Key Model 8. Cryptography part 2.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Problems with symmetric (private-key) encryption 1) secure distribution of keys 2) large number of keys Solution to both problems: Public-key (asymmetric)
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Information Systems Security
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Cryptography, Authentication and Digital Signatures
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Encryption.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Overview of Cryptography & Its Applications
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
CRYPTOGRAPHY Gayathri V.R. Kunapuli. OUTLINE History of Cryptography Need for cryptography Private Key Cryptosystems Public Key Cryptosystems Comparison.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Network Security Celia Li Computer Science and Engineering York University.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.
Cryptography – Test Review
CIT 380: Securing Computer Systems
ISA 400 Management of Information Security
Cryptography Dr. X.
Crypto in information security
Cryptography Why Cryptography Symmetric Encryption
Security Design.
Encryption
Introduction to security goals and usage of cryptographic algorithms
Cryptography.
- Stream Cipher and Block Cipher - Confusion & Diffusion
Topic 1: Data, information, knowledge and processing
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
IS3230 Access Security Unit 9 PKI and Encryption
Quantum Cryptography Alok.T.J EC 11.
Security through Encryption
Chapter 6 Cryptography CISSP Study Guide BIS 4113/6113.
Cryptography and Network Security
The Secure Sockets Layer (SSL) Protocol
Appendix 5: Cryptography p
Chapter 29 Cryptography and Network Security
Unit 2: Cryptography & Cryptographic Algorithm
Basic of Modern Cryptography
By Sean O’Mahoney from the Computing Society at Futures Friday
Asymmetric Cryptographic Algorithms
Fluency with Information Technology Lawrence Snyder
Operating Systems Concepts
Symmetric Encryption or conventional / private-key / single-key
Secure Diffie-Hellman Algorithm
Introduction to Cryptography
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

CSc 8320 Advanced Operating Systems Barnali Chakrabarty Cryptography CSc 8320 Advanced Operating Systems Barnali Chakrabarty

Overview What is Cryptography ? Its history And its fundamentals Public and Private Cryptographic Systems Current Work Future Research

What is Cryptography ? The process of converting intelligible information called the plain text into something that is unintelligible, called the cipher text

History of Cryptography 2000 BC in Egypt Atbash Cipher Caesar Cipher around 2000 B.C. in Egypt, where hieroglyphics were used to decorate the tombs of deceased rulers and kings. These hieroglyphics told the story of the life of the king and proclaimed the great acts of his life. They were purposefully cryptic, but not apparently intended to hide the text. Rather, they seem to have been intended to make the text seem more regal and important.

Fundamentals of Cryptography Confidentiality Authenticity Integrity Availability Nonrepudiation Confidentiality is the term used to prevent the disclosure of information to unauthorized individuals or systems. Authenticity implies that the data, transactions, documents should be genuine.Integrity- data cannot be modified Without authorization.

Public Key Cryptographic Systems asymmetric key algorithms the key used to encrypt a message is not the same as the key used to decrypt it

Diffie Hellman Algorithm: A public key Cryptographic Algorithm

Private Key Cryptographic Systems - Also called Symmetric encryption involves using the same key for encryption and decryption.

One Time Pad: A Private Key Cryptographic Algorithms The plain text is combined with a secret random key only once to produce the cipher text

Current Work :Research on Elliptic Curve Cryptography[Q.Qiu04] Offer major advantages over Traditional systems like 1.lesser storage 3.smaller keysize 4.increased speed

Future Work: Research on Quantum Cryptography[5] based on photon physics. A photon vibrates as it travels through space. The angle of vibration is known as polarization of the photon. Using different polarizations, the sender can transmit a unique symmetric key to receiver each time she needs to send a message. Theoretically,the eavesdropper has no chance to intercept this key because of unique properties of quantum physics

References [1]http://all.net/BOOKS/IP/cHAP2-1.HTML [2]http://gdp.globus.org/gt4-tutorial/multiplehtml/ch09s03.html [3]http://en.kioskea.net/contents/crypto/cleprivee.php3 [4]  Research on elliptic curve cryptography, Qizhi Qiu , Qianxing Xiong,2004 [5]http://www.uhisrc.com/FTB/Cryptography/FTBCryptograph y.pdf [6]Distributed Operating Systems and Algorithm Analysis, Andy Chow & Theodore Johnson,1997 [7]Wikipedia