Cryptography Dr. X.

Slides:



Advertisements
Similar presentations
Cryptography Ch-1 prepared by: Diwan.
Advertisements

the basics cryptography deals with techniques for secure communication in the presence of third parties (adversaries). modern cryptography uses mathematics,
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Public Key Cryptography
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Encryption Methods By: Michael A. Scott
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
Encryption.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.
Cryptography – Test Review
Public Key Cryptography
Digital Signatures.
Public Key Encryption.
Chapter 8: Network Security
CSc 8320 Advanced Operating Systems Barnali Chakrabarty
Symmetric and Asymmetric Encryption
Lesson 7: Public Key Cryptography Lesson 8: Rapid Research - Cybercrime Day 37.
Cryptography Why Cryptography Symmetric Encryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Lecture 2.3. ENCRYPTION OF MESSAGES
What is network security?
Public Key Encryption and Digital Signatures
Security.
Public-Key Cryptography and RSA
Public Key Encryption and the RSA Algorithm
Cryptography.
Asynchronous Cryptology: Implementations and Applications
Vernam Cipher Group Members: Muhammad Awais Muhammad Hasnain khan
Cryptography.
Chapter 8: Network Security
Cryptography Survey.
Cryptography and Security Fall 2009 Steve Lai
Network Security Basics
Chapter 3:Cryptography (16M)
Asymmetric Cryptography
Chapter 6 Cryptography CISSP Study Guide BIS 4113/6113.
Security.
Cryptography Survey.
Cryptography “The Secret Code Language”
The Secure Sockets Layer (SSL) Protocol
Cryptography a Presentation Prepared by Vytautas Kondratas.
Fun with Cryptography The Science of Secrecy.
Kharkiv National Pedagogical University
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
Chapter 29 Cryptography and Network Security
Unit 2: Cryptography & Cryptographic Algorithm
Asymmetric Cryptographic Algorithms
Cryptology.
Chapter 8: Network Security
Security: Public Key Cryptography
Secure Diffie-Hellman Algorithm
Introduction to Cryptography
Chapter 8: Network Security
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Cryptography Dr. X

Outline What is cryptography? Ceasar Cipher Public key cryptography

What is cryptography? Cryptography or cryptology (from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively[1]) is the practice and study of techniques for secure communication in the presence of third parties called adversaries. (from Wikipedia) https://www.khanacademy.org/computing/computer- science/cryptography/crypt/v/intro-to-cryptography

Types of cryptography Symmetric: encryption methods in which both the sender and receiver share the same key Ex. Ceasar Cipher What are the pros and cons? Asymmetric/public key: the public key may be freely distributed, while its paired private key must remain secret. In a public-key encryption system, the public key is used for encryption, while the private or secret key is used for decryption. Diffie-Hellman RSA

Terminology Key Public Private Encryption key Cipher Plain text

One time pad https://www.khanacademy.org/computing/computer- science/cryptography/crypt/v/one-time-pad What are the pros and cons of this type of encryption?

Public key encryption

Public key encryption Choose p = 3 and q = 11 Compute n = p * q = 3 * 11 = 33 Public key is (e, n) => (7, 33) Private key is (d, n) => (3, 33) The encryption of m = 2 is c = 27 % 33 = 29 The decryption of c = 29 is m = 293 % 33 = 2

Modulo Operation % Remainder of division Ex. 5 % 4 = 1 If I was trying to divide 5 with 4, 4 can fit in 5 once and the remainder is 1 Practice: 100 % 3 35 % 4 18 % 19

Crypto exercise Symmetric key cryptography with Ceasar cipher Asymmetric key crypto with RSA

Why do we need cryptography? Internet is an open medium Confidentiality Integrity…