Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.

Slides:



Advertisements
Similar presentations
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Cryptography 101 How is data actually secured. RSA Public Key Encryption RSA – names after the inventors –Rivest, Shamir, and Adleman Basic Idea: Your.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
RSA Exponentiation cipher
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 12 Cryptography (slides edited by Erin Chambers)
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Encryption Coursepak little bit in chap 10 of reed.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CS201 Tech-Talk Two: Cryptography Michael Hsu CSULA.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Encryption with Keys and Passwords
Web Security.
Overview Modern public-key cryptosystems: RSA
Digital Signatures.
Public Key Cryptography
Lesson 2-18 AP Computer Science Principles
CS480 Cryptography and Information Security
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Cryptography Dr. X.
Lesson 7: Public Key Cryptography Lesson 8: Rapid Research - Cybercrime Day 37.
Encryption.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Cryptography Why Cryptography Symmetric Encryption
Privacy & Security.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Introduction to security goals and usage of cryptographic algorithms
Cryptography.
Topic 1: Data, information, knowledge and processing
Lesson 4-5 AP Computer Science Principles
M3: Encryption r By Andrew Stringer.
Lesson 5: Simple Encryption
Cryptography Survey.
Public Key Cryptography
Public Key Cryptography
Chapter 3:Cryptography (16M)
Big Data & Privacy Review - summary.
Security through Encryption
PART VII Security.
Cryptography Survey.
CS Introduction to Operating Systems
Simple Encryption- Lesson 5
NET 311 Information Security
Cryptography a Presentation Prepared by Vytautas Kondratas.
Lesson 7: Simple Encryption
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
Chapter 29 Cryptography and Network Security
Basic of Modern Cryptography
Fluency with Information Technology Lawrence Snyder
Symmetric Encryption or conventional / private-key / single-key
Secure Diffie-Hellman Algorithm
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s Law - The number of transistors one could fit on a chip will double every 18 months or so. Caesar Cipher - a technique for encryption that shifts the alphabet by some number of characters Cipher - the generic term for a technique (or algorithm) that performs encryption Cracking encryption - When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption. Decryption - a process that reverses encryption, taking a secret message and reproducing the original plain text Encryption - a process of encoding messages to keep them secret, so only "authorized" parties can read it. Random Substitution Cipher - an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet. asymmetric encryption - used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt. modulo - a mathematical operation that returns the remainder after integer division. Example: 7 MOD 4 = 3 Private Key - In an asymmetric encryption scheme the decryption key is kept private and never shared, so only the intended recipient has the ability to decrypt a message that has been encrypted with a public key. Public Key Encryption - Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.

U4L7: Public Key Cryptography CS Principles U4L7: Public Key Cryptography

U4L7: Public Key Cryptography Objectives SWBAT: Explain what the modulo operation does and how it operates as a "one-way" function Follow an asymmetric encryption algorithm to encrypt a numerical message using the Public Key Crypto widget. Explain the difference between symmetric and asymmetric encryption. Describe the basic process of encrypting data using public key encryption Explain the benefits of public key cryptography

U4L7 Vocabulary asymmetric encryption - used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt. modulo - a mathematical operation that returns the remainder after integer division. Example: 7 MOD 4 = 3 Private Key - In an asymmetric encryption scheme the decryption key is kept private and never shared, so only the intended recipient has the ability to decrypt a message that has been encrypted with a public key. Public Key Encryption - Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.

U4L7 Prompt Prompt: “How can two people send encrypted messages to each other if they can’t communicate, or agree on an encryption key ahead of time, and the only way they have to communicate is over the Internet?”

Public Key Cryptography To many the fact that encrypted messages can be sent between parties who have never met before is both taken for granted and opaque. Understanding how it works with some depth - getting to experiment with the mathematical principles that make asymmetric keys possible, and the resulting encryption hard to crack - is deeply satisfying. The widget in the lesson mimics the RSA encryption algorithm (with smaller numbers and slightly easier mathematics). RSA is an algorithm used by modern computers to encrypt and decrypt messages. It is an asymmetric cryptographic algorithm. Asymmetric means that there are two different keys. This is also called public key cryptography, because one of them can be given to everyone. The other key must be kept private. It is based on the fact that finding the factors of an integer is hard. A user of RSA creates and then publishes the product of two large prime numbers, along with an auxiliary value, as their public key. The prime factors must be kept secret. Anyone can use the public key to encrypt a message, but with currently published methods, if the public key is large enough, only someone with knowledge of the prime factors can feasibly decode the message.