Identity Theft uses of Cryptography

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Cryptography The science of writing in secret code.
Secure communication Informatics for economists II Jan Přichystal
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Principles of Information Security, 2nd edition1 Cryptography.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Cryptography, Authentication and Digital Signatures
An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology.
Cryptography By, Anthony Lonigro & Valentine Mbah.
I NTRODUCTION TO C RYPTOLOGY Cryptoanalysts, Encryption, and Decryption.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Information Security and Secret Messages. Agenda Information Assurance Program Value of Information Secret Messages –Steganography –Caesar Cypher –Keyword.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
CHAOS CRYPTOGRAPHY Nathaniel Speiser Physics
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CS201 Tech-Talk Two: Cryptography Michael Hsu CSULA.
Secure communication Informatics for economists II Jan Přichystal
Encryption with Keys and Passwords
(Principles of Informatioan security)
Security, Social and Legal Issues Regarding Software and Internet
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Basic Encryption: methods and tools
Cracking Encrypted Systems
Cryptography Dr. X.
Crypto in information security
Encryption.
Cryptography Why Cryptography Symmetric Encryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Cryptography CS Principles January 19, 2017.
Introduction Of System Security
Basic Encryption Methods
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter-2 Classical Encryption Techniques.
Cryptography.
CSCI-235 Micro-Computer Applications
Networks Encryption.
Lesson 4-5 AP Computer Science Principles
M3: Encryption r By Andrew Stringer.
Lesson 5: Simple Encryption
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
Chapter 3:Cryptography (16M)
Cryptography and Network Security
Simple Encryption- Lesson 5
Lesson 7: Simple Encryption
DISSERTATION ON CRYPTOGRAPHY.
Digital Communications
Unit 2: Cryptography & Cryptographic Algorithm
By Sean O’Mahoney from the Computing Society at Futures Friday
Computer Security Chapter Two
Fluency with Information Technology Lawrence Snyder
Symmetric Encryption or conventional / private-key / single-key
Chapter Goals Define cryptography
Introduction to Cryptography
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Identity Theft uses of Cryptography Tamara C Smith

Defining Cryptography Why is important Where did it come from Who uses it Modern Cryptography systems Conclusion

What is Cryptography? The art of protecting information by transforming it into an unreadable format, called cipher text. Only those who possess a secret key can decipher the message into plain text. Encrypted messages can sometimes be broken by cryptanalysis, also called codebreaking, although modern cryptography techniques are virtually unbreakable.

Why is it important? Cryptography makes secure web sites and electronic safe transmissions possible protects e-mail by rendering it very difficult to read by any unintended party

Where did it come from? Caesar's Alphabet ABCDEFGHIJKLMNOPQRSTUVWXYZ DEFGHIJKLMNOPQRSTUVWXYZABC Every third letter the alphabet shifts to the left Basic example : My name is Tamara Smith PB QDPH LV WDPDUD VPLKW

Who uses it? Governments Spies Banks Credit card companies You

Modern Cryptography Systems Substitution Cipher Switch from one letter to another Easily broken Reciprocal Cipher Make systems less secure or more usable You can enter clear text and get cipher text or vice versa Form of cryptographic suicide

Symmetric Cipher Asymmetric Cipher Uses the same key for encryption and decryption Asymmetric Cipher Split key algorithm Public key Private key

Conclusion Billions of dollars are spent on computer security, and most of that money is wasted on insecure products. The question remains, how technologically advanced will cryptography become?. Currently encryption standards appear nearly unbreakable. Everyday new technology is either invented, changed or updated. There are many people out there who try to hack into the networks, whether its wireless networks, network systems or something as simple as an email. The way in which cryptography is used will continue to change as our society pushes for more security in everyday life.

?Questions?

References http://www.securitydocumentworld.com/ http://encryption_policies.tripod.com http://www.amarshall.com http://all.net/BOOKS/IP/cHAP2-1.HTML Cryptography and Network Security (Behrouz A. Forouzan)