HEY DOUG HOW ARE YOU? NKE JUAM NUC GXK EUA. HEY DOUG HOW ARE YOU? NKE JUAM NUC GXK EUA.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Encryption/Decyprtion using RC4 Vivek Ramachandran.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Decryption Algorithms Characterization Project ECE 526 spring 2007 Ravimohan Boggula,Rajesh reddy Bandala Southern Illinois University Carbondale.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
3DES and Block Cipher Modes of Operation CSE 651: Introduction to Network Security.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Cryptography Gerard Klonarides. What is cryptography? Symmetric Encryption Symmetric Encryption Asymmetric Encryption Asymmetric Encryption Other cryptography.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Symmetric-Key Cryptography CS 161: Computer Security Prof. Raluca Ada Popa Sept 13, 2016.
Symmetric Encryption and Message Confidentiality
Cryptography Basic concepts and terms Public/Private Key Algorithms
CS457 Introduction to Information Security Systems
Cracking Encrypted Systems
IT443 – Network Security Administration Instructor: Bo Sheng
Data Security B. R. Chandavarkar Asst. Prof., CSE Dept., NITK, Surathkal. brc.nitk.ac.in.
Privacy & Security.
Triple DES.
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Public Key Encryption and Digital Signatures
Outline Desirable characteristics of ciphers Uses of cryptography
Symmetric Algorithm of Cryptography
Chapter 8 Network Security.
Cryptography and Security Technologies
Data Encryption Standard
Chapter-2 Classical Encryption Techniques.
Unit -1.
Outline Desirable characteristics of ciphers Uses of cryptography
NET 311 Information Security
Cryptography Basics and Symmetric Cryptography
Cryptography and Security Fall 2009 Steve Lai
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
AES (Advance Encryption Standard)
Security through Encryption
PART VII Security.
Introduction to Symmetric-key and Public-key Cryptography
The Elements of Cryptography
MSIT 543 Cryptography Concepts and Techniques Symmetric Key Encryption
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
SYMMETRIC ENCRYPTION.
DISSERTATION ON CRYPTOGRAPHY.
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Introduction to Cryptography
Fluency with Information Technology Lawrence Snyder
Modern Cryptography.
The RSA Public-Key Encryption Algorithm
Advanced Encryption Standard
The RC4 Algorithm Network Security.
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

HEY DOUG HOW ARE YOU? NKE JUAM NUC GXK EUA

Cryptography Jason Gruber COSC 356-1

Outline Cryptography Terminology Types of encryption Symmetric Key Asymmetric Key Examples of different encryption methods Questions

Cryptography Terms Cryptography the study of ways to convert information from normal, comprehensible form into an incomprehensible format, rendering it illegible without ‘secret knowledge’ Cipher Algorithm for performing encryption and decryption Key Small amount of information used to encrypt / decrypt information (aka ‘secret knowledge’) Plain/Clear Text Information in its normal comprehensible form Ciphered Text Information that has been encrypted

2 Types of Encryption… The First Type Symmetric key ciphers use the same key for encryption and decryption "private-key", "one-key" and "single-key" cryptography block ciphers and stream ciphers Drawback: Key must be shared in a non-traditional communication medium else the key and encrypted data can be collected & decrypted by anyone

Stream Cipher Encrypts bit-per-bit RC4, FISH, and Helix The algorithm uses some function to combine a pseudorandom number generator (PRNG) with a plaintext stream (resulting in a key stream) Encryption consists of XORing the plaintext bits with the corresponding bits of the keystream; decryption consists of XORing the ciphertext bits with the corresponding keystream bits

Block Cipher Encrypts block-per-block Generally 64 or 128 bits DES, AES, IDEA

2 Types of Encryption… The Second Type Asymmetric key ciphers use a public and a private key, for encryption and decryption respectively Public key algorithms are usually based on hard mathematical problems. RSA, for example, relies on the (conjectured) difficulty of factorisation Although generally slower than symmetric, Asymmetric keys can be used to verify identity of sender.

Asymmetric Key Ciphers Plain text is encrypted using public key Corresponding private key is required to decrypt back to plain text Attempts to decrypt using public-key or any other key than specific private key will result in garbage. Key ranges from 160 – 510 bits

Caesar Cipher Key is a numerical value (1-26) Key value represents the number of “shifts” Original A B C D E F G H I J K L M N O P Q R S T U V W X Y Z G H I J K L M N O P Q R S T U V W X Y Z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z HEY DOUG HOW ARE YOU? = NKE JUAM NUC GXK EUA

RC4 is the most widely-used software stream cipher It has become part of some commonly used encryption protocols and standards, including WEP and WPA for wireless cards and SSL A number of attacks on RC4 have been published, and have demonstrated that some ways of implementing RC4 within a cryptosystem are completely insecure. However, it is believed that RC4 can be secure when used appropriately RC4 was designed by Ron Rivest of RSA Security in 1987; while it is officially termed "Rivest Cipher 4", the RC acronym is alternatively understood to stand for "Ron's Code" http://en.wikipedia.org/wiki/RC4

RSA asymmetric algorithm widely used in electronic commerce protocols The algorithm was described in 1977 by Ron Rivest, Adi Shamir and Len Adleman who were all at MIT at the time the RSA system relies on the difficulty of factoring very large numbers As of 2004, there is no known method of attack which is feasible against the basic algorithm, and sufficiently long RSA keys make brute force attacks infeasible -- that is, effectively impossible http://en.wikipedia.org/wiki/RSA

Data Encryption Standard (DES) selected as an official Federal Information Processing Standard (FIPS) for the United States in 1976 initially controversial, with classified design elements, a relatively short key length, and suspicions about an NSA backdoor DES is now considered to be insecure for many applications. This is chiefly due to the 56-bit key size being too small; DES keys have been broken in less than 24 hours believed to be practically secure in the form of Triple DES the cipher has been superseded by the Advanced Encryption Standard (AES) http://en.wikipedia.org/wiki/DES

Triple DES (3DES) a block cipher formed from the Data Encryption Standard (DES) cipher developed by Walter Tuchman (the leader of the DES development team at IBM) is specified in FIPS Pub 46-3 Triple-DES is defined as performing a DES encryption, then a DES decryption, and then a DES encryption again 3DES=(DES(DES(DES(text)))) http://en.wikipedia.org/wiki/3DES

Advanced Encryption Standard (AES) also known as Rijndael (a combo of its inventor’s last names (Joan Daemen and Vincent Rijmen) ) block cipher adopted as an encryption standard by the US government, and is expected to be used worldwide and analyzed extensively adopted by National Institute of Standards and Technology (NIST) as US FIPS PUB 197 in November 2001 after a 5-year standardization process http://en.wikipedia.org/wiki/Advanced_Encryption_St andard

Questions??