One-way Encryption Ideal Properties

Slides:



Advertisements
Similar presentations
Hashes and Message Digests
Advertisements

ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
Security+ Guide to Network Security Fundamentals, Fourth Edition
PIITMadhumita Chatterjee Security 1 Hashes and Message Digests.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Chapter 4  Hash Functions 1 Overview  Cryptographic hash functions are functions that: o Map an arbitrary-length (but finite) input to a fixed-size output.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Vitaly Shmatikov CS 361S Cryptographic Hash Functions.
Java supports encryption by a wide variety of packages: The standard java.security package The standard javax.crypto package Packages supplied by third.
Csci5233 Computer Security1 GS: Chapter 6 Using Java Cryptography for Authentication.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
Week 5 - Monday.  What did we talk about last time?  Cryptographic hash functions.
Dan Johnson. What is a hashing function? Fingerprint for a given piece of data Typically generated by a mathematical algorithm Produces a fixed length.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Chapter 8: Scrambling Through Cryptography Security+ Guide to Network Security Fundamentals Second Edition.
Chapter 8: Scrambling Through Cryptography Security+ Guide to Network Security Fundamentals Second Edition.
David Evans CS200: Computer Science University of Virginia Computer Science Class 36: Public-Key Cryptography If you want.
Monitor's Secret Key Crypto - KARN, encrypt 512 bit Secret.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Hashing Algorithms: Basic Concepts and SHA-2 CSCI 5857: Encoding and Encryption.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Lecture 2: Introduction to Cryptography
Week 4 - Friday.  What did we talk about last time?  Snow day  But you should have read about  Key management.
MT311 Java Application Development and Programming Languages Li Tak Sing ( 李德成 )
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
Information Security and Management 11. Cryptographic Hash Functions Chih-Hung Wang Fall
Lecture 9 Overview. RSA Invented by Cocks (GCHQ), independently, by Rivest, Shamir and Adleman (MIT) Two keys e and d used for Encryption and Decryption.
Java Cryptography Nick Pullman DSU-MSIA Citigroup Information Security
LAB#6 MAC & MASSAGE DIGEST CPIT 425. Message Authentication 2  Message authentication is a mechanism used to verify the integrity of a message.  Message.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
@Yuan Xue 285: Network Security CS 285 Network Security Hash Algorithm Yuan Xue Fall 2012.
Hervey Allen Phil Regnauld 15 June 2009 Papeete, French Polynesia DNSSEC Tutorial: Public / Private.
Security Protecting information data confidentiality
Information and Computer Security CPIS 312 Lab 9
CHAPTER 4 TJADEN plus Chapters 13 & 14 Crytography Decrypted Hashing Functions, Message Digests, Message Authentication Codes (MACs) Dr. Suzanne Buchele.
Basics of Cryptography
Symmetric Cryptography
IT443 – Network Security Administration Instructor: Bo Sheng
Digital Signatures Assignment
Lecture 6 Overview.
Cryptographic Hash Function
Using Tweak to Study Ccrypt
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
One-way Encryption Properties
Chap 6: Security and Protection
BPSEC Updates Edward Birrane
MAC: Message Authentication Code
Cryptography Basics and Symmetric Cryptography
ICS 454 Principles of Cryptography
Message Authentication Codes, Hashes and Message Digests
Unit 2 “Implementation of a RC5 block cipher algorithm and implementing an attack on it”
Cryptography Team Presentation 1
Analysis of the RSA Encryption Algorithm
STREAM CIPHERS by Jennifer Seberry.
CSE 484 Midterm Review “1st half of the quarter in 5 slides”
ICS 454 Principles of Cryptography
Chapter -4 STREAM CIPHERS
Chapter 3 - Public-Key Cryptography & Authentication
Practical Aspects of Modern Cryptography
Hashing Hash are the auxiliary values that are used in cryptography.
Cryptography Fundamentals
The RSA Public-Key Encryption Algorithm
The RC4 Algorithm Network Security.
Presentation transcript:

One-way Encryption Ideal Properties A cipher designed only to encrypt, not decrypt. plaintext ciphertext encryption algorithm also known as the _______________or ______ Ideal Properties

Non-keyed One-way Ciphers MD5 • Created by Ron Rivest (MIT) - 1992 • 128-bit digest SHA family • SHA-1 created by NSA - 1995, others by NSA • 160-bit digest for SHA-1 • SHA-2 with larger digests: SHA-256, SHA-384, SHA-512 Note: In 2004 three cryptographers (Eli Biham, Rafi Chen, and Antoine Joux) discover potential collisions in SHA-0 (and possibly SHA-1). MD5 is also considered somewhat vulnerable.

How To Use for Passwords? User Selects New Password password digest encryption algorithm store in password file User Enters Password (in response to challenge) password digest encryption algorithm compared to digest from password file

...in Java Four Steps Instantiate a java.security.MessageDigest object. (This is done by calling a static method named getInstance). 2) Fill a byte array from plaintext to be hashed. 3) Call update on the object, passing the byte array. 4) Call digest to retrieve the hash value (as a byte array). MessageDigest md = MessageDigest.getInstance(“SHA-256”); byte[] buffer = someMethodToReturnPlaintext(); md.update(buffer); Note: This can be called as many times as necessary. byte[] digest = md.digest();