Asynchronous Cryptology: Implementations and Applications

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Public Key Infrastructure and Applications
the basics cryptography deals with techniques for secure communication in the presence of third parties (adversaries). modern cryptography uses mathematics,
Bronson Jastrow. Outline  What is cryptography?  Symmetric Key Cryptography  Public Key Cryptography  How Public Key Cryptography Works  Authenticating.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Encryption Methods By: Michael A. Scott
Computer Science Public Key Management Lecture 5.
Dr. Khalid A. Kaabneh Amman Arab University
SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Contact Information Cryptography 8/10/2015 | pag. 2 Professor Assistant Office Webpage Course Text Ann Dooms Adriaan Barri
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
By Yernar.  Background  Key generation  Encryption  Decryption  Preset Bits  Example.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
IT 221: Introduction to Information Security Principles Lecture 4: Public-Key Cryptography For Educational Purposes Only Revised: September 15, 2002.
The Data Encryption Standard (DES) By Danny Gibbs 4/19/2005.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
By Sandeep Gadi 12/20/  Design choices for securing a system affect performance, scalability and usability. There is usually a tradeoff between.
Zero Knowledge Proofs Matthew Pouliotte Anthony Pringle Cryptography November 22, 2005 “A proof is whatever convinces me.” -~ Shimon Even.
CPIS 312 Chapter Four: PUBLIC KEY CRYPTO. Index 2 A.Introduction A.1 Asymmetric Key Cryptography- Introduction A.2 General ideas about the Public Key.
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-1 Overview and Introduction.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Web Security.
Cryptography – Test Review
Web Applications Security Cryptography 1
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Basics of Cryptography
Symmetric and Asymmetric Encryption
Cryptography Dr. X.
Cryptography Why Cryptography Symmetric Encryption
Privacy & Security.
Public Key Encryption Systems
Public Key Encryption and Digital Signatures
Public-Key Cryptography and RSA
RSA and El Gamal Cryptosystems
Public-key Cryptography
Public Key Encryption and the RSA Algorithm
Chapt. 10 – Key Management Dr. Wayne Summers
Security through Encryption
Celia Li Computer Science and Engineering York University
The Secure Sockets Layer (SSL) Protocol
Chapter 4 Cryptography / Encryption
Appendix 5: Cryptography p
Network Security - A Lecture 1 - NETW4006 NETW4006-Lecture01 1.
Lecture 6: Digital Signature
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
Key Distribution Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, /18/2019 Ref: Pfleeger96, Ch.4.
Asymmetric Cryptographic Algorithms
Cryptology Design Fundamentals
Introduction to Cryptography
Cryptology.
Public Key Encryption Systems
Secure Diffie-Hellman Algorithm
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Overview and Introduction (Lecture Contents Summary)
LAB 3: Digital Signature
Presentation transcript:

Asynchronous Cryptology: Implementations and Applications Tim Ransom ransomts@email.appstate.edu James Corsi corsijn@email.appstate.edu Summer Bridge 2013 August 2, 2013

Overview What is Cryptology? Symmetric vs. Asymmetric Public vs. Private Keys What makes them secure? Acknowledgements

What is Cryptology? The encryption and decryption of a message to ensure a secret communication Has become very prominent after WWI with the introduction of computers Combines the fields of applied mathematics, computer science and electrical engineering

Symmetric vs. Asymmetric Symmetric Advantages: Higher rates of throughput Keys are relatively short Simple symmetric keys can be composed to create a stronger cipher Public Key Advantages: Same keys can be used for long periods of time Public keys reduce the total number of keys needed, making management much simpler Only the private key must be kept secret Symmetric Disadvantages: For two parties, both keys must be kept secret Digital signature verifications typically require large keys for public validation Public Key Disadvantages: Throughput speeds can be very slow No public scheme has been proven secure

Public vs. Private Keys Public keys are freely available and usually encrypt data Public keys can decrypt data to publicly announce information Private keys are usually used to decrypt messages encrypted with the related public key They can be used for encryption to verify the author of the message

What makes them secure? RSA Algorithms DH Algorithms Extra security measures: Trusted Third Party (TTP) Digital Signature

Acknowledgements Dr. Tashakkori Dr. Norris Appalachian State The National Science Foundation STEP program

References Menezes, Alfred J., Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. Boca Raton: CRC, 1997. Print. Pfleeger, Charles P., and Shari L. Pfleeger. Security in Computing. 3rd ed. Upper Saddle River: Prentice Hall, 2003. Print. Pieprzyk, Josef, Thomas Hardjono, and Jennifer Seberry. Fundamentals of Computer Security. New York: Springer-Verlag Berlin Heidelberg, 2003. Print. Garrett, Paul, and Daniel Lieman. Public-key Cryptography: American Mathematical Society Short Course, January 13-14, 2003, Baltimore, Maryland. Vol. 62. Providence, RI: American Mathematical Society, 2005. Print Abhishek. “Symmetric and Asymmetric Encryption.” Drawing. Cryptocats.com 27 August 2008. <http://cryptocrats.com/digital-rights-management/drm-technologies-drm-part-2/> “Public-key-crypto-1” by KohanX - CC: BY “Public key shared secret” by David Gothberg - CC: BY “Diffie-Hellman Key Exchange” by Flugaal - CC: BY