Topic 1: Data, information, knowledge and processing

Slides:



Advertisements
Similar presentations
UNIT – 6 PRIVACY AND SECURITY. Software Complexity.
Advertisements

Netprog: Cryptgraphy1 Cryptography Reference: Network Security PRIVATE Communication in a PUBLIC World. by Kaufman, Perlman & Speciner.
Digital Signatures. Anononymity and the Internet.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Pretty Good Privacy (PGP)
Encryption Methods By: Michael A. Scott
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Public-Key Cryptography CS110 Fall Conventional Encryption.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Types of Electronic Infection
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Encryption.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
Encryption CS110: Computer Science and the Internet.
Mort Anvari Introduction to Encryption Technology To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Private key
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
1 Managing Security Additional notes. 2 Intercepting confidential messages Attacker Taps into the Conversation: Tries to Read Messages Client PC Server.
Web Security.
Chapter 40 Internet Security.
Digital Signatures.
Lesson 2-18 AP Computer Science Principles
Unit 3 Section 6.4: Internet Security
Cracking Encrypted Systems
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Privacy & Security.
Cryptography Reference: Network Security
Cryptography Reference: Network Security
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Public-key Cryptography
Chapters 14,15 Security.
Encryption
Topic 1: Data, information, knowledge and processing
Vernam Cipher Group Members: Muhammad Awais Muhammad Hasnain khan
Encryption The Good kind of obscurity
M3: Encryption r By Andrew Stringer.
Lesson Objectives Aims You should know about: 1.3.1:
Cryptography and Network Security
برگرفته از اسلایدهای © University of Glamorgan
Appendix 5: Cryptography p
NET 311 Information Security
Cryptography Reference: Network Security
One time pad & Many Time pad
Chapters 14,15 Security.
Lecture 10: Network Security.
Network and Data Security
Purpose: how do computers keep our information secret?
Computer Security Chapter Two
Fluency with Information Technology Lawrence Snyder
Operating Systems Concepts
Secure Diffie-Hellman Algorithm
Introduction to Cryptography
Introduction to Encryption Technology
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Topic 1: Data, information, knowledge and processing Encryption

Learning Objectives Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

What is data encryption? Encryption is the process of converting information into a form that is meaningless to anyone except holders of a ‘key’. Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

What is plain text? In cryptography, plaintext is ordinary readable text before being encrypted into ‘ciphertext’ or after being decrypted Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

Symmetric Key Encryption First, Alice needs to generate a secret ‘key’ using encryption software. The key is usually a very long, random number. Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

Symmetric Key Encryption Alice can send Bob the encrypted text, but Bob cannot read it yet Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

Symmetric Key Encryption Alice can send Bob the encrypted text, but Bob cannot read it yet Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

Symmetric Key Encryption Alice must then give a copy of this key to Bob. She must make sure that nobody else can get the key (USB stick) Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

Symmetric Key Encryption Now Bob has the key he can use special software to decrypt the message. Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

Asymmetric Key Encryption Works exactly the same. However there are 2 possible keys: Public key is made freely available to anyone who might want to send you a message. Private key is kept secret, so that only you know it. Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

Asymmetric Key Encryption Any message encrypted by the public key can only be decrypted by using the matching private key. Any message that is encrypted by using the private key can only be decrypted by using the matching public key. Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

How can encryption protect data in an e-mail? It can ‘scramble’ the email, and only the intended recipient can de-scramble it. Therefore sensitive information can be locked away. Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

How can encryption protect data on a hard disk? It can protect sensitive information contained on the disk. Bank Records Personal Information Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

How can encryption protect data in on an HTTPS websites Any information sent by a web-browser to a web server, or the other way, can be encrypted, so that no-one can intercept the information. Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

Exam Questions Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)