M3: Encryption r By Andrew Stringer.

Slides:



Advertisements
Similar presentations
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Encryption Coursepak little bit in chap 10 of reed.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
ENCRYPTION Alex Piercey Erica Reid. What is Encryption?  Information secured to hide from the public  Used in many different ways but is mostly used.
Cryptography By, Anthony Lonigro & Valentine Mbah.
LIS508 last lecture: Cryptography & Security Thomas Krichel
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
System Security: Cryptography Technologies CPE Operating Systems
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
System Security: Cryptography Technologies CPE Operating Systems
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Encryption with Keys and Passwords
Web Security.
Digital Signatures.
Advanced Computer Networks
Encryption.
Affine Cipher.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Cryptography Why Cryptography Symmetric Encryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Security.
Public-key Cryptography
Cryptography and Security Technologies
Fundamental Concepts in Security and its Application Cloud Computing
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Vernam Cipher Group Members: Muhammad Awais Muhammad Hasnain khan
Cryptography.
CSCI-235 Micro-Computer Applications
Topic 1: Data, information, knowledge and processing
Lesson 4-5 AP Computer Science Principles
Lesson 5: Simple Encryption
Cryptography Survey.
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
Chapter 3:Cryptography (16M)
PART VII Security.
Rivest, Shamir and Adleman
Analysis of the RSA Encryption Algorithm
Security.
Cryptography Survey.
CS Introduction to Operating Systems
Enabling Technology1: Cryptography
Cryptography and Network Security
Simple Encryption- Lesson 5
Cryptography a Presentation Prepared by Vytautas Kondratas.
Lesson 7: Simple Encryption
Public-Key, Digital Signatures, Management, Security
Digital Communications
Computer Security Chapter Two
Fluency with Information Technology Lawrence Snyder
Cryptanalysis Network Security.
Chapter Goals Define cryptography
Secure Diffie-Hellman Algorithm
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

M3: Encryption r By Andrew Stringer

What is it? Encryption: A way of converting data(text, film and images) into something which makes no sense unless you have a key. 2

Why encrypt and decrypt? Text can be encrypted, to make sure the privacy of the data sent over a network between a two devices stays secure. Cryptography - The methods to encrypt text. Cryptanalysis - How to decode an encrypted text. Conventional or single key encryption - a simple algorithm is used to transform the text Substitution cipher - each letter of the alphabet is substituted with a different letter or symbol. (e.g., A=1, B=2) Ceasar's method - replace every letter in the alphabet with the letter 3 away (E.g., A=D, B=E, C=F, D=G, E=H, etc…) 3

Encryption And Decryption Other way of substituting data is to plan random substitutions, so they are a bit harder to crack. The sender uses the encryption to encrypt the message The sender transmits the message to the receiver The receiver decodes the message How does this become decrypted? Q:How can this be done securely so that no one else can decode the message? A: The sender needs to send the key to the receiver. For example: When purchasing from the wbes, the buyer’s workstation must encrypt the data before it sends it over the Internet to the seller’s server 4

Encryption Most methods of encrypting use mathematical formulas and have a key to encode the data The encryption key is a very large number (1024 bit value). The longer the number the harder is it to crack. 5

Encryption And Decryption Symmetric/ Private Key Encryption DES (Data Encryption Standard) is very commonly used Because each sender and receiver needs a different key, this encryption is very secure and is used by governments. It is rarely used for e-commerce transactions over the Internet This type encryption requires a secure way to receive the key to both devices 6

Encryption And Decryption Asymmetric / Public Key Encryption Uses two numeric keys The public key is available to anyone wishing to communicate securely with the key’s owner, the private key is available only to the owner (have mentioned this in P3) Anyone who has a public key can encrypt information. however, cannot decrypt it. A new key is sent to the device requires the private key so it can be decrypted. 7

Example of Asymmetric Encryption Choose two large prime numbers, p and q and compute N = p * q and x = (p-1)*(q-1) Choose a number relatively prime to x and call it e. This means that e is not a prime factor of x or a multiple of it. Find d such that e * d = 1 mod x. To encrypt: Cipher = Plaintexte (mod n) To decrypt: Plaintext = Cipherd (mod n) Choose p = 7 and q = 13 We then calculate N = 7∗13 = 91 and x=(p−1)(q−1) = 72 We next select ke relatively prime to 72 and< 72, yielding 5 Finally,we calculate kd such that kekd mod 72 = 1, yielding 29 public key (ke, N) = (5, 91) and private key (kd ,N) = (29, 91) 32 codes in 2: 325= 2 (mod 91) 2 decodes into 32: 229=32 (mod 91) 8