Encryption, Cryptography, and Steganography:

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

L0. Introduction Rocky K. C. Chang, January 2013.
Cryptography The science of writing in secret code.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Security+ Guide to Network Security Fundamentals
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Computer and Network Security Risanuri Hidayat, Ir., M.Sc.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Information Security. Information Security Requirements Confidentiality: Protection from disclosure to unauthorised persons Access control: Unauthorised.
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
CS 4001Mary Jean Harrold1 Class 9 ŸQuestions about term paper—list of possible topics available on line—proposal due 9/27 ŸCommunications assignment—discuss.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Linux Networking and Security Chapter 8 Making Data Secure.
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Computer encryption is… Based on the science of cryptography.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Types of Electronic Infection
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Security is often cited as a major barrier to electronic commerce. Prospective buyers are leery of sending credit card information over the web. Prospective.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Mort Anvari Introduction to Encryption Technology To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
1 Thuy, Le Huu | Pentalog VN Web Services Security.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Network Security Celia Li Computer Science and Engineering York University.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Hervey Allen Phil Regnauld 15 June 2009 Papeete, French Polynesia DNSSEC Tutorial: Public / Private.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
Security Protecting information data confidentiality
Digital Steganography
CIT 380: Securing Computer Systems
Introduction to Information Security
Welcome
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Cryptography And Network Security
Chapter 17 Risks, Security and Disaster Recovery
Chapter 8 Network Security.
Encryption
Presented by: Dr. Munam Ali Shah
IS3230 Access Security Unit 9 PKI and Encryption
Pooja programmer,cse department
Visit for more Learning Resources
Anonymity - Background
Security Risanuri Hidayat 21 February 2019 security.
Outline Using cryptography in networks IPSec SSL and TLS.
Lecture 10: Network Security.
Cryptography and Cryptanalysis
Computer Security.
Unit 8 Network Security.
Electronic Payment Security Technologies
Operating Systems Concepts
Introduction to Encryption Technology
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Encryption, Cryptography, and Steganography: An introduction to coded communications 11/24/2018

Agenda Introduction to Encryption Cryptography Steganography Surveillance Summary 11/24/2018

Encryption The translation of information into a secret code Typically utilizes secret keys or passwords Security that is exercised heavily in E-Commerce transactions and authentication 11/24/2018

Cryptography The science of information security Includes analog methods: ex. microdots, merging words with images Scrambling plaintext into ciphertext 11/24/2018

Example of microdots... From this . To this... Example magnified 300X 11/24/2018

Cryptography encryption ---------> decryption ---------> Plaintext Plaintext ciphertext 11/24/2018

Types of Cryptography Hash Functions: no key, “digital fingerprint” of a larger document Secret Key Cryptography (symmetric encryption): one key Public Key Cryptography: two keys - public & private 11/24/2018

Use of Cryptography Security for corporate and government information. Privacy Digital signatures and authentication Currently no restrictions on use in the United States Possible criminal use: impede investigation Rumored to be used in recent terrorist attacks 11/24/2018

Steganography Steganography is the art of hiding a secret message inside another message. Digital watermarking and fingerprinting of audio and video. Not intended to replace cryptography, but supplement it. 11/24/2018

Steganography: an example... Computer files contain unused or insignificant areas of data Hard to detect Special software to read 11/24/2018

Steganography: Other Examples 11/24/2018

FBI Methods of Policing Encryption Carnivore (DCS1000) “Magic Lantern” 11/24/2018

Carnivore File “sniffer” Detects IP Packets Imperfect against many encryption methods Controversial 11/24/2018

“Magic Lantern” Based on Carnivore Trojan Horse program Installs on a suspect’s machine and obtains encryption keys Reads keystrokes Ethics and implementation debated 11/24/2018

Conclusion Encryption currently has many legitimate and necessary uses Government has become more concerned about its applications Future…? 11/24/2018

This presentation is also on the Web at: Turbokinetic.com/files.html Questions & Answers This presentation is also on the Web at: Turbokinetic.com/files.html 11/24/2018