Lesson Objectives Aims You should know about: 1.3.1:

Slides:



Advertisements
Similar presentations
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Advertisements

Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Digital Signatures. Anononymity and the Internet.
Secure communication Informatics for economists II Jan Přichystal
Copyright Justin Klein Keane InfoSec Training Encryption.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.
Encryption Methods By: Michael A. Scott
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Cryptography, Authentication and Digital Signatures
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Network Security – Special Topic on Skype Security.
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Network Security. Three tools Hash Function Block Cipher Public Key / Private Key.
April 20023CSG11 Electronic Commerce Encryption John Wordsworth Department of Computer Science The University of Reading Room.
Encryption Encryption: Transforms Message so that Interceptor Cannot Read it –Plaintext (original message) Not necessarily text; Can be graphics, etc.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Secure communication Informatics for economists II Jan Přichystal
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Encryption with Keys and Passwords
Web Security.
Digital Signatures.
Public Key Cryptography
Lesson 2-18 AP Computer Science Principles
Basics of Cryptography
IT443 – Network Security Administration Instructor: Bo Sheng
Crypto in information security
Cryptography Much of computer security is about keeping secrets
Cryptography Why Cryptography Symmetric Encryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Privacy & Security.
Cryptography & Security
Cryptographic Hash Function
e-Health Platform End 2 End encryption
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Reactive Android Development
Network Security.
Encryption
Introduction to security goals and usage of cryptographic algorithms
Cryptography.
Topic 1: Data, information, knowledge and processing
Presented by: Dr. Munam Ali Shah
M3: Encryption r By Andrew Stringer.
Chapter 3:Cryptography (16M)
Security through Encryption
PART VII Security.
Security.
Lesson Objectives Aims You should know about: 1.3.1:
Simple Encryption- Lesson 5
Engineering Secure Software
Network Security.
Cryptography Reference: Network Security
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
DISSERTATION ON CRYPTOGRAPHY.
Exercise 1: Let’s Communicate - Decrypt The message
Basics Of Symmetric Encryption
Digital Signature Standard (DSS)
Presentation transcript:

Lesson Objectives Aims You should know about: 1.3.1: (c) Symmetric and asymmetric encryption.

http://md5.online-toolz.com/tools/md5-generator.php Just to prove a point…

Did you do the reading?

Hashing - Summary Maps data/bits to a unique string (hash) The smallest change to source data results in large hash changes One way function Goal to avoid collisions, but collisions are always possible (collision = two or more inputs giving the same output) Quick to calculate the hash Output is always the same size for a given algorithm, smaller than input

Encryption “To be honest, the spooks love PGP,” Nicholas Weaver, a researcher at the International Computer Science Institute, told the Usenix Enigma conference in San Francisco. “It's really chatty and it gives them a lot of metadata and communication records. PGP is the NSA's friend.” http://www.theregister.co.uk/2016/01/27/nsa_loves_it_when_you_use_pgp/

Encryption A two way process in which data is scrambled as to make it meaningless without a key Only key holders should be able to encode and decode data Encrypted messages are said to be “cypher text”

Encryption The government would love easy access to your information… Encryption is a very hot topic at present – also covered later in the course in Ethics (so read the news…) It could be argued that computing would not have developed without war and…the need for secret communications …and breaking those communications

Symmetric encryption: Data is encoded using a given method Data is decrypted using the exact reverse of that method Very quick to set up and easy to use Prone to cracking/brute force

Asymmetric encryption Data is encrypted using a key… …and decrypted using a different key This means: Both keys would be needed to encrypt and decrypt intercepted messages Much more difficult to crack/brute force Usually known as Public Key Encryption

Recipient publishes their public key: PKE Recipient keeps their private key safe, this will be used to UNLOCK the data when it arrives Recipient publishes their public key: The sender (and anyone else) can encrypt using this (but that’s ok, right?) But it is one way, so cannot be used to decrypt When data arrives, the private key unlocks the data (only known to recipient)

Try it out – method a) http://www.online-toolz.com/tools/text-encryption-decryption.php Encode a message and look at the output Encode the SAME message twice – look at the output.

Now try this… Method b) https://www.infoencrypt.com/ Encrypt the same message again – what do you notice? Try the same message again – what do you notice?

What other popular encryption methods are there? Questions What kind of encryption is method a using? What kind of encryption is method b? What are the differences in the outputs? One of the methods is AES encryption, make notes on: What it is How it works How secure it is : http://www.eetimes.com/document.asp?doc_id=1279619 What other popular encryption methods are there?

Review/Success Criteria