Chapter 6 Cryptography CISSP Study Guide BIS 4113/6113.

Slides:



Advertisements
Similar presentations
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Advertisements

Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Cryptography, Authentication and Digital Signatures
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Encryption.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Virtual Private Network (VPN)
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
CIA AAA. C I A Confidentiality I A Confidentiality Integrity A.
CIM Cryptograhic Concepts Overview1 Cryptographic Concepts Overview Chapter 2- Cryptography and Network Security by Stallings for Details.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Secure communication Informatics for economists II Jan Přichystal
Unit 3 Section 6.4: Internet Security
The Secure Sockets Layer (SSL) Protocol
Web Applications Security Cryptography 1
Basics of Cryptography
CSc 8320 Advanced Operating Systems Barnali Chakrabarty
Symmetric and Asymmetric Encryption
ISA 400 Management of Information Security
Symmetric Cryptography
Cryptography Dr. X.
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
e-Health Platform End 2 End encryption
Security.
Cryptography CS Principles January 19, 2017.
Data Encryption Standard
Encryption
Cryptography.
Cryptography Basics and Symmetric Cryptography
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
AES (Advance Encryption Standard)
Security.
The Secure Sockets Layer (SSL) Protocol
Cryptography a Presentation Prepared by Vytautas Kondratas.
Install AD Certificate Services
DISSERTATION ON CRYPTOGRAPHY.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Electronic Payment Security Technologies
Computer Security Chapter Two
Fluency with Information Technology Lawrence Snyder
Introduction to Cryptography
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Chapter 6 Cryptography CISSP Study Guide BIS 4113/6113

Goals of Cryptography Confidentiality Integrity Authentication Nonrepudiation Prevents masquerading as the sender AES Example

Historical Uses of Cryptography Caesar Cipher Civil War

World War II Program Ultra Enigma Machine “Windtalkers”

Basic Terminology “Security through obscurity” Plain Text Cipher Text Encryption Decryption Kerchoff’s Principle Alogrithm public, keys kept private Codes vs. Ciphers Data at Rest / Data in Motion

Encyrption Algorithms Symmetric Key “Shared secret” Shortcomings Key distribution Key regeneration every time user leaves group Internet Encryption Decryption P C C P Secret Key Secret Key

Examples AES example Banking transactions Many VPN connections One half of SSL (p.220)

Encyrption Algorithms Asymmetric Key Same key pair used for all users Private key cannot be derived from public key Shortcomings Slow speed of operation Internet Encryption Decryption P C C P Receiver’s Public Key Receiver’s Private Key

Other Comparisons (p.386) Symmetric Asymmetric Encryption Requirements Single Shared Key (2 Privates) Key Pair Sets (Public & Private) Key Exchange “Out of Band” “In Band” Adding Additional Users Not Scalable Scalable Operation Fast Slow Amount of Data Bulk Encryption Small Blocks Goals Achieved (Better?) Confidentiality Integrity Authenticity Nonrepudiation

Private Key Management Key Transfer Offline distribution Public key transfer of private keys Key Storage Secondary storage Non-volatile RAM Key Use Periodic rotation Crytographic Life Cycle

Assignment #4 Generating Asymmetric Key Pairs Send me your public key