Lesson Objectives Aims You should know about: 1.3.1:

Slides:



Advertisements
Similar presentations
CIS 193A – Lesson6 CRYPTOGRAPHY RAPELCGRQ. CIS 193A – Lesson6 Focus Question Which cryptographic methods help computer users maintain confidentiality,
Advertisements

Copyright Justin Klein Keane InfoSec Training Encryption.
Cryptography Basic (cont)
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Encryption Methods By: Michael A. Scott
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
Cryptography, Authentication and Digital Signatures
Improving Encryption Algorithms Betty Huang Computer Systems Lab
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Network Security David Lazăr.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Network Security. Three tools Hash Function Block Cipher Public Key / Private Key.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
ENGR 101 Compression and Encryption. Todays Lecture  Encryption  Symmetric Ciphers  Public Key Cryptography  Hashing.
Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Hervey Allen Phil Regnauld 15 June 2009 Papeete, French Polynesia DNSSEC Tutorial: Public / Private.
Security Protecting information data confidentiality
Encryption with Keys and Passwords
Web Applications Security Cryptography 1
Security Using Armstrong Numbers and Authentication using Colors
Attacks on Public Key Encryption Algorithms
IT443 – Network Security Administration Instructor: Bo Sheng
Tutorial on Creating Certificates SSH Kerberos
Cryptography Why Cryptography Symmetric Encryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Cryptographic Hash Functions
Cryptographic Hash Function
e-Health Platform End 2 End encryption
Chapter 5: The Art of Ensuring Integrity
Encoding, Encryption, and Hashing
Network Security.
Instructor Materials Chapter 5: The Art of Ensuring Integrity
Introduction to Security
Tutorial on Creating Certificates SSH Kerberos
Introduction to security goals and usage of cryptographic algorithms
Cryptography.
Cryptographic Hash Functions
One-way Encryption Properties
Chap 6: Security and Protection
ICS 454 Principles of Cryptography
PART VII Security.
Security in Network Communications
Lesson Objectives Aims You should know about: 1.3.1:
Public-key encryption
Analysis of the RSA Encryption Algorithm
Information Security Tanachat Arayachutinan
ICS 454 Principles of Cryptography
Engineering Secure Software
Security Analysis of Network Protocols
Instructor Materials Chapter 5: The Art of Ensuring Integrity
Network Security.
Outline Using cryptography in networks IPSec SSL and TLS.
Chapter 3 - Public-Key Cryptography & Authentication
Instructor Materials Chapter 5: Ensuring Integrity
Cryptography Fundamentals
….for authentication and confidentiality PGP
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

Lesson Objectives Aims You should know about: 1.3.1: (d) Different uses of hashing.

Let’s work backwards Some things to understand: Encoding Encryption Hashing Obfuscation

Obfuscation The idea of making something difficult for a human to understand It is NOT encryption It is an easily reversible process Computers can still understand it easily

Encoding Encoding is the process of turning something into a binary form Or turning data into a form that can be understood by another system ASCII, Unicode, UTF are examples of encoding

Encryption The transforming of data so that it can be kept secret/safe regardless of interception Not designed to be easy to use! Only specific people (key holders) can reverse the transformation

Generally data is encoded with private key – kept secret Encryption Generally data is encoded with private key – kept secret To decrypt the data you need: The cipher text The algorithm The key Examples: AES, Blowfish, RSA, PGP

Hashing A one way mathematical function which should produce a unique output for any given input The same input will always produce the same hash every time

Hash rules The same input will always produce the same output. Multiple disparate inputs should not produce the same output. It should not be possible to go from the output to the input. Any modification of a given input should result in drastic change to the hash.

A file can be hashed to ensure integrity Uses A file can be hashed to ensure integrity If even the smallest change is made, the hash changes Wrong hash = tampered file Data can be hashed to make it incredibly quick to search/find elements

Because of its one way nature Another use Because of its one way nature And the fact you shouldn’t be able to work out the input from the output… Passwords are often hashed when stored in databases User signs up – password is hashed using an algorithm User signs in, password hashed, if they match then access is granted This can lead to issues…

Collisions There is no perfect hashing algorithm It’s just incredibly unlikely that two things will produce the same output. When this occurs, a collision has happened:

A stupendously good website Read this link: http://www.unixwiz.net/techtips/iguide-crypto-hashes.html Make notes on: Why hashes are NOT encryption Collisions Collision resistance Problems with hashing Examples of hashing algorithms (MD4, 5 etc)

Review/Success Criteria