MSIT 543 Cryptography Concepts and Techniques Symmetric Key Encryption

Slides:



Advertisements
Similar presentations
Conventional Encryption: Algorithms
Advertisements

Modern Cryptography.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Cryptography and Its Algorithms Scott Chappell. What is Cryptography?  Definition: the art of writing or solving codes.
DES: Data Encryption Standard
INCS 741: Cryptography Overview and Basic Concepts.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Symmetric-Key Cryptography CS 161: Computer Security Prof. Raluca Ada Popa Sept 13, 2016.
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Lesson 2-18 AP Computer Science Principles
Cracking Encrypted Systems
Symmetric Cryptography
Cryptography Why Cryptography Symmetric Encryption
Privacy & Security.
Cryptography & Security
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
What is network security?
B. R. Chandavarkar CSE Dept., NITK Surathkal
HEY DOUG HOW ARE YOU? NKE JUAM NUC GXK EUA. HEY DOUG HOW ARE YOU? NKE JUAM NUC GXK EUA.
Network Security.
Classical Encryption techniques
Public-key Cryptography
Encryption
Basic Network Encryption
Cryptography.
Outline Desirable characteristics of ciphers Uses of cryptography
Lecture 2.2: Private Key Cryptography II
Lecture 3: Symmetric Key Encryption
Chap 6: Security and Protection
M3: Encryption r By Andrew Stringer.
Cryptography Basics and Symmetric Cryptography
ICS 454 Principles of Cryptography
Cryptography Lecture 18.
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Quantum Cryptography Alok.T.J EC 11.
Security through Encryption
PART VII Security.
Rivest, Shamir and Adleman
Introduction to Symmetric-key and Public-key Cryptography
Security.
Cryptography: Basics (2)
برگرفته از اسلایدهای © University of Glamorgan
ICS 454 Principles of Cryptography
Current Encryption Methods in Distributed Systems
MSIT 543 Cryptography Concepts and Techniques Hashes
Appendix 5: Cryptography p
MSIT 543 Cryptography Concepts and Techniques How RSA Encryption Works
Cryptography a Presentation Prepared by Vytautas Kondratas.
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Slide design: Dr. Mark L. Hornick
Basic Network Encryption
Public – Private Key Cryptography
Cryptography Lecture 17.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Modern Cryptography.
Secure Diffie-Hellman Algorithm
Diffie-Hellman Algorithm
Presentation transcript:

MSIT 543 Cryptography Concepts and Techniques Symmetric Key Encryption Dr Jeffrey A Robinson

How Encryption Works Substitution Cyphers Codes Keys See classic cyphers at http://www.cryptool-online.org/index.php?option=com_content&view=article&id=47&Itemid=29&lang=en Codes ASCII, Grey binary code, Morse code, EBCDIC (http://www-03.ibm.com/systems/z/os/zos/features/unix/bpxa1p03.html ) Keys Keywords and phrases (books etc.)

Symmetric Key Encryption Extracts from http://www.wimp.com/howencryption/ http://www.artoftheproblem.net/ Part 7 Prevent eavesdropping Or unauthorized access to information

Symmetric Key Encryption Consider Alice and Bob and people who want to securely exchange messages, but Eve is a potential eavesdropper.

Symmetric Key Encryption One way discrete functions

Symmetric Key Encryption First, in open text, Bob and Alice agree on a prime (3) and a modulus to use (Eve can eavesdrop)

Symmetric Key Encryption Next Alice picks a PRIVATE KEY (random number 54) and uses the prime and modulus to generate a result (15) that she sends to Bob (Eve can still eavesdrop)

Symmetric Key Encryption Next Bob picks a random number (24) and generates a result and send the result back to Alice (16). (Eve can still eavesdrop and know both results but neither random number)

Symmetric Key Encryption Bob and Alice now know their own number and the result of the other person. (Eve only knows the results)

Symmetric Key Encryption And here is the heart of the trick Alice takes Bob’s result and raises it to the power of her private number, which is the same as the original prime raised to both private numbers

Symmetric Key Encryption This generates a new number which will become the encryption key used by Alice

Symmetric Key Encryption Similarly, Bob takes Alice’s result and raises it to his private number which is the same as the original prime raised to both private numbers

Symmetric Key Encryption Bob and Alice now share a common (symmetric) encryption key that they can use to encrypt messages Eve cannot know the result (the shared key) without knowing both private numbers

Symmetric Key Encryption Thus Bob and Alice now share a common, symmetric, but completely private key. Now…consider this with numbers that are 128 or 256 digits long.

Symmetric Key Encryption - DES The Data Encryption Standard (DES, was a predominant symmetric-key algorithm for the encryption of electronic data through the 1970’s. Developed in the early 1970s at IBM and based on an earlier design by Horst Feistel, the algorithm was submitted to the National Bureau of Standards (NBS) following the agency's invitation to propose a candidate for the protection of sensitive, unclassified electronic government data.

Symmetric Key Encryption - DES However, controversies arose out of classified design elements, a relatively short key length of the symmetric-key block cipher design, and the involvement of the NSA, nourishing suspicions about a backdoor. DES is now considered to be insecure for many applications. This is chiefly due to the 56-bit key size being too small In January, 1999, distributed.net and the Electronic Frontier Foundation collaborated to publicly break a DES key in 22 hours and 15 minutes

Symmetric Encryption Keys - TDES In cryptography, Triple DES (3DES) is the common name for the Triple Data Encryption Algorithm (TDEA or Triple DEA) symmetric-key block cipher, which applies the Data Encryption Standard (DES) cipher algorithm three times to each data block. The original DES cipher's key size of 56 bits was generally sufficient when that algorithm was designed, but the availability of increasing computational power made brute-force attacks feasible. Triple DES provides a relatively simple method of increasing the key size of DES to protect against such attacks, without the need to design a completely new block cipher algorithm.

Newer Algorithms Newer symmetric key encryption algorithms have been developed (using longer keys, thus making them more difficult to crack). These include: AES Blowfish