Cryptography a Presentation Prepared by Vytautas Kondratas.

Slides:



Advertisements
Similar presentations
the basics cryptography deals with techniques for secure communication in the presence of third parties (adversaries). modern cryptography uses mathematics,
Advertisements

A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
Modern Cryptography.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Public Key Model 8. Cryptography part 2.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Cryptography Week-6.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
April 20023CSG11 Electronic Commerce Encryption John Wordsworth Department of Computer Science The University of Reading Room.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.
Cryptography – Test Review
A Summary in Fifteen Minutes mas y menos
Digital Signatures.
Basics of Cryptography
Security Outline Encryption Algorithms Authentication Protocols
Cracking Encrypted Systems
Symmetric and Asymmetric Encryption
Cryptography Dr. X.
Cryptography Why Cryptography Symmetric Encryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Privacy & Security.
Public Key Encryption Systems
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
What is network security?
Chapter-2 Classical Encryption Techniques.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Introduction to security goals and usage of cryptographic algorithms
Networks Encryption.
Lecture 3: Symmetric Key Encryption
M3: Encryption r By Andrew Stringer.
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
Chapter 3:Cryptography (16M)
AES (Advance Encryption Standard)
Security through Encryption
PART VII Security.
Introduction to Symmetric-key and Public-key Cryptography
Security.
Cryptography “The Secret Code Language”
Cryptography and Network Security
برگرفته از اسلایدهای © University of Glamorgan
Simple Encryption- Lesson 5
Foundation of Security
CS 115: COMPUTING FOR The Socio-Techno Web
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
Digital Communications
Unit 2: Cryptography & Cryptographic Algorithm
DES (Data Encryption Standard)
Basic of Modern Cryptography
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Lecture 18: Cryptography AP Computer Science Principles
Fluency with Information Technology Lawrence Snyder
Operating Systems Concepts
Modern Cryptography.
Public Key Encryption Systems
Security: Public Key Cryptography
Secure Diffie-Hellman Algorithm
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Cryptography a Presentation Prepared by Vytautas Kondratas

What is it? Kryptós + graphein -> secret writing Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries. In order to encrypt information, a cypher is used.

Cypher It’s an algorithm or technique that converts plain text into cypher text. Cypher text is gibberish unless you have the key, which lets you undo the cypher. ENCRYPTION – process of making text secret. DECRYPTION – reverse process. Transposition and Substitution cyphers. Permutation cyphers.

Permutation cypher

History Cyphers have been used long before computers ever showed up. Julius Caesar used a substitution cipher to encrypt private correspondence. Mary, Queen of Scots was executed after her plans to kill Queen Elizabeth were exposed by deciphering a secret message.

Enigma Automated encryption machine used by the Nazis to encrypt their wartime communications. It was the most complex encryption device of its time. Was eventually cracked by Alan Turing and his team.

How it worked

Software cyphers Data Encryption Standard – one of the earliest software cyphers to become widespread. At its inception used keys that were 56 bits long, which meant there were 256 different keys. With the increase in computing power this standard became easy to brute-force crack.

Software cyphers Advanced Encryption Standard – finalized version of DES, which used 128, 192 or 256bit long keys, making them near impossible to crack with brute force attacks. Principle: Chopping data into 16bit blocks Each block gets substitutions, permutations and some other operations based on key value Procedure is repeated 10+ times Used anywhere from iPhone encryption to HTTPS or WiFi Protection.

Key Exchange In the old days key were shared by voice or paper. This would never work in the information era. A way for a server to send a secret key over the public internet to a user, wishing to connect securely, was necessary. Key exchange – an algorithm that lets two computers agree on a key without ever sending one.

How it works? Diffie-Hellman Key exchange is achieved by one way functions (hard to reverse operations, e.g. xy mod z = a). Using these functions on both sender and receiver make a shared key which they use to encrypt their communications.

Asymmetric encryption Uses 2 keys: public and private. Anyone with a public key can encrypt a message but only the private key can be used to decrypt it. Reverse is possible too. Example use - signing. Only one person can encrypt a message, meaning if you can decrypt such a message, it is from a confirmed source. Most popular technique today: RSA.

MIAFQ BGW YGK BGWK MODT!

THANK YOU FOR YOUR TIME!