Encryption NSA – used to be able to crack most codes, technology has changed that Encryption is the art of encoding messages so they can’t be understood.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Presentation Layer Network Format Local Format Information Transformation “few standards, but a lot of ideas”
Encryption Methods By: Michael A. Scott
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Linux Networking and Security Chapter 8 Making Data Secure.
CS110: Computers and the Internet Encryption and Certificates.
Encryption Coursepak little bit in chap 10 of reed.
COEN 351 E-Commerce Security Essentials of Cryptography.
1 Today’s topics Security –Demo from RSA Security ( –Slides taken from Kevin Wayne & Robert Sedgewick at Princeton University –For further.
``Chaffing and Winnowing’’ & Crypto Policy Comments Ronald L. Rivest Cryptography and Information Security Group MIT Lab for Computer Science April 1998.
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 Network Security Basics. 2 Network Security Foundations: r what is security? r cryptography r authentication r message integrity r key distribution.
Lecture 2: Introduction to Cryptography
Overview of Cryptography & Its Applications
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Cryptography Gerard Klonarides. What is cryptography? Symmetric Encryption Symmetric Encryption Asymmetric Encryption Asymmetric Encryption Other cryptography.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
Privacy and Security Topics From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Known Information Software.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Secret Key Cryptography
Web Security.
Cryptography – Test Review
Digital Signatures.
Lesson 2-18 AP Computer Science Principles
Basics of Cryptography
CIT 380: Securing Computer Systems
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Privacy & Security.
Cryptography & Security
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Reactive Android Development
What is network security?
Uses Uses of cryptography Lab today on RSA
Public-key Cryptography
Chapter 8 Network Security.
Public Key Encryption and the RSA Algorithm
Big Numbers: Mathematics and Internet Commerce
Introduction to security goals and usage of cryptographic algorithms
Cryptography.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Lesson 4-5 AP Computer Science Principles
M3: Encryption r By Andrew Stringer.
Lesson 5: Simple Encryption
Some basic terminology
Modular Arithmetic and RSA Encryption
Encryption NSA – used to be able to crack most codes, technology has changed that Encryption is the art of encoding messages so they can’t be understood.
Public Key Infrastructure
Network Security Basics
Chapter 8 Network Security.
Security through Encryption
PART VII Security.
Encryption NSA – used to be able to crack most codes, technology has changed that. Now other methods are applied by NSA to access transmissions (see 2013.
Recap unit 2 Review cipher systems, RSA Digital signatures
CS 115: COMPUTING FOR The Socio-Techno Web
NET 311 Information Security
Public-Key, Digital Signatures, Management, Security
Chapter 3 - Public-Key Cryptography & Authentication
Fluency with Information Technology Lawrence Snyder
Security: Public Key Cryptography
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Encryption NSA – used to be able to crack most codes, technology has changed that Encryption is the art of encoding messages so they can’t be understood by eavesdroppers. Descrambling the encrypted message usually requires a “key”. Encryption has been used since the beginning of human communication in 2001 after 9/11/01 bills were being developed to provide keys held in escrow by the government so all messages could be accessed by the gov. 10/24/2001 Patriot Act does not deal with any encryption – Why? Whispers, roman cipher ITEC 102

E-Commerce E-commerce has become a dominate force in the economy. Encryption is critical to successful e-commerce. TCP/IP – all packets are open to view at every node along its path. Must encrypt messages due to internet architecture. Should email be encrypted? How? “The question is whether people should be able to conduct private conversations, immune from government surveillance, even when that surveillance is fully authorized by a court order.” Ron Rivest, MIT Commerce greater importance than terrorist threat. Email can be made secure but by default it is not. ITEC 102

Cryptography and Cryptanalysis “secret writing” found in Egyptian hiertoglyphics in 200 BC Ceasar’s cipher – substitution cipher (“D” for “A”, “E” for “B”, etc.) plaintext -> cipher applied -> ciphertext -> decode -> plaintext Frequency analysis can be used to break basic ciphers If the key is long enough, frequency analysis does not work – one time pad – can not be broken if used only once. Information theory – Claude Shannon, 1948 tempting to re-use one-time pads due to work involved – results in breakable codes. Code makers and breakers Mary Stuart used a known broken cipher, Mafia used Caesar cipher ITEC 102

Encryption in the Internet age Encoded messages look indecipherable – false sense of security. No central authority to give software command upgrades Confidence is good but certainty would be better Fundamental Tenet of Cryptography: If lots of smart people have failed to solve a problem, then it probably won’t be solved (soon). Holy grail of crypo – a provably secure encryption algorithm Any encryption process must be used to work. Code makers and breakers Mary Stuart used a known broken cipher, Mafia used Caesar cipher, WEP, MD5, RFID Bad systems still used by many because they think it is secure. ITEC 102

The enemy will know the system In general, published encryption methods that are open to the public are more reliable than secret ones. Kerckhoff’s principle (the enemy knows the system) Content Scrambling system (CSS) used on DVD was secret (for a while). Diffie, Hellman, and Merkle – Public Key Cryptography, 1976 How does Alice send Bob a msg. in private without knowing each other? – Public Key encryption – relies on hard to factor big numbers. Digital signatures – verifying who sent it – RSA and VeriSign https – “secure” – transmission is encrypted – not the message once it is at the server. New keys generated each time – cheap Pretty Good Privacy (PGP) – now owned by Symantec ITEC 102