Slide design: Dr. Mark L. Hornick

Slides:



Advertisements
Similar presentations
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Advertisements

McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption Methods By: Michael A. Scott
Chapter 12 Cryptography (slides edited by Erin Chambers)
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
CS2910 Week 2, Class 1 Today Return Lab 1 Muddiest Points Quiz Parsing Data in Python SE-2811 Slide design: Dr. Mark L. Hornick Content: Dr. Hornick Errors:
CS2910 Week 10, Class 1 Today Modular Arithmetic RSA Week 10, Monday Quiz: Potential topics TCP window size & header format Public/private key encryption.
CS2852 Week 7, Class 1 Today Binary Search Tree Implementing add Implementing find Return Quiz 4 (second attempt) Both sections are graded SE-2811 Slide.
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Slides for Chapter 11: Security.
Week 7, Class 1: The Command Pattern (cont.) Get Ready for Poll Everywhere Labs 2 & 3 returned Lab 7 due this evening at 11pm Quiz tomorrow at start of.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CS2910 Week 8, Class 2 Today Return Quiz Look at Schedule TCP implementation! Week 8, Monday Quiz on SMTP May include some questions requiring you to interpret.
CS2910 Week 7, Class 1 Today Capturing SMTP with Thunderbird Tomorrow Extra office hour at 11 am (right after lab) Friday Office hour cancelled SE-2811.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Secret Key Cryptography
Web Security.
Reviews Rocky K. C. Chang 20 April 2007.
Basics of Cryptography
Symmetric Cryptography
IT443 – Network Security Administration Instructor: Bo Sheng
Cryptography Much of computer security is about keeping secrets
Cryptography Why Cryptography Symmetric Encryption
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
What is network security?
Security.
Outline Desirable characteristics of ciphers Uses of cryptography
CS2911 Week 8, Class 1 Today Week 8, Lab period Muddiest Point
Chapter 8 Network Security.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography.
Outline Desirable characteristics of ciphers Stream and block ciphers
Outline Desirable characteristics of ciphers Uses of cryptography
Presented by: Dr. Munam Ali Shah
Lecture 2.2: Private Key Cryptography II
Lecture 3: Symmetric Key Encryption
Cryptography Basics and Symmetric Cryptography
Security at the Application Layer: PGP and S/MIME
Network Security Basics
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Security through Encryption
PART VII Security.
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
Introduction to Symmetric-key and Public-key Cryptography
Security.
csci5233 computer security & integrity (Chap. 4)
Cryptography and Network Security
Block vs Stream Ciphers
CS2911 Week 9, Class 1 Today Discussion on RSA Video Eavesdropping
NET 311 Information Security
CS2911 Week 7, Class 1 Today Map (dict) objects in Python
CS2911 Week 8, Class 1 Today Week 8, Lab period Muddiest Point
Slide design: Dr. Mark L. Hornick
CS2911 Week 7, Class 3 Today Week 8, Lab period Muddiest Point
Slide design: Dr. Mark L. Hornick
Modern Cryptography.
CS2911 Week 8, Class 1 Today Week 8, Lab period Muddiest Point
Security: Public Key Cryptography
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Slide design: Dr. Mark L. Hornick CS2910 4/25/2019 CS2910 Week 9, Class 2 Today Network Security – Focus on Encryption Week 9, Monday Quiz: Potential topics TCP window size & header format Public/private key encryption Sharing symmetric keys Applying a stream cipher Known-plaintext attack Unicode, UTF-8 encoding, and quoted-printable May include some questions requiring you to interpret or create raw data SE-2811 Slide design: Dr. Mark L. Hornick Content: Dr. Hornick Errors: Dr. Yoder Dr. Josiah Yoder

WWII Encryption: The Enigma Machine CS2910 4/25/2019 WWII Encryption: The Enigma Machine A story of a known-plaintext attack http://www.cnet.com/pictures/breaking-the-nazis-enigma-codes-at-bletchley-park-photos/2/ SE-2811 Dr.Yoder Dr. Josiah Yoder

WWII Encryption: The Enigma and the Bomb CS2910 4/25/2019 WWII Encryption: The Enigma and the Bomb Mavis Batey SE-2811 Dr.Yoder Dr. Josiah Yoder

CS2910 4/25/2019 Video Questions So if a key is only shared between two people, that means there must be a unique key for every pair? Also, when keys are generated, how are they shared securely over networks?? Are there standard encryption/decryption algorithms or do companies create and adopt their own? Would a company have different algorithms for each program or would they have a standard? How are modern day encryption keys generated and how do those work? Is there any way to tell whether a message has been manipulated/accessed in transmission due to a cryptographic attack? SE-2811 Dr.Yoder Dr. Josiah Yoder

CS2910 4/25/2019 Video Questions Why was the symmetric key and "caesar cipher" approach every considered a "secure" encryption? What is the most commonly used encryption algorithm for companies that store and send sensitive data? What does a session key do? Why would basic ciphers like Symmetric Key Systems be helpful, when not paired with other encryption methods at the same time? What would be an example of a "function" used in encryption? It was mentioned that a function is most commonly used instead of a table for block ciphers; What would be an example of a function that could be used? I am confused on what block cyphering is? I watched it multiple times and still dont quite understand. Also i thought there was a public and a private key not just one key? SE-2811 Dr.Yoder Dr. Josiah Yoder

CS2910 4/25/2019 Video Questions Given primes p,q: What is the point of z = (p-1)*(q-1)? What other types of encryption algorithms are there? Other than Symmetrical Encryption What is the most complex encryption algorithm that you know of? How does the receiver know the key? Can you explain more on the RSA Algorithm? Is it just an equation that requires extensive time and work to decipher a person's public key? Why is a session key generated for each message? I understand the backwards security, but I thought the purpose of the session key was to improve performance, but there is still a new one for each message. Why isn't gpg style encryption used more often (preshared public keys)? SE-2811 Dr.Yoder Dr. Josiah Yoder

CS2910 4/25/2019 Video Questions Why would cipher-block-chaining need to use encryption data from previous blocks to get the desired outcome of the same plain text resulting in differing encrypted text. Couldn't you use other data, such as block index? (IE, a simple Caesar cipher where the displacement value is the block index+1) In ciphertext encryption, how does the key remain a secret? In certain cases, it seems really easy to find out what the key is. How exactly does Xor encryption work/ what two values are being XOR'd? (I didn't quite get it from the video). A short example might help. Will we be learning about some of the other aspects of cryptography? (e.g. Forward secrecy, deniable authentication) What are the benefits of stream vs block? To increase security, why aren't privately designed algorithms more prevalent? Seems to add another layer on top of a private key. SE-2811 Dr.Yoder Dr. Josiah Yoder

CS2910 4/25/2019 Video Questions Is there an easy way to switch the key if it becomes compromised? what stops someone from intercepting an encrypted message, and changing the way it is encrypted and sending it on to the intended receiver? clarity on how a message sender is determined when it's a private or public key Where did the names Alice and Bob come from? How exactly does perfect future encryption work? SE-2811 Dr.Yoder Dr. Josiah Yoder

Themes Standard Algorithms Session Keys CS2910 4/25/2019 Themes Standard Algorithms What are they? How do they work? Why not make your own? Session Keys How to share keys? Why use if public/private keys are needed anyway? Why regenerate for every session? Detecting Forgery / Man-in-the middle Dr. Josiah Yoder

Standard Block Cipher Algorithms CS2910 4/25/2019 Standard Block Cipher Algorithms DES, Triple DES (Data Encryption Standard) NSA AES (Advanced Encryption Standard) NIST, but note NSA involvement in other algorithms published by NIST Blowfish Not standard. Self-published algorithm Why not write your own? (Because …) SE-2811 Dr.Yoder Dr. Josiah Yoder

https://www.polleverywhere.com/free_text_polls/zIp2tH2IVWjXv4H CS2910 4/25/2019 Muddiest Point SE-2811 Dr. Josiah Yoder Dr. Josiah Yoder