Basic of Modern Cryptography

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Cryptography and Network Security Chapter 9
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
Cryptography Week-6.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Symmetric and Asymmetric Ciphers. Symmetric Encryption  or conventional / private-key / single-key  sender and recipient share a common key  all classical.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Data Security and Encryption (CSE348) 1. Lecture # 15 2.
Cryptography, Authentication and Digital Signatures
1 Public-Key Cryptography and Message Authentication.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Intro to Cryptography Lesson Introduction
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Introduction (Pendahuluan)  Information Security  Criptography.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Network security 1. Security taxonomy Physical security Resource exhaustion - DDoS system/network vulnerabilities Key-based security.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
CS480 Cryptography and Information Security
Basics of Cryptography
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Cryptography Why Cryptography Symmetric Encryption
B. R. Chandavarkar CSE Dept., NITK Surathkal
Public Key Encryption and the RSA Algorithm
Cryptography.
Introduction Of System Security
Encryption
Information and Network Security
Cryptography.
CSCI-235 Micro-Computer Applications
Public-Key Cryptography
Security through Encryption
PART VII Security.
Introduction to Symmetric-key and Public-key Cryptography
“Public Key Cryptography” & “RSA”
NET 311 Information Security
Chapter 4 Cryptography / Encryption
NET 311 Information Security
Chapter -8 Digital Signatures
DISSERTATION ON CRYPTOGRAPHY.
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
Chapter 29 Cryptography and Network Security
Unit 2: Cryptography & Cryptographic Algorithm
Computer Security Chapter Two
Basics Of Symmetric Encryption
Digital Signatures Network Security.
Chapter 1: Introduction
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Basic of Modern Cryptography -By Sheetal (For CSIT)

Modern Cryptography: Definition cryptography is the study of secret (crypto-) writing (-graphy) concerned with developing algorithms which may be used to: hide the context of some message from all except the sender and recipient (privacy or secrecy), and/or verify the correctness of a message to the recipient (authentication) form the basis of many technological solutions to computer and communications security problems

Cryptanalysis Google Snapshot:

Cryptanalysis

Frequently used term Plain text: the original intelligible message Cipher text: the transformed message Cipher: an algorithm for transforming an intelligible message into one that is unintelligible by transposition and/or substitution methods Key: some critical information used by the cipher, known only to the sender & receiver Encipher (encode): the process of converting plaintext to ciphertext using a cipher and a key Decipher (decode): the process of converting ciphertext back into plaintext using a cipher and a key

Frequently used term Cryptanalysis: the study of principles and methods of transforming an unintelligible message back into an intelligible message without knowledge of the key. Also called codebreaking Cryptology: both cryptography and cryptanalysis Code: an algorithm for transforming an intelligible message into an unintelligible one using a code-book

Encryption and Decryption Process of converting plain text into cypher text. C = E_(K)(P) Decryption: Process of converting cypher into plain text P = E_(K)^(-1)(C)

Cryptosystem 5-tuple system (E,D,P,K,C) Example: Ceasor Cipher: K = {i : i is int and 0<=i<=25 E= { Ek : k € K and for all letter P, Ek(p)= (p+k) mod 26 D = { Dk : k € K and for all letter C, Dk(c)= (26+c-k) mod 26

Basic Components of Data security Confidentiality Keeping data and resources hidden Integrity Data integrity (integrity) Origin integrity (authentication) Availability Enabling access to data and resources Confidentiality: a good example is cryptography, which traditionally is used to protect secret messages. But cryptography is traditionally used to protect data, not resources. Resources are protected by limiting information, for example by using firewalls or address translation mechanisms. Integrity: a good example here is that of an interrupted database transaction, leaving the database in an inconsistent state (this foreshadows the Clark-Wilson model). Trustworthiness of both data and origin affects integrity, as noted in the book’s example. That integrity is tied to trustworthiness makes it much harder to quantify than confidentiality. Cryptography provides mechanisms for detecting violations of integrity, but not preventing them (e.g., a digital signature can be used to determine if data has changed). Availability: this is usually defined in terms of “quality of service,” in which authorized users are expected to receive a specific level of service (stated in terms of a metric). Denial of service attacks are attempts to block availability.

Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and receiver If this key is disclosed communications are compromised Also is symmetric, parties are equal Hence does not protect sender from receiver forging a message & claiming is sent by sender The two parties must have met before at least once to share the key. The development of public-key cryptography is the greatest and perhaps the only true revolution in the entire history of cryptography. From its earliest beginnings to modern times, virtually all cryptographic systems have been based on the elementary tools of substitution and permutation, and can be classed as private/secret/single key (symmetric) systems. All classical, and modern block and stream ciphers are of this form.

Public-Key Cryptography Probably most significant advance in the 3000 year history of cryptography Uses two keys – a public & a private key Asymmetric since parties are not equal Uses clever application of number theoretic concepts to function Complements rather than replaces private key crypto The two parties need not have met . The two may be strangers, half way around the globe. Will now discuss the radically different public key systems, in which two keys are used. Public-key cryptography provides a radical departure from all that has gone before. The development of public-key cryptography is the greatest and perhaps the only true revolution in the entire history of cryptography. It is asymmetric, involving the use of two separate keys, in contrast to symmetric encryption, that uses only one key. Anyone knowing the public key can encrypt messages or verify signatures, but cannot decrypt messages or create signatures, counter-intuitive though this may seem. The use of two keys has profound consequences in the areas of confidentiality, key distribution, and authentication. It works by the clever use of number theory problems that are easy one way but hard the other. Note that public key schemes are neither more nor less secure than private key (security depends on the key size for both), nor do they replace private key schemes (they are too slow to do so), rather they complement them. Both also have issues with key distribution, requiring the use of some suitable protocol.

Digital Signatures Have looked at message authentication Digital signatures provide the ability to: verify author, date & time of signature authenticate message contents be verified by third parties to resolve disputes Hence include authentication function with additional capabilities The most important development from the work on public-key cryptography is the digital signature. Message authentication protects two parties who exchange messages from any third party. However, it does not protect the two parties against each other either fraudulently creating, or denying creation, of a message. A digital signature is analogous to the handwritten signature, and provides a set of security capabilities that would be difficult to implement in any other way. It must have the following properties: • It must verify the author and the date and time of the signature • It must to authenticate the contents at the time of the signature • It must be verifiable by third parties, to resolve disputes Thus, the digital signature function includes the authentication function.

Digital Signature Model Stallings Figure 13.1 is a generic model of the process of making and using digital signatures. Bob can sign a message using a digital signature generation algorithm. The inputs to the algorithm are the message and Bob's private key. Any other user, say Alice, can verify the signature using a verification algorithm, whose inputs are the message, the signature, and Bob's public key.

?