Cryptology.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Cryptography The science of writing in secret code.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Encryption Methods By: Michael A. Scott
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
1st Class Discrete Structures الهياكل المتقطعة أستاذة المادة: م. م
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Cryptography, Authentication and Digital Signatures
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical.
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
Lecture 14 Public Key Cryptography and RSA. Summary principles of public-key cryptography principles of public-key cryptography RSA algorithm, implementation,
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Hervey Allen Phil Regnauld 15 June 2009 Papeete, French Polynesia DNSSEC Tutorial: Public / Private.
Cryptography – Test Review
Web Applications Security Cryptography 1
Symmetric and Asymmetric Encryption
ISA 400 Management of Information Security
Chapter 2 Basic Encryption and Decryption
Cryptography Dr. X.
Crypto in information security
Lecture 2.3. ENCRYPTION OF MESSAGES
ISA 330 Introduction to Proactive System Security
e-Health Platform End 2 End encryption
Public-Key Cryptography and RSA
Public-key Cryptography
Cryptography.
Cryptography.
CSCI-235 Micro-Computer Applications
IS3230 Access Security Unit 9 PKI and Encryption
Chapter 3:Cryptography (16M)
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Security through Encryption
PART VII Security.
Chapter 6 Cryptography CISSP Study Guide BIS 4113/6113.
Cryptography and Network Security
Cryptography and Cryptanalysis
Unit 2: Cryptography & Cryptographic Algorithm
Basic of Modern Cryptography
Computer Security Chapter Two
Basics Of Symmetric Encryption
Digital Signature Standard (DSS)
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Cryptology

Cryptology can be assigned to science until the twentieth century Cryptology can be assigned to science until the twentieth century. It covers sections Cryptography - secret writing with characters and cryptanalysis - analysis of cryptography.     This is an ancient art and new science: even Julius Caesar used it, but only since the 1970s it was the object of scientific academic research.

William Frederick Friedman The term cryptology is created by Friedman. He developed a statistical method (Friedman test) to encrypted text can be viewed through the language specifics to reach the key to them. The method was published in 1920 and is used in linguistics and reading the encrypted historical writings. William Frederick Friedman

Criptology Cryptanalyses Cryptography Key management Simmetric cryptosystem Asimmetric cryptosystem Sistems for Electronic signature

Cryptanalysis Cryptanalysis (from the Greek κρυπτός - hidden analysis) - the science of methods of obtaining the initial meaning of encrypted information without available secret information (key). In most cases, it being understood find, discover the key. In non-technical sense, cryptanalysis is to break the code (the code).

Cryptography Cryptography (from the Greek words κρυπτός, kriptos - "hidden" and γράφω, column - "write") is a science that deals with the theory and practice of hiding information. Today, cryptography is considered a branch of both mathematics and computer science and is closely related to information theory, computer security and engineering work.

Symmetric cryptosystem In symmetric cryptosystem using the same key for encryption and decryption of information. This key must be known to both parties - the one that encrypted information, and this, which shall decipher. There is secure storage, distribution and periodically update these keys between users of a symmetric cryptosystem . Ciphertext Sourece text cryptosystem key

Encryption Decipherment A B C .. & J G. A B C . Input Encrypted information Output Encryption key (Ka) Ka=Kb Decipher key (Kb)

Asymmetric cryptosystem In an asymmetric cryptosystem need for secure storage of public keys dropped, they are exchanged freely by users or published on Web sites .

advantages: Key pair (public and private) can be used long time - several years; Unlike the symmetrical network with N the number of participants supported keys is equal to the number of participants; Allow the construction of reliable and efficient scheme for digital signatures and verification of data. disadvantages: Significantly slower compared with symmetrical; When using the encryption key is much longer than that of symmetrical;

Electronic signature system Electronic signature algorithm used for encryption, one degree more secure than algorithms using hash function for authentication of the sender. Used asymmetric cryptography key pair - private and public, with one to encrypt and decrypt with the other.

Polina Staikova 12 a class SOU “Zheleznik” Stara Zagora Created by : Polina Staikova 12 a class SOU “Zheleznik” Stara Zagora www.jeleznik.org www.google.bg www.wikipedia.org