Introduction to Cryptography

Slides:



Advertisements
Similar presentations
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Advertisements

Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Security Management.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Chapter 31 Network Security
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography, Authentication and Digital Signatures
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Encryption.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
1 Introduction The State of the Art in Electronic Payment Systems, IEEE Computer, September 1997.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Fundamentals of Network Security Ravi Mukkamala SCI 101 October 6, 2003.
ENCRYPTION, SSL, CERTIFICATES RACHEL AKISADA & MELANIE KINGSLEY.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
Web Security.
The Secure Sockets Layer (SSL) Protocol
Key management issues in PGP
Digital Signatures.
Basics of Cryptography
Symmetric and Asymmetric Encryption
Cryptography Dr. X.
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Cryptography Much of computer security is about keeping secrets
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
K E Y Plain text Cipher text Encryption Decryption
Public-Key Cryptography and RSA
Encryption
Basic Network Encryption
Introduction to security goals and usage of cryptographic algorithms
Topic 1: Data, information, knowledge and processing
Information Security message M one-way hash fingerprint f = H(M)
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Message Security, User Authentication, and Key Management
Public Key Infrastructure
Pooja programmer,cse department
Secure Electronic Transaction (SET) University of Windsor
Lecture 4 - Cryptography
The Secure Sockets Layer (SSL) Protocol
Protocol ap1.0: Alice says “I am Alice”
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Chapter 4 Cryptography / Encryption
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Install AD Certificate Services
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Digital Communications
Chapter 29 Cryptography and Network Security
Basic Network Encryption
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Electronic Payment Security Technologies
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Security in Distributed Systems
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Chapter 15 Key Management
Secure Diffie-Hellman Algorithm
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Introduction to Cryptography

What is cryptography? Practice and study of techniques for secure communication in the presence of third parties called adversaries Modern cryptography includes data confidentiality data integrity authentication etc. Cryptography prior to the modern age was effectively synonymous with encryption conversion of information from a readable state to apparent nonsense

Encryption and Decryption

Substitution Cipher One simple example of encryption/decryption

Cryptosystem (Cipher)

Types of Cryptosystems Secret-key cryptosystem Symmetric system Same key is used for both encryption and decryption Key has to be kept secret Public-key cryptosystem Asymmetric system A pair of keys Public key Private key Private key needs to be kept secret

Secret-key (Symmetric) Cryptosystems

Key Distribution Problem A lot of keys among users Each pair of uses needs a unique key How to send a key to the other Key needs to be plain text

Public-key (Asymmetric) Cryptosystem

Key distribution in public-key cryptosystem Alice says to Bob “Hi Bob, could you send me your public key?” Bob replies back to Alice “Here you go. The attached is my public key.” Alice receives the public key of Bob and starts sending messages to Bob Messages are encrypted by Bob’s public key Bob uses the corresponding private key to decrypt the messages Any concerns? How can Alice make sure that the received key is indeed the public key of Bob? How can Alice make sure that the received key is indeed the public key of Bob?

Certificate Authority A certificate authority or certification authority (CA) is an entity that issues digital certificates A digital certificate certifies the ownership of a public key by the named subject of the certificate A CA acts as a trusted third party—trusted both by the subject (owner) of the certificate and by the party relying upon the certificate Format of these certificates is specified by the X.509 standard Top 5 CAs as of May 2018 IdenTrust, Comodo, DigiCert, GoDaddy, GlobalSign

Procedure of obtaining a public key certificate

How to obtain the public keys of CAs Public keys are embedded in root certificates Root certificates are contained in the release of operating systems (and their updates) and the trustable web browsers (and their updates)