Cryptography Ch-1 prepared by: Diwan.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CLASSICAL ENCRYPTION TECHNIQUES
Symmetric Encryption Prof. Ravi Sandhu.
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Crytography Chapter 8.
1 ITNS and CERIAS CISSP Luncheon Series: Cryptography Presented by Addam Schroll, CISSP.
Principles of Information Security, 2nd edition1 Cryptography.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Encryption Methods By: Michael A. Scott
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Cryptography CSPrinciples II February 12, Needs for Privacy What are some specific needs for privacy when using the internet?
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Introduction Cryptography: process of making and using codes to secure transmission of information Encryption: converting original message into a form.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Cryptography: Securing the Information Age Source: technical.html "If you think cryptography can solve your problem, then you don't.
Image Representation Privacy/Cryptography CS 104 October 3, 2011.
Chapter 8: Scrambling Through Cryptography Security+ Guide to Network Security Fundamentals Second Edition.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography Presented By: Yogita Dey Amardeep Kahali Dipanjan Devnagar Minhaajuddin Ahmad Khan ECE4, NIT Securing the Information Age.
Cryptography – Test Review
Encryption: Image Representation Privacy/Cryptography
Symmetric Cryptography
Chapter 2 Basic Encryption and Decryption
Cryptography Dr. X.
Cryptographic Algorithms
Taehyung Kim HPC Lab. POSTECH
Cryptography Basics and Symmetric Cryptography
Chapter 3:Cryptography (16M)
By: Arash Habibi Lashkari
Unit 2: Cryptography & Cryptographic Algorithm
Computer Security Chapter Two
Symmetric Encryption or conventional / private-key / single-key
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Cryptography Ch-1 prepared by: Diwan

Essential Terms Secret writing Cryptography Encryption Decryption Plain text  Cipher text Decryption Cipher text  Plain text Cryptanalysis Cryptology Secret writing Source: http://www.unmuseum.org/enigma.jpg

Basic Terminologies Cryptography deals with creating documents that can be shared secretly over public communication channels Cryptographic documents are decrypted with the key associated with encryption, with the knowledge of the encryptor The word cryptography comes from the Greek words: Krypto (secret) and graphein (write) Cryptanalysis deals with finding the encryption key without the knowledge of the encryptor Cryptology deals with cryptography and cryptanalysis Cryptosystems are computer systems used to encrypt data for secure transmission and storage

Basic Terminologies Keys are rules used in algorithms to convert a document into a secret document Keys are of two types: Symmetric Asymmetric A key is symmetric if the same key is used both for encryption and decryption A key is asymmetric if different keys are used for encryption and decryption

Basic Terminologies Examples: Symmetric key methods DES 56-bit Triple DES 128-bit AES 128-bit and higher Blowfish 128-bit and higher Asymmetric key methods RSA PGP

Basic Terminologies Plaintext is text that is in readable form Ciphertext results from plaintext by applying the encryption key Notations: M message, C ciphertext, E encryption, D decryption, k key E(M) = C E(M, k) = C Fact: D(C) = M, D(C, k) = M

Cryptographic Methods Symmetric Same key for encryption and decryption Key distribution problem Asymmetric Mathematically related key pairs for encryption and decryption Public and private keys Cryptographic Algorithms generally fall into one of two different categories, or are a combination of both. Symmetric Fast Only provide confidentiality Need secure channel for key distribution Key management headaches from large number of key pairs to maintain N(N-1)/2 That’s over 6.3 million key pairs to let all 3556 Purdue A/P staff members exchange encrypted messages To do the same for all students would require over half a billion key pairs! Examples: DES, AES, Blowfish, RC4, RC5 Asymmetric Large mathematical operations make it slower than symmetric algorithms No need for out of band key distribution (public keys are public!) Scales better since only a single key pair needed per individual Can provide authentication and nonrepudiation Examples: RSA, El Gamal, ECC, Diffie-Hellman

Cryptographic Methods Hybrid Combines strengths of both methods Asymmetric distributes symmetric key Also known as a session key Symmetric provides bulk encryption Example: SSL negotiates a hybrid method A hybrid cryptosystem is the best of both worlds. In this case, an asymmetric encryption scheme is used to transmit a generated symmetric key to the other party, then that key is used for all further communications. This combines the scalability and key management features of the asymmetric algorithms with the speed of symmetric ones. The Secure Sockets Layer (SSL) protocol negotiates which asymmetric and symmetric algorithms to use in a hybrid system to protect TCP connections, such as an HTTP connection between a web browser and web server.

Types of Secret Writing Steganography Cryptography

Basic Terminologies Steganography is the method of hiding secret messages in an ordinary document Steganography does not use encryption Steganography does not increase file size for hidden messages Example: select the bit patterns in pixel colors to hide the message

Steganography Hiding a message within another medium, such as an image No key is required Example Modify color map of JPEG image Invisible ink, hidden tattoos, and microdots are all examples of steganography. By taking a color digital image and slightly altering the color of each pixel, you can hide a message in the image without noticeably altering the appearance. The receiver can then extract the message if they have the original, unaltered image.

Steganography Steganography – covered writing – is an art of hiding information Popular contemporary steganographic technologies hide information in images New York Times, August 3rd, 2001 http://www.nytimes.com/images/2001/10/30/science/sci_STEGO_011030_00.jpg

Hiding information in pictures Image in which to hide another image Image to hide within the other image http://www.cl.cam.ac.uk/~fapp2/steganography/image_downgrading/

Types of Cryptography Stream-based Ciphers Block Ciphers One at a time, please Mixes plaintext with key stream Good for real-time services Block Ciphers Amusement Park Ride Substitution and transposition Stream Ciphers are fast and easy to implement in hardware. Block ciphers are stronger, but slower and often implemented in hardware.

Types of Secret Writing Steganography Cryptography Substitution Transposition Mon alphabetic Polyalphabetic

Encryption Systems Substitution Cipher Transposition Cipher Convert one letter to another Cryptoquip Transposition Cipher Change position of letter in text Word Jumble Monoalphabetic Cipher Caesar Polyalphabetic Cipher Vigenère Substitution Cipher: Replacing one letter with another Transposition Cipher: World Jumble. Rearranging or reordering the letters within a message Monoalphabetic Cipher: Algorithm that substitutes one letter in the ciphertext alphabet for one in the plaintext alphabet

Public Key Cryptography Private (symmetric, secret) key – the same key used for encryption/decryption Problem of key distribution Public (asymmetric) key cryptography – a public key used for encryption and private key for decryption Key distribution problem solved

Currently Available Crypto Algorithms (private key) DES (Data Encryption Standard) and derivatives: double DES and triple DES IDEA (International Data Encryption Standard) Blowfish RC5 (Rivest Cipher #5) AES (Advance Encryption Standard)

Currently Available Crypto Algorithms (public key) RSA (Rivest, Shamir, Adleman) DH (Diffie-Hellman Key Agreement Algorithm)

Hashing Algorithms MD5 SHA-1 Computes 128-bit hash value Widely used for file integrity checking SHA-1 Computes 160-bit hash value MD-5 is based on MD-4 and was created to address vulnerabilities found in MD-4. MD5 generates 128-bit hash values over 512-bit blocks in 4 rounds of 16 steps each. SHA-1 also operates on 512-bit blocks, but produces a 160-bit hash value in 4 rounds of 20 steps each.