CIS 193A – Lesson6 CRYPTOGRAPHY RAPELCGRQ. CIS 193A – Lesson6 Focus Question Which cryptographic methods help computer users maintain confidentiality,

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Security 1. is one of the most widely used and regarded network services currently message contents are not secure may be inspected either.
Public Key Cryptography and GnuPG CPT 555 Network Security.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Principles of Information Security, 2nd edition1 Cryptography.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Security+ Guide to Network Security Fundamentals, Fourth Edition
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
1 Pertemuan 12 Security Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Electronic Mail Security
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
PGP Encryption Justin Shelby. Encryption Methods  There are two basic key types for cryptography Symmetric Asymmetric.
Linux Networking and Security Chapter 8 Making Data Secure.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Electronic mail security. Outline Pretty good privacy S/MIME.
Crypto Bro Rigby. History
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Chapter 8: Scrambling Through Cryptography Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography, Authentication and Digital Signatures
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
Chapter 15: Electronic Mail Security
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
SECURITY – Chapter 15 SECURITY – Chapter 15 ….for authentication and confidentiality PGP 1.Uses best algorithms as building blocks 2.General.
NETWORK SECURITY.
Security PGP IT352 | Network Security |Najwa AlGhamdi 1.
Csci5233 computer security & integrity 1 Cryptography: an overview.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
2013Prof. Reuven Aviv, Mail Security1 Pretty Good Privacy (PGP) Prof. Reuven Aviv Dept. of Computer Science Tel Hai Academic College.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
第五章 电子邮件安全. Security is one of the most widely used and regarded network services currently message contents are not secure –may be inspected.
Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Security is one of the most widely used and regarded network services
IS3230 Access Security Unit 9 PKI and Encryption
ELECTRONIC MAIL SECURITY
ELECTRONIC MAIL SECURITY
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

CIS 193A – Lesson6 CRYPTOGRAPHY RAPELCGRQ

CIS 193A – Lesson6 Focus Question Which cryptographic methods help computer users maintain confidentiality, integrity, and authenticity as they share person data with each other?

CIS 193A – Lesson6 Early Encryption Caesar’s Cipher –each letter of the alphabet was shift- ed to the right 3 positions, with x,y, and z wrapping back to a,b, and c. Rot13 –each letter of the alphabet was shift- ed to the right 13 positions, such that 2 such shifts restored the original text. These algorithms worked on the alphabets of natural language, with rot13 assuming the English alphabet.

CIS 193A – Lesson6 Symmetric Encryption Symmetric encryption replaces a ‘rule’ with a ‘key’ – an arbitrarily long string of characters known only to the sender and receiver, and used to produce the ciphertext. Examples: –3DES, CAST5, BLOWFISH, AES, TWOFISH Problem: –How to deliver the ‘key’ to the recipient without it being intercepted.

CIS 193A – Lesson6 Hashing Algorithms Hash algorithms are not true encryption because they are unidirectional: once encrypted they cannot be decrypted. Uses: a hash uniquely identifies an arbitrarily large source file and can verify the integrity of the file without disclosing its content. They are used in digital signatures, and as message digests, and checksums. Examples: –md2, md4, md5, sha, sha1, sha512, rmd160

CIS 193A – Lesson6 Asymmetric Encryption Solves the problem of a shared key. Two keys involve: public and private. Both keys encrypt, but decryption must occur with the alternate key. The private key is kept secret, the public key is freely made available to others – often by a public keyserver. The public key may be derived from the private key, but not vice versa. Private keys are usually protected with a passphrase.

CIS 193A – Lesson6 GNU Public Guard (GPG) A Free software implementation of Pretty Good Privacy (PGP) encryption. Supports symmetric and assymetric (PKI) encryption. Maintains a trusted database of public keys.

CIS 193A – Lesson6 GPG Symmetric Encryption Encrypted files may be stored in binary or ascii format. The ascii format of choice is usually base64. Examples: –gpg –c file1 # creates file1.gpg –gpg –ca file2 # creates file2.asc –gpg file1.gpg # decrypts file1 –gpg –-decrypt file1.asc # decrypts to # stdout Encryption requires supplying a passphrase.

CIS 193A – Lesson6 GPG Asymmetric Encryption Create your private/public keys: –gpg –-gen-key # go with the defaults # and supply passphrase View the keys you just created: –gpg –-list-public-keys –gpg –-list-secret-keys Add a trusted public key to your keyring: –gpg –-import keyfile # use –a if ascii –gpg –-fingerprint key_id # verify –gpg –-edit-key key_id # set trust value

CIS 193A – Lesson6 GPG Asymmetric Encryption Sharing a public key –gpg -a -–export id # sends to stdout –gpg [-a] –-output filename –-export id Send ASCII version through or add to a keyserver: –gpg –-keyserver ip-addr –-send-keys id Pull from a keyserver: –gpg –-keyserver ip-addr –-recv-keys id –gpg –-keyserver ip-addr –-search-keys str

CIS 193A – Lesson6 GPG Signing files Signing a text file: –gpg –-clearsign filename # Save ASCII Detached Signature: –gpg -–detach-sign [-a] filename Verifying a signed, encrypted file: –gpg –-verify filename Verifying a detached signature: –gpg –verify file.sign file

CIS 193A – Lesson6 GPG Encrypting Files Simple encryption: –gpg –e [-a] –r public-key_id filename Sign and encrypt: –gpg –es [-a] –r public-key_id filename Decrypt a file signed or not: –gpg filename

CIS 193A – Lesson6 Review

CIS 193A – Lesson6 Focus Question Which cryptographic methods help computer users maintain confidentiality, integrity, and authenticity as they share person data with each other? Encryption algorithms use digital keys to scramble the bits in a message so that it is unreadable. Hashing algorithms produce small, unique, digital representa- tions of arbitrarily large files which can be used to guarantee integrity. Public/Private keys along with signed certificates can verify authenticity because of the dependence of the public keys on the private keys.