Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Cryptography The science of writing in secret code.
Principles of Information Security, 2nd edition1 Cryptography.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
1 Lesson Internet Organization network Fire wall.
Linux Networking and Security Chapter 8 Making Data Secure.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Overview and Basic Concepts Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus -
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
GROUP 11 Dhita Puspita Larasati Topan Firmansyah Dimas Kurnia Ayatullah Galih Purwanti Rahma Aprilia Handayani
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Cryptography, Authentication and Digital Signatures
An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Midterm Review Cryptography & Network Security
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Cryptography Lynn Ackler Southern Oregon University.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Overview of Cryptography & Its Applications
Códigos y Criptografía Francisco Rodríguez Henríquez Códigos y Criptografía Francisco Rodríguez Henríquez CINVESTAV
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
1.1 Introduction to Cryptography. 1.2 Basic Cryptography Cryptography is a deep mathematical subject. Cryptographic protocols provide a cornerstone for.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
INCS 741: Cryptography Overview and Basic Concepts.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Cracking Encrypted Systems
Encryption
Cryptography.
CSCI-235 Micro-Computer Applications
Security through Encryption
PART VII Security.
Computer Security Chapter Two
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Cryptography

2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate how to encrypt and decrypt messages using the transposition and substitution method Support the role of cryptography in e-commerce systems Explain the differences between symmetric and asymmetric cryptography

3 Applying Cryptography to Information Systems Applied cryptography—the science of secret writing—enables the storage and transfer of information in forms that reveal it only to those permitted to see it while hiding it from everyone else In the 20th century, international governments began to use cryptography to protect their private and sensitive information and for communications purposes

4 Applying Cryptography to Information Systems cont. Since the 1970s, academic interest in cryptography has grown at a tremendous rate and private citizens have increasingly gained access to various cryptography techniques, permitting personal information protection and enabling the conduct of secure electronic transactions

5 Basic Terms and Concepts Cryptosystems mask messages, allowing only selected people to see through the mask Cryptography is the science (or art) of designing, building, and using cryptosystems Cryptanalysis is the science (or art) of breaking a cryptosystem Cryptology is the umbrella study of cryptography and cryptanalysis

6 Basic Terms and Concepts cont. Cryptographers rely on two basic methods:  Transposition: letters are rearranged into a different order  Substitution: letters are replaced by other letters and/or symbols Plaintext is the message that is passed through an encryption algorithm and becomes ciphertext  When ciphertext is passed through a decryption algorithm, it becomes plaintext again

7 Strength of Cryptosystems A strong cryptosystem is considered strong only until it’s been cracked Strong cryptosystems  produce ciphertext that always appears random to standard statistical tests  also resist all known attacks on cryptosystems  have been brutally tested to ensure their integrity

8 Cryptosystems Answer the Needs of Today’s E-Commerce Each employee must have an ID and password to access the system, but beyond that, any guarantees of authenticity require trust in the users of the system To ensure that electronic commerce is secure, however, requires an implicit distrust in users of the Internet and public networks

9 The Role of Keys in Cryptosystems Symmetric key cryptography (shared secret)  It uses the same key to both encrypt and decrypt a message  The most common form of symmetric key cryptography is the Data Encryption Standard, which uses 64 bits of data (8 bytes) with a 56-bit (7 byte) key  One of the most significant challenges of symmetric key cryptography lies in sharing keys prior to needing them

10 The Role of Keys in Cryptosystems cont. Asymmetric key cryptography (public-private)  It uses two keys, public and private Typically, the key lengths that are used with strong asymmetric key cryptography are 1024 bits long (128 bytes)  A message encrypted using one key can only be decrypted using the other and vice versa  It shares a public key with everyone you want to communicate with privately, but keep your private key a secret  The two keys that compose a pair are mathematically related, but neither can be derived from the other

11 The Role of Keys in Cryptosystems cont. Asymmetric key cryptography cont.  It enables you to communicate over any open channel with a high degree of confidence and permits you to trust in these ways: Authentication: Messages you receive are from their advertised source Privacy: Messages you send can be read only by their intended receiver(s) Message integrity: All messages sent and received arrive intact

12 Summary Cryptography is needed by computer applications to implement the privacy and security that users demand The strength of a cryptosystem rests in the size and means used to protect cryptographic keys The same key can be used to both encrypt and decrypt information and is called a symmetric key, or different keys can be used for encryption and decryption and are called asymmetric keys Cryptography relies on two basic methods: transposition and substitution