Using Cryptography to Protect Data in Computer Networks: case study Vsevolod Ievgiienko National Taras Shevchenko University of Kiev Faculty of Cybernetics Ukraine
Introduction Information security Business Banks Online payments Individual persons
Introduction Computer System Reliability Security Safety … Cryptography … …
Security Security is considered as a part of reliability and survivability problem “Who watches the watchmen?”
Safety Optimization problem x - system configuration C - system cost R - system reliability index S - system safety index
Information security problems T ypes of violations Disconnection Interception Modification Falsification
Information security problems Violations Active Passive - imitation- stream analysis - recreation - modification - hindering in service
Information security problems System security services Confidentiality Authentication Integrity Impossibility of refuse
Algorithms Symmetric (DES, AES, Blowfish, Serpent, Twofish) E – encryption D – decryption К – secret key М – message С – encrypted message
Algorithms Asymmetric (RSA, Elgamal, Elliptic Curves Cryptography) E – encryption D – decryption КUx – public key (user X) КRx – private key (user X) М – message С – encrypted message
Principles of planning Principle of different types Use a few algorithms of one type that have a different structure
Encryption software solution Remote encrypted file system Secret messaging
Encryption algorithms RSA with up to 4096-bit keys Digital signatures based on RSA Trusted timestamping X steps authentication Blowfish with 448-bit keys SHA-256 and SHA-512 hash functions HMAC-SHA-256 modified ANSI X9.17 pseudo-random numbers generator PKCS5 for making keys from passwords Deflate compression algorithm CRC32 checksums DoD M for data wiping
Sources “Reliability: past, present, future”, I. Ushakov “Applied Cryptography”, B. Schneier “Handbook of Applied Cryptography”, A. Menezes, P. van Oorschot, S. Vanstone
THE END Questions? Contacts: Tel: ICQ: