Secure communication Informatics for economists II Jan Přichystal

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Cryptography Ch-1 prepared by: Diwan.
the basics cryptography deals with techniques for secure communication in the presence of third parties (adversaries). modern cryptography uses mathematics,
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Management Information Systems Lection 05 Coding and encryption CLARK UNIVERSITY College of Professional and Continuing Education (COPACE)
Crytography Chapter 8.
Cryptography The science of writing in secret code.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Principles of Information Security, 2nd edition1 Cryptography.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
1 Simple and Unbreakable: The Mathematics of Internet Security Dr. Monica Nevins Department of Mathematics and Statistics University of Ottawa University.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
 Cryptography Melissa Pollis. What is Cryptography?  the science or study of the techniques of secret writing, especially code and cipher systems 
INCS 741: Cryptography Overview and Basic Concepts.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Secure communication Informatics for economists II Jan Přichystal
Web Security.
Cryptography – Test Review
Identity Theft uses of Cryptography
Cryptography.
DISSERTATION ON CRYPTOGRAPHY.
Unit 2: Cryptography & Cryptographic Algorithm
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Secure communication Informatics for economists II Jan Přichystal

Present-days problems People work daily with private and secure information. Most information are created and stored on computers and also shared on internet. Company or personal documents, communication, Internet banking,...

Present-days problems But computers are not bank vaults. Information could be stolen, modified or abused. Everybody is responsible for safety of his/her documents. How to be sure nobody could steal our data or read our s?

Secure communication Similar problems solve people during centuries. Solution is in usage of secured systems, passwords and secure communication. There are various ways how to secure our private data and information.

Secure communication Steganography (hidden message)‏ Cryptography (unreadable message)‏ Substitution Transposition Code (word subst.)‏ Cipher (letter subst.)‏

Steganography Steganos — (from greek) means hidden Graphein — means to write The aim is to hide message: Messages under hair on skin Messages on clay tables covered with wax Messages in microdots Messages hidden in pictures, audio, video...

Cryptography Cryptos — means secret We don't hide message but sense We need to encrypt and decrypt. Cryptography uses various scientific disciplines (mathematics, linguistic...).

Protection against unauthorized reading Cryptography — science of secret communication. Provides safety to sender and recipient of message. Cryptoanalysis — science of how to solve encrypted message without knowing the key.

Protection against unauthorized reading Encryption — protect message against unauthorized reading. Change original letters with new letters, thus result seems to be nonsense. Decryption — restoration of origin message. Message Algorithm Key Unreadable secret message

Encryption Encryption key — defines the sort of cipher alphabet. Example of key: Nancy Encryption algorithm — system of replacing each letter of plain text with letter of cipher alphabet.

Cryptography Two ways how to encrypt: Transposition — uses the same letters but their position in text is different hallo => laolh Substitution — changes letters to another hallo => ibmmp

Skytale Historicall first usage of cryptography Leather ribbon on wooden stick

Caesar's cipher a b c d e f g h i j k l m n o p q r s t u v w x y z d e f g h i j k l m n o p q r s t u v w x y z a b c Message: Cypher: veni, vidi, vici yhql, ylgl, ylgl Each letter in the message is shifted three places right (a = d).

Decryption − frequence analysis With knowledge of letter frequency in common alphabet and frequency of letters in cipher alphabet is possible to identify original message. Create the frequency table of both alphabets and compare them.

Vigener's cipher For each letter is used different cipher alphabet. Cipher alphaber changes according to key word. w h i t e w h i t e w h i t e w h i t e w h i d i v e r t t r o o p s t o e a s t r i d g e Key: Msg: Ciph: z p d x v p a z h s l z b h i w z b k m z n m

Enigma Cryptographic machine used by German army in WWII. Sophisticated system with several components: a plug board, a light board, a keyboard, a set of rotors, and a reflector (half rotor). The original machine looked a lot like a typewriter. When a key is pressed, an electrical current is sent through the machine. The current first passes through the plug board, then through the three rotors, through the reflector which reverses the current, back through the three rotors, back through the plug board and then the encrypted letter is lit on the display.

Enigma

Two types of encryption Symmetric encryption: — easy key creating; — quick; — problem with key distribution; Asymmetric encryption: — difficult key creating; — slow; — known key length;

Symmetric encryption All historic encryption methods mentioned above are symmetric. It is easy to use them. Symmetric methods are still usable, but algorithms are more complicated. One key is needed both for encryption and decryption. Modern methods provides secure passwords, web authorization etc. DES, 3DES, AES

Asymmetric encryption Two parts of key — public and private Usage 1 — for encryption use recipient public key, for decryption use recipient private key: Message can read ONLY authorized recipient Usage 2 — for encryption use sender private key, for decryption use sender public key: Recipient is sure about sender identity

Key distribution Certification authority — proves that certain private key is owned by certain person. Can prove sender identity Main functions of CA: — key generating; — key giving, evidence, resuming; — proving of key ownership.

Protection against unauthorized modification Fingerprint — binary sequence generated by special algorithm; it is unique for each message. Fingerprint check — after message transfer, new fingerprint is calculated and compared to transfered Electronic signature — sender private key encrypted fingerprint.

Sending safe and signed message MessageSym. key ccc Calculation Recipient public key Sender private key Safe key Safe message Electronic signature Fingerprint

Recieving of safe and signed message Safe key Safe message Electronic signature d Recipient private key d Message d Sender public key Fingerprint 1 Fingerprint Calculation = ?