Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure and Applications
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents Security requirements Public key cryptography Key agreement/transport.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Introduction to PKI, Certificates & Public Key Cryptography Erwan Lemonnier.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Principles of Information Security, 2nd edition1 Cryptography.
Web Security for Network and System Administrators1 Chapter 4 Encryption.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Cryptography and Network Security Chapter 17
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Cryptographic Technologies
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Encryption Methods By: Michael A. Scott
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Introduction Cryptography: process of making and using codes to secure transmission of information Encryption: converting original message into a form.
Linux Networking and Security Chapter 8 Making Data Secure.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography, Authentication and Digital Signatures
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Not only business information, but a large amount of personal information too is now digitized and stored in computer connected to the internet. System.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Network Security David Lazăr.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Chapter 7: Cryptographic Systems
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Lecture 2: Introduction to Cryptography
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
System Security: Cryptography Technologies CPE Operating Systems
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
1 Internet data security (HTTPS and SSL) Ruiwu Chen.
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Computer Communication & Networks
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Public-Key, Digital Signatures, Management, Security
Presentation transcript:

Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn

Outline Introduction Cryptography Basics Sample of Cryptography Protocols Authentication Basics Authentication Methods Lab Walkthrough

Introduction Cryptography is the method of message secrecy Cryptography has been applied since the early day of computers for military and other types of data security With the spread of the Internet and the ease of data acquisition cryptography has become more important and more widely used.

Cryptography Basics Key- A key is a piece of information that controls the algorithm in cryptographic cipher. Weak Key- A Weak Key is a key that when inputted into an encryption algorithm makes the algorithm act in an undesired way (i.e. easily crack able). Asymmetric Key Cryptography- Asymmetric key cryptography is encryption methods in which two distinct keys are used. Symmetric Key Cryptography- Symmetric algorithms are ones in which the keys for encrypting and decrypting the data are the same or very closely related. Block Cipher- A block cipher is a symmetric key encryption in which the operations are performed on fixed lengths of bits called blocks. Stream Cipher- A stream cipher is a cipher in which each plaintext character is encrypted one at a time with the transformations varying for each successive character.

Samples of Cryptography Protocols AES (Advanced Encryption Standard) - AES is a block encryption standard that superseded DES. It is a 128bit encryption standard that is used by the U.S. government and widely used by other systems including WPA2 and SSH. Diffie-Hellman- The Diffie-Hellman key exchange protocol is a protocol that allows to parties to setup a shared secure key without prior knowledge of either group. IPSEC- IPSEC is a suite of protocols that help authenticate, setup public keys, and encrypt streams of IP traffic. MD5- Not considered secure anymore, MD5 is a widely used hash algorithm that is also often used for file integrity checking. RC4- Is one of the most widely used stream ciphers. It is used by both SSL and WEP to encrypt data. SSH (Secure Shell) – SSH is a public key algorithm used to authenticate and secure connections between systems.

Samples of Cryptography Protocols WEP (Wired Equivalent Privacy) – WEP is part of the standard that tries to protect the wireless signal from eavesdropping. Soon after implementation its security was breached due to its use of the RC4 cipher. WPA (Wi-Fi Protected Access) – WPA was an intermediate step in the creation of i. Because of the security risk the WPA standard was rolled out while the i standard was being finalized. WPA2 (802.11i) – WPA2 is the full implementation of the i protocol. WPA2 uses the AES block cipher algorithm instead of the RC4 stream cipher that is used in the WEP and WPA.

Authentication Basics Provides trust on networks Describes identity and data security Transactions require one-side or two- sided authentication Accountability is provided by Certificate Authorities and governments

Certificates Used to sign items Issued by certificate authorities Trusted third parties Certificate can be trusted as long as CA is not compromised

Digital Signatures Provides authentication for documents and communication S/MIME used for communication Secure XML specifications provide XML formatted documents with security.

Windows CardSpace Microsoft developed framework for ID Set of ID cards in the CardSpace provides necessary claims Secure data is not actually stored on your computer Novel idea, but it may not be used widely

Directory Services Provide a central database for network user’s information One set of credentials for the entire network Easier for administration Standard set of protocols for accessing the information Kerberos LDAP

Lab Layout Prelab Go to the NSA’s CryptoKids website and learn some basic encryption techniques to gain experience with basic cryptography. Section 1 Small database of common cryptography terms and methods Section 2 Gets some hands on experience with a handful of programs that encrypt and decrypt data with the methods described in section 1.

Lab Layout Section 3 Authentication basics, defining certificates, signing, Windows CardSpace, and directory services. Section 4 Use an certificate to sign and encrypt communication Create a Windows CardSpace card and test it

References us/netframework/aa aspx us/netframework/aa aspx certificate.html certificate.html