Principles of Information Security, 2nd edition1 Cryptography.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure and Applications
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Crytography Chapter 8.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 22.
Principles of Information Security, 2nd edition2 Learning Objectives Upon completion of this material, you should be able to:  Describe the most significant.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 22.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Cryptographic Technologies
Cryptography.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Chapter 8 Network Security 4/17/2017
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Chapter 20: Network Security Business Data Communications, 4e.
Cipher Methods Plaintext can be encrypted through bit stream or block cipher method Bit stream: each plaintext bit transformed into cipher bit one bit.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Introduction Cryptography: process of making and using codes to secure transmission of information Encryption: converting original message into a form.
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
Linux Networking and Security Chapter 8 Making Data Secure.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Principles of Information Security, Fifth Edition
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
1 TCP/IP Applications. 2 NNTP: Network News Transport Protocol NNTP is a TCP/IP protocol based upon text strings sent bidirectionally over 7 bit ASCII.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Lecture 2: Introduction to Cryptography
Network Security Chapter 8 12/13/ Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Guide to Firewalls and VPNs, 3 rd Edition Chapter Nine Encryption-The Foundation for the Virtual Private Network.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Network Security Chapter 8 Institute of Information Science and Technology. Chengdu University YiYong 2008 年 2 月 25 日.
People want and need privacy and security while communicating. In the past, cryptography is heavily used for military applications to keep sensitive information.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Learning Objectives Upon completion of this material, you should be able to:
Principles of Information Security, Fourth Edition
Cryptography Principles of Information Security, 2nd edition
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Chapter 8 Network Security.
Cryptography.
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-501)
Electronic Payment Security Technologies
Presentation transcript:

Principles of Information Security, 2nd edition1 Cryptography

Principles of Information Security, 2nd edition2 Learning Objectives Upon completion of this material, you should be able to:  Understand the basic cipher methods and cryptographic algorithms  List and explain the major protocols used for secure communications

Principles of Information Security, 2nd edition3 Introduction  Cryptography: process of making and using codes to secure transmission of information  Encryption: converting original message into a form unreadable by unauthorized individuals

Principles of Information Security, 2nd edition4 Cipher Methods  Plaintext can be encrypted through bit stream or block cipher method  Bit stream: each plaintext bit transformed into cipher bit one bit at a time  Block cipher: message divided into blocks (e.g., sets of 8- or 16-bit blocks) and each is transformed into encrypted block of cipher bits using algorithm and key

Principles of Information Security, 2nd edition5 Cipher Methods (continued)  Substitution cipher: substitute one value for another  Monoalphabetic substitution: uses only one alphabet  Polyalphabetic substitution: more advanced; uses two or more alphabets  Transposition cipher: rearranges values within a block to create ciphertext  Exclusive OR (XOR): function of Boolean algebra; two bits are compared  If two bits are identical, result is binary 0  If two bits not identical, result is binary 1

Principles of Information Security, 2nd edition6 Table 8-1 Exclusive OR Operations

Principles of Information Security, 2nd edition7 Cryptographic Algorithms  Often grouped into two broad categories, symmetric and asymmetric; today’s popular cryptosystems use hybrid combination of symmetric and asymmetric algorithms  Symmetric and asymmetric algorithms distinguished by types of keys used for encryption and decryption operations

Principles of Information Security, 2nd edition8 Cryptographic Algorithms (continued)  Symmetric encryption: uses same “secret key” to encipher and decipher message  Encryption methods can be extremely efficient, requiring minimal processing  Both sender and receiver must possess encryption key  If either copy of key is compromised, an intermediate can decrypt and read messages

Principles of Information Security, 2nd edition9 Figure 8-3 Symmetric Encryption Example

Principles of Information Security, 2nd edition10 Cryptographic Algorithms (continued)  Data Encryption Standard (DES): one of most popular symmetric encryption cryptosystems  64-bit block size; 56-bit key  Adopted by NIST in 1976 as federal standard for encrypting non-classified information  Triple DES (3DES): created to provide security far beyond DES  Advanced Encryption Standard (AES): developed to replace both DES and 3DES

Principles of Information Security, 2nd edition11 Cryptographic Algorithms (continued)  Asymmetric Encryption (public key encryption)  Uses two different but related keys; either key can encrypt or decrypt message  If Key A encrypts message, only Key B can decrypt  Highest value when one key serves as private key and the other serves as public key

Principles of Information Security, 2nd edition12 Figure 8-4 Using Public Keys

Principles of Information Security, 2nd edition13 Cryptography Tools  Public Key Infrastructure (PKI) : integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services enabling users to communicate securely  PKI systems based on public key cryptosystems; include digital certificates and certificate authorities (CAs)

Principles of Information Security, 2nd edition14 Digital Signatures  Encrypted messages that can be mathematically proven to be authentic  Created in response to rising need to verify information transferred using electronic systems  Asymmetric encryption processes used to create digital signatures

Principles of Information Security, 2nd edition15 Digital Certificates  Electronic document containing key value and identifying information about entity that controls key  Digital signature attached to certificate’s container file to certify file is from entity it claims to be from

Principles of Information Security, 2nd edition16 Figure 8-5 Digital Signatures

Principles of Information Security, 2nd edition17 Protocols for Secure Communications  Secure Socket Layer (SSL) protocol: uses public key encryption to secure channel over public Internet  Secure Hypertext Transfer Protocol (S-HTTP): extended version of Hypertext Transfer Protocol; provides for encryption of individual messages between client and server across Internet  S-HTTP is the application of SSL over HTTP; allows encryption of information passing between computers through protected and secure virtual connection

Principles of Information Security, 2nd edition18 Protocols for Secure Communications (continued)  Securing with S/MIME, PEM, and PGP  Secure Multipurpose Internet Mail Extensions (S/MIME): builds on Multipurpose Internet Mail Extensions (MIME) encoding format by adding encryption and authentication  Privacy Enhanced Mail (PEM): proposed as standard to function with public key cryptosystems; uses 3DES symmetric key encryption  Pretty Good Privacy (PGP): uses IDEA Cipher for message encoding

Principles of Information Security, 2nd edition19 Protocols for Secure Communications (continued)  Securing Web transactions with SET, SSL, and S-HTTP  Secure Electronic Transactions (SET): developed by MasterCard and VISA in 1997 to provide protection from electronic payment fraud  Uses DES to encrypt credit card information transfers  Provides security for both Internet-based credit card transactions and credit card swipe systems in retail stores

Principles of Information Security, 2nd edition20 Summary  Cryptography and encryption provide sophisticated approach to security  Many security-related tools use embedded encryption technologies  Encryption converts a message into a form that is unreadable by the unauthorized  Many tools are available and can be classified as symmetric or asymmetric, each having advantages and special capabilities