“The Security Guru” Bruce Schneier Mario Basque Comp-1631 Winter, 2011.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Lecture 5: Cryptographic Hashes
Conventional Encryption: Algorithms
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Secure communication Informatics for economists II Jan Přichystal
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Akelarre 1 Akelarre Akelarre 2 Akelarre  Block cipher  Combines features of 2 strong ciphers o IDEA — “mixed mode” arithmetic o RC5 — keyed rotations.
AES clear a replacement for DES was needed
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
Introduction to Computer and Network Security Iliano Cervesato 26 August 2008 – Modern Cryptography.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
Cryptography Week-6.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
CSCI 5857: Encoding and Encryption
Hash Functions A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value h = H(M) Principal object is.
Blowfish A widely used block cipher. Blowfish Designed by Bruce Schneier (1993) A variant of it (Twofish) was an AES finalist candidate 64-bit block size,
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Cryptography, Authentication and Digital Signatures
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Description of a New Variable-Length Key, 64-Bit Block Cipher (BLOWFISH) Bruce Schneier BY Sunitha Thodupunuri.
Public Key Encryption.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Cryptology aka Cryptography Tim Cahill Ryan Church.
Chapter 2 Symmetric Encryption.
Dr. Lo’ai Tawalbeh summer 2007 Chapter 6: Contemporary Symmetric Ciphers Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Computer Security coursework 3 Dr Alexei Vernitski.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Practical Aspects of Modern Cryptography Josh Benaloh & Brian LaMacchia.
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Identity Theft uses of Cryptography
Blowfish Algorithm.
PART VII Security.
DISSERTATION ON CRYPTOGRAPHY.
BlowFish Algorithm.
Presentation transcript:

“The Security Guru” Bruce Schneier Mario Basque Comp-1631 Winter, 2011

Outline  About Bruce  Managed Security Solutions Group – BT  What is;  Twofish  Blowfish  Yarrow  Hash functions  Skein  Threefish  Conclusion

The Beginning Born on January 15, 1963 Graduate of the American University in 1988 Has a Masters in Computer Science Bruce is a renowned security expert and author Bruce on Security v=IoXoHlI86rQ

Bruce has created and co-created many sophisticated algorithms for security purposes These algorithms are mostly aimed for businesses trying to protect their information from hackers He has also writes novels, some of his latest are; Secrets and Lies, and Cryptography Engineering, Applied Cryptography (best seller) Cryptography is the practice and study of hiding information

Managed Security Solutions Group - BT  Bruce started Managed Security Solutions (formally counterpane labs) in 1999 (sold to BT Group in 2006)  Bruce is the CTO (Chief Security Technology Officer) of Managed Security Solutions  This company is described by Bruce as “making security products work”  They offer monitoring services to businesses to try and prevent attacks from hackers

Encryption Algorithm  Encryption is the process of taking plain text and transforming it to cipher text  Bruce is a security expert he uses this process and helps large businesses (especially banks) to hide information so hackers can’t get private information  Let’s look at some Algorithm that Bruce Schneier created

Twofish

Blowfish

Twofish / Blowfish  Twofish is a symmetric key block cipher with a block sizes of 128 bits and key sizes up to 256 bits  Blowfish is also a symmetric key block cipher but a little bigger in size and faster, it takes a variable length-key of 32 bits to 448 bits  A combination of S-boxes, with a complex key schedule make up the process of Twofish and Blowfish

Terminology  Block Cipher: takes plain text as an input and translates it into cipher text  S-Box (substitution-box): it performs substitutions, in block ciphers, they are typically used to obscure the relationship between the key and the cipher text

Yarrow  Uses a system called pseudorandom number generator (PRNG) – generates random numbers on a computer  The numbers have to be large enough so it can’t be hacked  PRNG had been broken before by a couple of Berkley Students  Yarrow generates cryptographically secure pseudorandom numbers on a computer. It can also be used as a real random number generator, accepting random inputs from analog random sources, it’s security is said to be a step up from normal PRNG

Hash Function  As you can see hash functions are very simple but difficult to decode  It takes the key, switches it into a set of numbers and/or letters ( called a hash) and stores the values in a array

Skein Hash Function   The name Skein refers to how The skin function intertwines the input, similar to a coil of yarn   It’s a new family of cryptographic Hash functions (look at next slide)   It’s design combines speed, Security, simplicity, and a great deal of flexibility in a modular Package that is easy to analyse

Threefish  Threefish is in the Skein hash function family  Does not use s-boxes, nor does it use any other form of a table look ups  It uses addition and exclusive operations to cipher text  Key sizes are 256 bits, 512 bits, and 1024 bits

Conclusion  He writes a blog every month called crypto-gram ( gram.html) which has around 150, 000 subscribers gram.htmlhttp:// gram.html  Bruce is an expert at what he does, known as one of the best in the world, that’s probably why the Economist gave him the nickname “The Security Guru”

References  er/articles er/articles er/articles  Schneier, Bruce. Moveable Type,  Pictures courtesy of; s