Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Cryptography encryption authentication digital signatures
Public Key Cryptosystem
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Intro 1 Introduction Intro 2 Good Guys and Bad Guys  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptographic Technologies
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
EE5552 Network Security and Encryption block 4 Dr. T.J. Owens CEng MIET Dr T. Itagaki MIET, MIEEE, MAES.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Cryptography Lecture 1: Introduction Piotr Faliszewski.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Overview and Basic Concepts Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus -
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
13-1 Last time Security in Networks Network Security Controls Firewalls Honeypots Intrusion Detection Systems.
Cryptography, Authentication and Digital Signatures
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Encryption.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
CRYPTOGRAPHY & NETWORK SECURITY Introduction and Basic Concepts Eng. Wafaa Kanakri Computer Engineering Umm Al-Qura University.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Overview of Cryptography & Its Applications
Códigos y Criptografía Francisco Rodríguez Henríquez Códigos y Criptografía Francisco Rodríguez Henríquez CINVESTAV
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
1.1 Introduction to Cryptography. 1.2 Basic Cryptography Cryptography is a deep mathematical subject. Cryptographic protocols provide a cornerstone for.
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Encryption Encryption: Transforms Message so that Interceptor Cannot Read it –Plaintext (original message) Not necessarily text; Can be graphics, etc.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
INCS 741: Cryptography Overview and Basic Concepts.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
People want and need privacy and security while communicating. In the past, cryptography is heavily used for military applications to keep sensitive information.
Secret Key Cryptography
Cryptography.
Cryptography.
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography

Motivation Historically Kings communicated with their generals using cryptographic methods. – Julius Caesar used a cipher named after him. Today with the advent of the Internet electronic services are integral part of our daily life – Exchanging payment in formation is vital for internet economy It’s empirical to protect electronic information

Terminology Cryptology is the all-inclusive term used for the study of secure communication over non-secure channels and related problems. Cryptography is the process of designing systems to realize secure communications over non- secure channels. Cryptanalysis deals with breaking cryptosystems. Coding Theory deals with symbolic representation of input information using symbols, often called codes such as – Compression, secrecy and error-correction.

Code Vs Cipher Code is replacing message words by codewords or symbols – Unanticipated words cannot be used Cipher is Encrypting the message using some algorithm – Stream Ciphers. Data fed to the algorithm in small chunks (bits, chars) – Block Ciphers. Data fed to the algorithm in blocks

Secure Communications Scenario Plain text

Security Issues 1.Read the message 2.Find the key and read all the encrypted messages 3.Integrity: Corrupt or modify the content of the message in such a way that Bob will think Alice sent the altered message. 4.Authentication: Impersonate Alice and communicate with Bob Oscar is a passive observer who is trying to perform (1) and (2). Mallory is more active and malicious who is trying to perform (3) And (4).

Possible Attacks 1.Ciphertext only: Eve has only a copy of ciphertext 2.Known Plaintext: Eve has a copy of ciphertext and the corresponding plaintext and tries the deduce the key. 3.Chosen Plaintext: Eve has temporary access to the encryption machine/algorithms. – She can encrypt large number of plaintexts and use them to deduce the key. 4.Chosen Ciphertext: Eve has temporary access to the decryption machine. – She can decrypt large number of ciphertexts and symbols and use them to deduce the key.

Kerckhoff’s and Shannon Principles A cryptosystem should be secure even if everything about the system, except the key, is public knowledge. The enemy knows the system edge. The security of the system, therefore, should be based 1.key length 2.The quality of the algorithm.

Symmetric Key Cryptography Encryption and decryption keys are known to both communicating parties (Alice and Bob). – A Secret key should be shared (or agreed) b/w the communicating parties. They are usually related and it is easy to derive the decryption key once one knows the encryption key. – In most cases, they are identical. All of the classical (pre-1970) cryptosystems are symmetric – Such as DES and AES (Rijndael)

Public Key Cryptography Encryption Key is made public! Public Key. Decryption Key is kept private. Private Key – Sender encrypts the message by the Public Key of the receiver – Only the receiver can decrypt the message by her/his Private Key Computationally expensive to find the Decryption Key from the Encryption Key – Such as RSA, Discrete Logarithm and Elliptic Curve Used to encrypt small amounts of data (key exchange or signatures)

Key Length The security of cryptographic algorithms is hard to measure. – How difficult is it for an adversary to find the key – The key should be large enough to prevent brute force or exhaustive search attack. – The adversary to determine the key simply by trying all possible keys in the key space. For example, DES utilizes 56-bit key, therefore there are 2 56 (or approx 7.2 x ) possible keys in the key space.

Key Length For a cryptanalyst, brute force should be the last choice. – He needs to take advantage of the weakness in the algorithm or in it’s implementation, in order to reduce the possible keys to try out. Longer keys do not necessarily improve the security Once secure is not always secure

Unbreakable Cryptosystems Almost all of the practical cryptosystems are theoretically breakable given the time and computational resources However, there is one system which is even theoretically unbreakable: One-time-pad. – One-time pad requires exchanging key that is as long as the plaintext. – However impractical, it is still being used in certain applications which necessitate very high-level security. Security of one-time pad systems relies on the condition that keys are generated using truly random sources.

Cryptographic Objectives Confidentiality – Hiding the contents of the messages exchanged. Integrity – Bob wants to make sure that Alice’s massage hasn’t been altered Authentication – Bob wants to make sure that Alice could have sent the message he received. 1.Identification: Identity of the sender. 2.Data-origin authentication: data origin, creator and time. Non-repudiation – Alice can’t deny sending the message.