ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt.

Slides:



Advertisements
Similar presentations
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Advertisements

A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
Security & Encryption Thomas Fenske & Joseph Minter.
Principles of Information Security, 2nd edition1 Cryptography.
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Presentation Layer Network Format Local Format Information Transformation “few standards, but a lot of ideas”
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption Methods By: Michael A. Scott
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Cis 4930 Introduction to cryptography
Linux Networking and Security Chapter 8 Making Data Secure.
CS110: Computers and the Internet Encryption and Certificates.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Computer encryption is… Based on the science of cryptography.
Encryption Objective 1: Explain data encryption procedures.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
Cryptography By, Anthony Lonigro & Valentine Mbah.
Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher.
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Introduction to Cryptography Techniques How secure is that banking network traffic?
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Cryptography Lynn Ackler Southern Oregon University.
Unit 3 Day 4. Warm-Up 1.Write the Now/Next Function Rule for3, -9, 27, -81, … 2.Write the Input/Output Function Rule for the table to the right: 3.In.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Lecture 2: Introduction to Cryptography
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Intro to Cryptography Lesson Introduction
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
CRYPTOGRAPHY. DEFINITION Cryptography is the science of writing in secret code The earliest documented use began around 2,000 B.C in Egypt (Hieroglyphics)
Some of these PowerPoint pages were created by my friend Shawna Haider.
Warm Up 1) Solve: -2(x + 9) + 13 = -11 2) A triangle has side lengths of 5, 15, and 14. Is the triangle a right triangle? Why or Why not?
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Basic Encryption: methods and tools
An electro-mechanical rotor cipher machine created by the German engineer Arthur Scherbius.
Fluency with Information Technology Lawrence Snyder
Operating Systems Concepts
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

ENCRYPTION Jo Cromwell Cornelia Bradford

History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt (Hieroglyphics) The Spartans developed a transposition cipher Greeks provided 1 st recorded ciphers using numerical substitutions – 5 th Century B.C. Arabian 1 st to document cryptanalytic methods

The Polybius Square ABCDE 2FGHIJ 3KLMNO 4PQRST 5UVWXY/Z

Telegraph Samuel Morse invented the Morse Code Construction of experimental telegraph line from Washington to Baltimore (40 miles)

Radio 1895 – Changed Cryptology— Communications were open for anyone’s inspection

Electromechanical Cryptography The rotor – a thick disk with two faces, 26 brass contacts, plaintext input face,and output (ciphertext) face Americans used rotors to break Japanese codes Germany used similar machines to the rotor Polish cryptanalysts broke Enigma early in WW2 First computers were used for decoding Enigma ciphers

The Enigma Machine Like a typewriter, combining substitution and rotation ciphers in such a manner that the resulting overall cipher was difficult to break, unlike the constituent ciphers. The machine could decode as well as encoding messages. The Enigma is configured by selecting several rotors from a larger set, placing them in a particular order and a particular start position. Received messages are decoded by setting the Enigma to the same state as the encoding Enigma X instead of and processing the message again. The result is clear text with the letter spaces.

Enigma Machine

Encryption The conversion of data into ciphertext, that cannot be easily understood by unauthorized people.

Decryption The process of converting encrypted data back into its original form so that it can be understood.

Computer Encryption Text: Human, readable sequences of characters and words that are formed that can be encoded into computer readable format such as ASCII Plaintext: What you have before encryption Ciphertext: Encrypted test Cipher: Usually refers to the method of encryption

Computer Encryption ASCII: American Standard Code for Information Exchange Most common format for text files in computers and on Internet Unix & DOS-based systems use ASCII Windows NT & 2000 use the newer Unicode IBM uses an 8-bit code, EBCDIC

Computer Encryption Symmetric Key Encryption *Each computer has Secret Key *Code provides key to decoding message Public-key Encryption *Combination of Private Key and Public Key * Pretty Good Policy

Authentication Verifies that information comes from a trusted source Works hand-in-hand with Encryption to create Secure Environment

How Do You Authenticate? Password Pass Cards Digital Signatures Biometrics – Fingerprint Scan – Retina Scan – Face Scan – Voice Identification

JOYS End danger of information interception Keeps business information secure Even if Info/Password is intercepted – Can’t Read!

Government Standards National Institute of Standards and Technology (NIST) adopted Advanced Encryption Standard (AES) Banking industry will probably follow One B-I-G Algorithm Party!

References