 WHAT IS ENCRYPTION :-  Encryption (Round) (cont.) :-  HISTORY OF DE :-  TYPES OF DATA ENCRYPTION :-  Decryption :-  Security And Cryptanalysis.

Slides:



Advertisements
Similar presentations
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Advertisements

Security and Privacy over the Internet Chan Hing Wing, Anthony Mphil Yr. 1, CSE, CUHK Oct 19, 1998.
Sri Lanka Institute of Information Technology
Cryptography and Network Security Chapter 3
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Announcement Homework 1 out, due 1/18 11:59pm If you purchased the textbooks, but it hasn’t arrived, please see TA for copies of the questions, Project.
Review Overview of Cryptography Classical Symmetric Cipher
Cryptography1 CPSC 3730 Cryptography Chapter 3 DES.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
Public Key Cryptography and the RSA Algorithm
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
Lecture 23 Symmetric Encryption
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 9 – Public Key Cryptography and RSA Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Chapter 3 – Block Ciphers and the Data Encryption Standard
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
Introduction to Public Key Cryptography
Chapter 12 Cryptography (slides edited by Erin Chambers)
Prime Numbers Prime numbers only have divisors of 1 and self
Dr. Khalid A. Kaabneh Amman Arab University
Symmetric and Asymmetric Ciphers. Symmetric Encryption  or conventional / private-key / single-key  sender and recipient share a common key  all classical.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Network Security Lecture 17 Presented by: Dr. Munam Ali Shah.
Cryptography, Authentication and Digital Signatures
Chapter 20 Symmetric Encryption and Message Confidentiality.
13. Other Block Ciphers 13.1 LUCIFER 13.2 MADRYGA 13.3 NEWDES 13.4 FEAL 13.5 REDOC 13.6 LOKI.
1 Public-Key Cryptography and Message Authentication.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Cryptography and Network Security Public Key Cryptography and RSA.
Chapter 3 Encryption Algorithms & Systems (Part D)
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Lecture 23 Symmetric Encryption
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Fall 2002CS 395: Computer Security1 Chapter 9: Public Key Cryptography.
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
Computer and Network Security Rabie A. Ramadan Lecture 3.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
DES: Data Encryption Standard
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively as the true name and the good name, or the.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Cryptography.
CSCI-235 Micro-Computer Applications
Outline Desirable characteristics of ciphers Uses of cryptography
NET 311 Information Security
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
Basic of Modern Cryptography
Presentation transcript:

 WHAT IS ENCRYPTION :-  Encryption (Round) (cont.) :-  HISTORY OF DE :-  TYPES OF DATA ENCRYPTION :-  Decryption :-  Security And Cryptanalysis :-  KEY OF DATA ENCRYPTION:-

 Encryption is a technique for transforming information on a computer in such a way that it becomes unreadable.  Encryption is the process of obscuring information to make it unreadable without special knowledge.  A secure computing environment would not be complete without consideration of encryption technology.

 DEs was the result of research project set up by International Business Machines (IBM).  corporation in the late 1960’s which resulted in a cipher know as LUCIFR in the early it was decided to commercialise LUCIFER and a number of significant. Changes were introduced.  Published in 1977, standardized in  Key: 64 bit quantity=8-bit parity+56-bit key  In 1971, IBM developed an algorithm, named which operates on a block of using a key.

 In 1971, IBM developed an algorithm, named which operates on a block of 64 using a key  Walter Tuchman, an IBM researcher, refined LUCIFER and reduced the key size to,fit on a chip.  In 1977, the results of Tuchman’s project of IBM was adopted as the by NSA (NIST).

 DES (and most of the other major symmetric cipher) is based on cipher know as the festal block cipher.  This was block cipher developed by the IBM cryptography research Horst feistily in the early 70’s. it consists of a number rounds where each round contains bit-suffering, non- linear substitution (s-boxe) and exclusive or operation.  Most symmetric encryption schemes today are based on this structure knows as a feistily network.

 Once a plain-text message is received to be encrypt.  it is arranged into 64 bit blocks required for input if the number.  In this the message of bits in the message is not evenly dividable by 64 then the last block.  will be padded multiple permutation and substitutions are incorporated throughout in order to increase the difficulty of performing a cryptanalyst is on the cipher.  However it is generally accepted that the initial and final permutation offer title or no contribution to the security of DES and in fact some software unit implementation then although strictly speaking these are not DES as they do not adhere to.

 Hashing creates a unique, fixed-length signature for a message or data set.  Each “hash” is unique to a specific message, so minor changes to that message would be easy to track.  Once data is encrypted using hashing, it cannot be reversed or deciphered.  Hashing, then, though not technically an encryption method as such, is still useful for proving data hasn’t been tampered with.

 Symmetric encryption is also known as private-key cryptography, and is called so because the key used to encrypt and decrypt.  the message must remain secure, because anyone with access to it can decrypt the data.  Using this method, a sender encrypts the data with one key, sends the data (the cipher text) and then the receiver uses the key to decrypt the data.

 Asymmetric encryption, or public-key cryptography, is different than the previous method because.  it uses two keys for encryption or decryption (it has the potential to sec such).  With this method, a public key is freely available to everyone and is used to encrypt messages, and a different, private key is used by the recipient to decrypt messages.  Any of these methods would likely prove sufficient for proper data security, and a quick Google search will reveal the multitude of software available for data encryption.

.Data encryption is a necessity (both for legal reasons and otherwise) when transmitting information like PHI, so no matter what method you choose, make sure you’re doing everything you can to protect data.  Asymmetric encryption is most commonly used to secure physically separate end points. Examples include:  Web browser and web server (HTTPS).  VPN client and server.  Secure FTP (SSL encrypted connection).

 The same algorithm as encryption. Asymmetric encryption, or public-key cryptography,.  Is different than the previous method because it uses two keys for encryption or decryption (it has the potential to be more secure as such).  With this method, a public key is freely available to everyone and is used to encrypt messages, and a different, private key is used by the recipient to decrypt messages. . Data encryption is a necessity (both for legal reasons and otherwise) when transmitting information like PHI, so no matter what method you choose, make sure you’re doing everything you can to protect data.

 Feistily cipher implements Shannon’s S-P network concept. based on invertible product cipher  Process through multiple rounds which  partitions input block into two halves  perform a substitution on left data half  based on round function of right half & sub key  then have permutation swapping halves  Feistel cipher implements Shannon’s S-P network concept  Achieve diffusion and confusion

 Although more information has been on the Cryptanalysis of dfs than any other block cipher while having a theoretical complicity less than a brute force attack.  The most practical attack to date is still abrate foree approach.the length of the key determines the number of possible.  Differential cryptanalysis has been proposed since 1990 to break block cipher such as DES and while successful for breaking LUCIFER

 A signal round DES encryption let ^x represent the difference of the two known and chosen plaintexts x1 and x2  ^x = x1&

 A mentioned earlier there are two main types of cryptography in use today secret key or Private key cryptography and public key cryptography key cryptography  the oldest type wheres asymmetric cryptography is only being used publicly since the late 1970’s asymmetric.  The was major milestone in the search for a perfect encryption scheme.  There are two types of Key Private Key & public key.

 Private Key also called as the secret key.  This cryptography goes back to least encryption times and is of Concern  here it involves the use of only one key which is used for both encryption and decryption (hence the use of the term symmetries).  It is necessary for security purpose that the secret key never be revaluated.

SECRE T KEY E{p.k} D{C,K} CIPHERTEXT(C) SECRET KEY

 Private/secret/single key cryptography uses one key.  Shared by both sender and receiver.  If this key is disclosed communications are compromised.  Also is symmetric, parties are equal.  Hence does not protect sender from receiver forging a message & claiming is sent by sender

 It also referred as a symmetric encryption. It two gets in that security key private key or yes and public key.  Sender user a security key to enciphers message and sends to receiver when the recipient get the message.  he uses public key of sender to descript the message it is most secure message than sematic one because sender need not discover this private key.

 A public-key, which may be known by anybody, and can be used to encrypt messages, and verify signatures  a private-key, known only to the recipient, used to decrypt messages, and sign (create) signatures  Asymmetric because those who encrypt messages or verify signatures cannot decrypt messages or create signatures  Probably most significant advance in the 3000 year history of cryptography

 Public-Key algorithms rely on two keys with the characteristics that it is:  Computationally infeasible to find decryption key knowing only algorithm & encryption key  Computationally easy to en/decrypt messages when the relevant (en/decrypt) key is known  Either of the two related keys can be used for encryption, with the other used for decryption (in some schemes)

FIG : public key

 William Stallings, Cryptography and Network Security,  THANKE YOU