Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.

Slides:



Advertisements
Similar presentations
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Advertisements

Network Security7-1 Chapter 7 Network Security Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley,
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
1 CS 854 – Hot Topics in Computer and Communications Security Fall 2006 Introduction to Cryptography and Security.
Network Security Hwajung Lee. What is Computer Networks? A collection of autonomous computers interconnected by a single technology –Interconnected via:
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Authentication Digital Signature Key distribution.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
8: Network Security Security. 8: Network Security8-2 Chapter 8 Network Security A note on the use of these ppt slides: We’re making these slides.
CSE401n:Computer Networks
Public Key Cryptography
8: Network Security8-1 Chapter 8 Network Security A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students,
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Lecture 24 Cryptography CPE 401 / 601 Computer Network Systems slides are modified from Jim Kurose and Keith Ross and Dave Hollinger.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Lecture 23 Cryptography CPE 401 / 601 Computer Network Systems Slides are modified from Jim Kurose & Keith Ross.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Lecture 17 Network Security CPE 401/601 Computer Network Systems slides are modified from Jim Kurose & Keith Ross All material copyright J.F.
22-1 Last time □ SMTP ( ) □ DNS This time □ P2P □ Security.
Title: Cryptography Instructor: Dr. Yanqing Zhang Presented by: Jiangling, Yin Department of Computer Science Georgia State University CSC 8320 Advanced.
Network Security7-1 Chapter 8: Network Security Chapter goals: r understand principles of network security: m cryptography and its many uses beyond “confidentiality”
Midterm Review Cryptography & Network Security
Advanced Information Security 1 INTRODUCTION TO ECC Dr. Turki F. Al-Somani
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 1: Principles of cryptography.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
1 Security and Cryptography: basic aspects Ortal Arazi College of Engineering Dept. of Electrical & Computer Engineering The University of Tennessee.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
1 Network Security Basics. 2 Network Security Foundations: r what is security? r cryptography r authentication r message integrity r key distribution.
Lecture 2: Introduction to Cryptography
Overview of Cryptography & Its Applications
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Network Security7-1 Today r Reminders m Ch6 Homework due Wed Nov 12 m 2 nd exams have been corrected; contact me to see them r Start Chapter 7 (Security)
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
Encryption CS110: Computer Science and the Internet.
Intro to Cryptography Lesson Introduction
Network Security7-1 Chapter 8: Network Security Chapter goals: r Understand principles of network security: m cryptography and its many uses beyond “confidentiality”
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
INCS 741: Cryptography Overview and Basic Concepts.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
8: Network Security8-1 Chapter 8 Network Security A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students,
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Network security Cryptographic Principles
Privacy & Security.
What is network security?
ECE/CS 372 – introduction to computer networks Lecture 16
Public Key Encryption and the RSA Algorithm
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Chapter 8: Network Security
Network Security Basics
Quantum Cryptography Scott Roberts CSE /01/2001.
Presentation transcript:

Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S

Outline Section I ( Theory )  Introduction  Symmetric Key Cryptography Examples Key Issues  Public Key Encryption Algorithms  Comparison of Cryptographic systems  Hybrid Secret - Public Key Cryptography Section II ( Recent Work )  Quantum Cryptography : A New Generation of Information Technology Security System [ Mehrdad S. Sharbaf, 2009] Section III ( Future Work )

Section I Theory

Introduction Intruders can get the encrypted data, but can not do anything with it. Encryption techniques are published, standardized and available to every one. Must be some bit of secret information ( key ) that prevent an intruder from decrypting.

Introduction ( contd.) Symmetric key cryptography :  encryption and decryption keys are identical.  the key must be kept secret.  The encryption and decryption functions used can be the same or different. Public key cryptography :  different keys for encryption and decryption ( one public, the other private ). plaintext ciphertext K A encryption algorithm decryption algorithm Alice’s encryption key Bob’s decryption key K B

Symmetric Key Cryptography Cryptographic algorithms involve substituting one thing for another, in many possible ways.  Caesar cipher : Substitution with an offset of β for all letters Eg if β = 4 then a -> d b -> e there are only 25 possible keys available. Easy to break.  monoalphabetic cipher : substitute one letter for another ; now there are 26! possibilities.  polyalphabetic cipher : plaintext: abcdefghijklmnopqrstuvwxyz ciphertext: mnbvcxzasdfghjklpoiuytrewq Plaintext: bob. i love you. alice ciphertext: nkn. s gktc wky. mgsbc

Symmetric Key Cryptography : Examples Examples :  ROT 13: Very simple rotation algorithm  Caesar cipher : Another ( better ) rotation algorithm  crypt : Original Unix encryption program  DES : Data Encryption Standard [ NIST 1993]  AES : Advanced Encryption Standard  Skipjack : U. S. National Security Agency developed algorithm ( classified ) DES : Data Encryption Standard  In 1997 DES was cracked in only 140 days by a team  In 1999 DES was cracked in little over 22 hours by a network of volunteers and special purpose computer.

Symmetric Key Cryptography ( contd.) How to break simple encryption scheme Brute force : attempt all possibilities  Simple with the Caesar cipher, but gets quite difficult with monoalphabetic or polyalphabetic ciphers. Ciphertext - only attack : use statistics and other information to decrypt intercepted ciphertext Known - plaintext attack : if some of the plaintext is known, one could uncover some of the plaintext - ciphertext mappings, making decryption easier. Chosen - plaintext attack : the intruder can choose the plaintext message and receive the ciphertext form.  Can break the encryption scheme.

Symmetric Key Cryptography : Key Issues How do sender and receiver agree on key value ? How is the agreed upon key distributed to both sender and receiver in a secure fashion ? plaintext ciphertext K A-B encryption algorithm decryption algorithm K A-B plaintext message, m K (m) A-B K (m) A-B m = K ( ) A-B

Public Key Encryption Diffie - Hellman 1976: the first public key approach proposed. Sender and receiver do not share secret key Public key is available to every one Private key is known by only receiver

Public Key Encryption ( contd.) plaintext message, m ciphertext encryption algorithm decryption algorithm Bob’s public key plaintext message K (m) B + K B + Bob’s private key K B - m = K ( K (m) ) B + B -

Public Key Encryption ( contd.) plaintext message, m ciphertext encryption algorithm decryption algorithm Alice’s private key plaintext message K (m) A - K A - Alice’s public key K A + m = K ( K (m) ) A - A +

Public Key Encryption ( contd.) Result is the same if one key can decrypt a message, it must have been encrypted by the other. It must be extremely difficult, if not impossible, to deduce the private key when given a public key. K ( K (m) ) = m B B - + K ( K (m) ) A A + - =

Public Key Encryption Algorithms Diffie - Hellman : the first public key approach proposed. RSA : the best known public key system, developed by Rivest, Shamir, and Adleman ( hence RSA ). DSA : Digital Signature Algorithm, developed by the U. S. National Security Agency ( NSA ).

Comparison of Cryptographic systems With suitable keys and algorithms, both methods can be secure enough for most purposes. To use symmetric cryptography, both parties must know the secret key, which can be quite inconvenient. To use public key cryptography, one only needs to find the public key to communicate with someone else, which can be a lot more convenient. Encrypting and decrypting a lot of information with public key cryptography can be painfully slow in comparison to symmetric cryptography.

Hybrid Secret - Public Key Cryptography combine the strengths of symmetric and public key cryptography, and avoid their weaknesses. When two parties want to communicate securely, public key cryptography is used to exchange a random symmetric session key.  Since the session key is encrypted, we can ensure secrecy and mutual authentication.  Since secret key cryptography is used, this can be done relatively efficiently. When done, both parties destroy the session key. If communication is required in the future, this process is repeated from the beginning to obtain a completely new session key.

Section II

Introduction Apply the phenomena of quantum physics Relies on  The Heisenberg Uncertainty principle  The principle of photon polarization classical cryptography  communicating parties need to share the keys  protocols based on mathematical algorithms introduce security holes  rarely on refresh their cryptography keys  unproven computational assumptions  Not efficient  Can break

Quantum Cryptography What are qubits ?  both in state 0 and state 1 can exists  In classical register composed of three bits can store in a given moment of time only one out of eight different numbers  register composed of three qubits can store in a given moment of time all eight numbers in a quantum superposition

Quantum Cryptography ( contd.) Why Quantum Cryptography is secure ?  when measuring the polarization of a photon, the choice of what direction to measure affects all subsequences measurements.  photons can be easily polarized ( by photon polarization principle )  intruder can not copy unknown qubits ( no - cloning theorem ).  presence of the intruder can be determined Harvard, and Boston University built the DARPA quantum network, the world ’ s first network that delivers end - to - end network security via highspeed quantum key distribution, and tested that network against sophisticated eavesdropping attacks.

Section III Future Work

Future Direction of Quantum Cryptography Distance limitation  quantum key distribution distances are limited to tens of kilometers because of optical amplification destroys the qubit state. Develop optical devices capable of generating, detecting and guiding single photons. Lack of a security certification process or standard for the equipment. Reassurance QKD is theoretically sound. ( By experiments )

Referances [1]. http :// en. wikipedia. org / wiki / Quantum _ Crypto graphy http :// en. wikipedia. org / wiki / Quantum _ Crypto graphy [2]. Mehrdad S. Sharbaf,” Quantum Cryptography : A New Generation of Information Technology Sec urity System ”, 2009 IEEE [3]. Computer Networking A Top - Down Approach Featuring the Internet James F. Kurose and Keith W. Ross [4]. http :// www. quantiki. org / wiki / index. php / What _ is _ Quantum _ Computation %3 F [5]. http :// www. quantiki. org / wiki / index. php / Shor % 27 s _ factoring _ algorithm