Fmdszqujpo! Encryption!. Encryption  Group Activity 1:  Take the message you were given, and create your own encryption.  You can encrypt it anyway.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.

Section 3.8: More Modular Arithmetic and Public-Key Cryptography
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
03 December 2003 Public Key Infrastructure and Authentication Mark Norman DCOCE Oxford University Computing Services.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Introduction to Cryptography
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
Cryptography Week-6.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Section 3.6: An Introduction to Cryptography
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
Encryption Encryption encodes information to hide it from everyone else … maintaining your privacy.
Linux Networking and Security Chapter 8 Making Data Secure.
CIS 450 – Network Security Chapter 8 – Password Security.
Cryptography, Authentication and Digital Signatures
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
1 SC700 A2 Internet Information Protocols 4/17/2001 Application Presentation by J. Chu Pretty Good Privacy.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
6fb52297e004844aa81be d50cc3545bc Hashing!. Hashing  Group Activity 1:  Take the message you were given, and create your own version of hashing.  You.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
Security School of Business Eastern Illinois University © Abdou Illia, Fall 2002 (Week 12, Wednesday 11/13/2002)
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Chapter 3 Encryption Algorithms & Systems (Part D)
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
By Hani AlQaffas.  Cryptography is a technique used to hide the meaning of a message and is derived from the Greek word kryptos (hidden).  This is different.
CSC 386 – Computer Security Scott Heggen. Agenda Cryptography (i.e., Confusion and Diffusion)
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Intro to Cryptography Lesson Introduction
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Encryption Encryption: Transforms Message so that Interceptor Cannot Read it –Plaintext (original message) Not necessarily text; Can be graphics, etc.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
 Cryptography Melissa Pollis. What is Cryptography?  the science or study of the techniques of secret writing, especially code and cipher systems 
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Encryption with Keys and Passwords
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Encryption
Cryptography.
Lesson 4-5 AP Computer Science Principles
M3: Encryption r By Andrew Stringer.
Chapter 3:Cryptography (16M)
Simple Encryption- Lesson 5
Lesson 7: Simple Encryption
Digital Communications
Fluency with Information Technology Lawrence Snyder
Presentation transcript:

Fmdszqujpo! Encryption!

Encryption  Group Activity 1:  Take the message you were given, and create your own encryption.  You can encrypt it anyway you want  Try to make an interesting version that you think no other group will be able to guess!

Encryption  What do you all think Encryption is?  Where do you think a good place is to use encryption?

Encryption  To change information from one form to another especially to hide its meaning. (from the merriam-webster dictionary)  In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. (from our favorite site Wikipedia)cryptography

Encoding  Encoding is the act of transforming data so that it may be properly consumed by another party  Encoding is not used for security purposes  Common Encoding Schemes  HTML  URL  Unicode  Hex

Encryption  Encryption is similar to encoding, except it implements the use of a key  A key is typically a random string of bits used to scramble and unscramble data  Different types of Encryption  Symmetric Key Encryption  Public Key Encryption  Common Encryption Schemes  WEP  TKIP  AES-CCMP

Encryption Exhaustive Key Search

Cracking Activity 1  For this activity, we will list each of the messages up here, and then each group should choose a message and try to crack the encryption and get the message.

Cracking Activity 1  The messages are:

More Definitions, yay  There are 2 types of encryption, weak encryption and strong encryption.  Weak encryption means that although it is encrypted, it is a simple algorithm, or simple way to encrypt it, and can be cracked in minutes to anything less than a day or so. An example of this is from a security flaw found in March. This flaw is from the days when the government enforced that products be exported with weak encryption, but then was forgotten, and wasn’t discovered till this year, leaving a lot of time for any number of people to exploit it. The encryption was 512 bits, which can be cracked in about 7 hours if you have a good enough set of computers (or using a cloud of computers).

Definitions cont.  Strong encryption means that the data/message is encrypted with either a very complex algorithm, or it is encrypted enough times that it takes a long time to decrypt. An example is that you use 2048 bit encryption, or if you want to keep the weak encryption algorithm, you can encrypt the data multiple times to make it stronger (like encrypting a message with one method, then encrypting the result with another, and so on for 5 different encrypted algorithms).

Definitions cont.  One last definition that is good to know is what we mean when we say we will crack encryption. When we say crack we mean break it or decrypt it in some shape or form.

Example 1 – Caesar cipher

 A Caesar cipher is an algorithm that uses the English alphabet to change a message into something else. You choose a number from 1 to 25, and for each letter in the message you want to encrypt, you add the number to it and change to the new letter. Example 1 – Caesar cipher

 Let’s say we want to take this phrase ‘thisisencryptionclass’ and use the Caesar cipher to encrypt it. Let’s say we choose 5 as our ‘key’, which means the value we want to change it with. First thing we can do is right out the alphabet from 0 to 25, and place the letters with the numbers.   a b c d e f g h i j k l m n o p q r s t u v w x y z Example 1 – Caesar cipher

 t h i s i s e n c r y p t i o n c l a s s    a b c d e f g h i j k l m n o p q r s t u v w x y z  So the message in number form is:  Example 1 – Caesar cipher

 Ok, now that we have the message as a number, let’s convert it using the key.  Our key = 5 in this case, so add 5 to every number (and when it hits 25, start back at 0 ie = = 2 Example 1 – Caesar cipher   …..… 

 Finally, let’s convert that back to letters:  (remember:   a b c d e f g h i j k l m n o p q r s t u v w x y z Example 1 – Caesar cipher   y m n x n x j s h w d u y n t s h q f x x

 That means our original message: thisisencryptionclass  Is now encrypted and looks like this:  ymnxnxjshwduyntshqfxx  Pretty simple right? Example 1 – Caesar cipher

Example 2 – Substitution Cipher

 The Substitution cipher goes one step further, and instead of using a single key, we just arbitrarily change the way we have the letters. Example 2 – Substitution Cipher  For this example, let’s use the following for our substitution key:  a b c d e f g h i j k l m n o p q r s t u v w x y z  j d k e b o a p r i l u m n w q s f z x c v b s t y

 Now, using the same message we had in example one, we substitute each letter for the one in the key we made.  thisisencryptionclass is the message and gets encrypted to: Example 2 – Substitution Cipher  t h i s i s e n c r y p t i o n c l a s s  x p r z r z b n k f t q x r w n k u j z z  a b c d e f g h i j k l m n o p q r s t u v w x y z  j d k e b o a p r i l u m n w q s f z x c v b s t y

Example 3

 For this example, we will explore public/private key encryption  First off, go to  We will use this site for the public/private key encryption

Example 3  unencrypted message:  thisisencryptionclass

Example 3  public key:  -----BEGIN PGP PUBLIC KEY BLOCK-----  Version: BCPG C# v  mQENBFWUN4IBCACLRN0U0mcGe69UWvc0k7ZYZ5NH1eyIqpRzuISgjvC3AUBWqROk  yveE/zKUDBcYTge3G2yEOuAfTA6lCGPhXfSug6un9r1ddWcmfQK4BSVqFurlZpcC  x10f5ZLsIsJyDXML8GgKk3q0HhPxiE9qVnrhq1lV1KHaAaf60ifbr2dpTZkxLP9Q  hd/1it+wpByNO6xq+lx47CVbOoiCDIQxqPI1CixqnZGmFQ8MNf5dqtDN2i6aVoIb  TtYQSQppKO/bUG6//8mosmWfCQ9T7dHDRgX6KRVTv6PxsmXXFuj4iurcjFPK+9GP  mBf/ml8LwxhHM0b2wc2RTouc7KMrZ2yEQ2VHABEBAAG0HHdiZjAwMDdAdGlnZXJt

Example 3  YWlsLmF1YnVybi5lZHWJARwEEAECAAYFAlWUN4IACgkQnqgOCvo1SJWYiAf/S8bH  P/nUwfVTwyPQ4SHmhA7Dk4ywYuAsrMp6zuaHlPu1s21CMc88GLupcaT8CNdb9I7J  qZeTKVUwRlZAR/CkkF8IcAq/02QrNrZA9Uj0ZaGvxvy9x6MjTazDPkqPJ7IoYmIG  BlvSwGY2LQW5piuHuBgi2VSv8g3d1/4unVph0iiqCosAKldHrLJBkKe0evr0eF1H  BG1htjf9M5t2GyUk2OQ/rw+wYE2bYPZQjtYdgjE3U+hyZpBotrTQFl4ZvuDQdffU  ok2Hrw/vAy92KlM1UcjBO7m2VV52e5TdUVru/tnhvKADzpAn3LgQUVbj5W0GXPds  T+qMeOSA6Iw2fO8gsg==  =LzLX  -----END PGP PUBLIC KEY BLOCK-----

Example 3  encrypted message:  -----BEGIN PGP MESSAGE-----  Version: BCPG C# v  hQEMA56oDgr6NUiVAQf+OZxioO1wGz3nnEImnyjrKViYBCN4boM+gKGiVo2RRPWw  +Pw8FDyjL2jO8CiX1+UTTZma0x9IXxHhoiQbA5Yncy9Hkn98SuPjvAm4CBvVqwTt  p4l6vm8eGdN8PqHfyGOVgbmvyoAfF8ciG5v5WLk3hJOUYy5t8MHSEltK/DA2RWQw  muUt5ExVxV7usHjUknRXT8FMbRfBZ+maGR5AxLbYnxFwQG5gkldjT4FbXI/cSxEC  p1dgUBL9+TLB/S2SCUCTiblpAn6AlaSfA3lpSU767aoRFhFqdiX+ObYDM6duOXNG  /VB80WwC3T9hMeHy1+KMPKeX3rfWRFmYmC8OfhCroskzr7AEPSOX19hwGijRPpUi  8IcaQyMcZ+mvuyIXP2XAtZgwDjWU9/twrQII1oUI/py6Tsq5  =5kkc  -----END PGP MESSAGE-----

Cracking Activity 2  Let’s go to this website to do some encryption and decryption:  As a group, create a few messages  Then take those messages and encrypt them  Next, bring them up to me and put a note that tells me which encryption you used for it  Finally, each group should choose a few (not your own) and try to decrypt them. Once you’ve decrypted them, tell us which you chose, what encryption it was, and what the message is

Public/Private Key Activity  Go to the website:  Split each group in half, and each half will play a role  One will be the owner of the public/private keys, and the other will be the one to send the message  The owner should give the sender their public key, and the sender should use the public key to encrypt the message. The sender then gives the message to the owner, who decrypts it using the private key and password for their keys  Next, each half should reverse roles  Finally, both halves will be owners and senders.