1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure and Applications
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Chapter 11: Cryptography
Pretty Good Privacy (PGP). How PGP works PGP uses both public-key cryptography and symmetric key cryptography, and includes a system which binds the public.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Principles of Information Security, 2nd edition1 Cryptography.
Cryptography Basic (cont)
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 31 Network Security
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Electronic Mail Security
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
©Copyrights 2011 Eom, Hyeonsang All Rights Reserved Distributed Information Processing 20 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
1 Lesson Internet Organization network Fire wall.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter 8: Scrambling Through Cryptography Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography, Authentication and Digital Signatures
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav
Welcome to the Introduction of Digital Signature Submitted By: Ankit Saxena.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Network Security Celia Li Computer Science and Engineering York University.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
1 Original Message Scrambled Message Public Key receiver Internet Scrambled+Signed Message Original Message Private Key receiver The Process of Sending.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
K E Y Plain text Cipher text Encryption Decryption
Cryptography and Security Technologies
Presentation transcript:

1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical techniques to ensure confidentiality of information Encryption and Decryption Encryption and Decryption The process of scrambling a message with the help of a key is called Encryption The process of scrambling a message with the help of a key is called Encryption The process of unscrambling a message using an appropriate key is called decryption The process of unscrambling a message using an appropriate key is called decryption Keys are numbers or characters that are randomly generated Keys are numbers or characters that are randomly generated Symmetric and Asymmetric cryptography Symmetric and Asymmetric cryptography Symmetric - same keys are used for encryption and decryption Symmetric - same keys are used for encryption and decryption Asymmetric or Public Key Cryptography – a pair of public key and private key is used for encryption and decryption Asymmetric or Public Key Cryptography – a pair of public key and private key is used for encryption and decryption Pretty Good Privacy (PGP) – a popular cryptographic system Pretty Good Privacy (PGP) – a popular cryptographic system

2 Digital/Electronic Signatures An electronic signature means any letters numbers, symbols, images, characters or any combination thereof in electronic form applied to an electronic document An electronic signature means any letters numbers, symbols, images, characters or any combination thereof in electronic form applied to an electronic document Uses public key cryptography Uses public key cryptography Ensures authenticity, integrity and non- repudiation Ensures authenticity, integrity and non- repudiation  Authenticity means the message is from a particular source/individual  Integrity means the message has not been altered  Non-repudiation means that the execution of the digital signature cannot be denied Electronic signature vs. hand written signature Electronic signature vs. hand written signature

3 Digital Certificates Establish whether or not a public key belongs to the purported owner Establish whether or not a public key belongs to the purported owner Comprises of a public key, certification information (name, ID etc.) and electronic signatures of a certification authority Comprises of a public key, certification information (name, ID etc.) and electronic signatures of a certification authority x.509 standard format x.509 standard format

4 Name:Jonathan Marshall Public Key: Date Issue:January 15, 2003 Date Expiry: January 15, 2005 Serial Number: We certify that the above information is true. Dues Certification Authority Inc.

5 Certification Authority (CA) A trusted public/private body that attests the association of a particular individual with his/her corresponding public key A trusted public/private body that attests the association of a particular individual with his/her corresponding public key Signs digital certificates with its private key Signs digital certificates with its private key Hierarchy of CA’s Hierarchy of CA’s Can issue different types of digital certificates attaching different levels of trust Can issue different types of digital certificates attaching different levels of trust

6 Hash Function & Message Digest Hash function is a one-way mathematical function applied to a message Hash function is a one-way mathematical function applied to a message Result of the hash function is unique to each message called Message Digest Result of the hash function is unique to each message called Message Digest A message digest is a single large number typically between 128 and 256 bits in length A message digest is a single large number typically between 128 and 256 bits in length

7 Original Message Scrambled Message Public Key receiver Internet Scrambled+Signed Message Original Message Private Key receiver The Process of Sending Messages Using Public Key Cryptography How Digital Signature Technology Works? Sender Receiver Message Digest signed with the Private Key of sender Public Key sender to reveal Message Digest Hash

8 Steps Involved in Digital Signature Process 1. Hash function is applied to the original message in order to find the message digest 2. Public Key of the receiver is used to encrypt the message 3. A digital signature is attached to the scrambled message by signing the message digest with Private Key of the sender 4. The encrypted message, the digital signature and the hash function are sent to the receiver 5. Public Key of the sender is used by the receiver to reveal the message digest and, thus, to confirm identity/authenticity of the sender 6. Receiver uses his/her Private Key to decrypt the message 7. Receiver applies hash function to the received original message and computes the message digest – if this message digest matches with the one received from the sender, it confirms that the message has not been altered during transmission

9 Public Key Infrastructure (PKI) A structured system that provides key management facilities, storage and management facilities of digital certificates and involves a certification authority A structured system that provides key management facilities, storage and management facilities of digital certificates and involves a certification authority Application of PKI Application of PKI  Online contracts  E-Banking – electronic payment systems such as electronic checks, credit card based systems, electronic cash, micro payment systems

10 Key Length A cryptographic key is represented as a string of binary digits – 0’s & 1’s inside a computer A cryptographic key is represented as a string of binary digits – 0’s & 1’s inside a computer If a key is 1 bit in length it means two possible keys, that is, 0 and 1. If a key is 2 bits in length it means four possible key values, 00,01,10 and 11 If a key is 1 bit in length it means two possible keys, that is, 0 and 1. If a key is 2 bits in length it means four possible key values, 00,01,10 and 11 Key having 3 bits length can have values - 000,001,010,011,100,101,110,111 Key having 3 bits length can have values - 000,001,010,011,100,101,110,111 Number of keys = 2 (number f bits) Number of keys = 2 (number f bits)

11 Symmetric Key Algorithms DES (Data Encryption Standard) – 56 bits DES (Data Encryption Standard) – 56 bits IDEA (International Data Encryption Algorithm (IDEA) – 128 bits IDEA (International Data Encryption Algorithm (IDEA) – 128 bits RC2 – (block cipher) bits RC2 – (block cipher) bits RC4 (stream cipher) – bits RC4 (stream cipher) – bits Rinjdael – bits Rinjdael – bits

12 Attacks on Symmetric Key Algorithms Key Search Attacks Key Search Attacks Cryptanalysis Cryptanalysis System-based Attacks System-based Attacks

13 Attacks on Symmetric Key Algorithms… Key Search (Brute Force) Attacks – attempt to decrypt the message with every possible key Key Search (Brute Force) Attacks – attempt to decrypt the message with every possible key  The greater the key length, the more difficult it is to identify the key  If there were a computer that could search a billion keys per second, and if you had a billion of these computers, it would still take billion years to search all possible 128 bit keys

14 Attacks on Symmetric Key Algorithms… Cryptanalysis – encryption algorithms can be defeated by using a combination of sophisticated mathematics and computing power so that many encrypted messages can be deciphered without knowing the key Cryptanalysis – encryption algorithms can be defeated by using a combination of sophisticated mathematics and computing power so that many encrypted messages can be deciphered without knowing the key System-Based Attacks – attack the cryptographic system that uses the cryptographic algorithm without actually attacking the algorithm itself System-Based Attacks – attack the cryptographic system that uses the cryptographic algorithm without actually attacking the algorithm itself

15 Public Key Algorithms DSS – Digital Signature Standard based on DSA (Digital Standard Algorithm) – key length is between bits DSS – Digital Signature Standard based on DSA (Digital Standard Algorithm) – key length is between bits RSA RSA  developed in 1977 by three professors at MIT  provides basis of existing digital signature technology  key may be of any length depending on the system Elliptic Curves Elliptic Curves

16 Attacks on Public Key Algorithms Key Search Attacks – these attacks attempt to derive a private key from its corresponding public key with the use of a large factoring number Key Search Attacks – these attacks attempt to derive a private key from its corresponding public key with the use of a large factoring number Analytical Attacks – uses some fundamental flaw in the mathematical problem on which the encryption system is based Analytical Attacks – uses some fundamental flaw in the mathematical problem on which the encryption system is based