Public-Key Cryptology An Asymmetrical Approach to Encryption.

Slides:



Advertisements
Similar presentations
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Advertisements

Sri Lanka Institute of Information Technology
Asymmetric-Key Cryptography
Public Key Encryption Algorithm
Web Security for Network and System Administrators1 Chapter 4 Encryption.
PUBLIC KEY CRYPTOGRAPHY A brief overview By Andy Brodie.
Copyright Justin Klein Keane InfoSec Training Encryption.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Chapter 5 Cryptography Protecting principals communication in systems.
Public Encryption: RSA
Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Encryption Methods By: Michael A. Scott
ASYMMETRIC CIPHERS.
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
Public Key Model 8. Cryptography part 2.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
Rachana Y. Patil 1 1.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Dr. Khalid A. Kaabneh Amman Arab University
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Computer encryption is… Based on the science of cryptography.
James Higdon, Sameer Sherwani
Public-Key Cryptography CS110 Fall Conventional Encryption.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Chapter 20 Symmetric Encryption and Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
By Yernar.  Background  Key generation  Encryption  Decryption  Preset Bits  Example.
DES Attacks and Triple DES
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Encryption / Security Victor Norman IS333 / CS332 Spring 2014.
Confidentiality Confidentiality is maintained so long as private keys are secure. Authenticity is possible via public-key encryption by encrypting messages.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Cryptography Overview and PGP - Fort Collins, CO Copyright © XTR Systems, LLC Cryptography Overview and Pretty Good Privacy Instructor: Joseph DiVerdi,
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
POON TENG HIN.  RSA  Shamir’s Three-Pass Protocol  Other issues.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Ch 13 Trustworthiness Myungchul Kim
Various Attacks on Cryptosystems slides (c) 2012 by Richard Newman.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
CS/COE 1501 Recitation Extended Euclidean Algorithm + Digital Signatures.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
BCIS 4630 Fundamentals of IT Security
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
CS/COE 1501 Recitation RSA Encryption/Decryption Extended Euclidean Algorithm Digital Signatures.
Hervey Allen Phil Regnauld 15 June 2009 Papeete, French Polynesia DNSSEC Tutorial: Public / Private.
Encryption
Presentation transcript:

Public-Key Cryptology An Asymmetrical Approach to Encryption

Overview Symmetric Cryptology Asymmetric Cryptology Digital Signature Public-Key Utilization Output of Typical Java Public-Key Encryption Program Security Discussion Q&A

Symmetric Cryptology A (unlocked); B(locked) A > B (Locking) B > A (Unlocking)

Digital Signature A, C (Locked); B (Unlocked) A > B > C (Private Key) C > B > A (Public Key)

Public-Key Utilization Reverse of the digital signature method. Public key is used first. C > B > A (Public Key) A > B > C (Private Key) Only the person with the private key can access this message.

Java Program Output Keys are just very large integers. (BigIntegers) This program utilizes the BigInteger class to make keys. Output on next slide.

Output Plaintext: Yellow and Black Border Collies Ciphertext: Plaintext: Yellow and Black Border Collies

Brute Force The only guaranteed method for decrypting an encrypted message without a key is through a brute-force method. Test every integer until it matches the correct key. Use the found BigInteger to decrypt the message. This can take a considerable amount of time. Thus, public-key encryption is extremely secure.

References

Image References