Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.

Slides:



Advertisements
Similar presentations
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Advertisements

Management Information Systems Lection 05 Coding and encryption CLARK UNIVERSITY College of Professional and Continuing Education (COPACE)
Security & Encryption Thomas Fenske & Joseph Minter.
Cryptography The science of writing in secret code.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt.
Encryption Methods By: Michael A. Scott
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Cryptography Week-6.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
COEN 351 E-Commerce Security Essentials of Cryptography.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
Cryptography By, Anthony Lonigro & Valentine Mbah.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Types of Electronic Infection
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Cryptography Lynn Ackler Southern Oregon University.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
 Cryptography is the science of using mathematics to encrypt and decrypt data.  Cryptography enables you to store sensitive.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
COEN 351 E-Commerce Security
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
CSCI-235 Micro-Computers in Science Privacy & Security.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Some of these PowerPoint pages were created by my friend Shawna Haider.
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Security Issues in Information Technology
CIT 380: Securing Computer Systems
Cracking Encrypted Systems
Cryptography And Network Security
Outline Desirable characteristics of ciphers Uses of cryptography
Data Compression and Encryption
CSCI-235 Micro-Computer Applications
Outline Desirable characteristics of ciphers Uses of cryptography
Chapter 3:Cryptography (16M)
Basic of Modern Cryptography
Computer Security Chapter Two
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Encryption Presentation Jamie Roberts

Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone except the intended recipient.

Cryptography, Cryptanalysis, and Cryptology n Cryptography is the art or science of secret writing n Cryptanalysis is the practice of defeating attempts to hide information. n Cryptology includes both cryptography and cryptanalysis. n Most forms of cryptography in use rely on computers, simply because human-based code is too easy for a computer to crack.

Plaintext and Ciphertext n Plaintext is the original information that is to be hidden n Ciphertext is the hidden information. n Encryption is any procedure to convert plaintext into ciphertext.

Decryption n The process of reproducing data from an encoded message based on a known code or cipher. n The code is decrypted using a list, table, or key. n Decryption is any procedure to convert ciphertext to plaintext.

History n Encryption has been around at least four thousand years n The earliest use of encryption was circa 1900B.C. when an Egyptian scribe substituted unusual symbols for standard hieroglyphs in an inscription

The Enigma Machine n Between the Enigma became the cryptographic workhorse for Nazi Germany. n It was broken by a Polish mathematician, M. Rejewski, based only on captured ciphertext and one list of three months worth of daily keys obtained through a spy. Continued breaks were obtained by Alan Turing, Gordon Welchman and others in England.

How data is encrypted n Basically encryption is a process of substitution. n An alternative value, known as a token or token character, is substituted for designated elements of a message or other data. n For example, the letter r might be replaced by the letter m.

n Anything can be used as a token character even a space can replace a numeral or letter. n Often during encoding each and every character is replaced BUT not always n Also, substitution isn’t always on a character by character basis.

n One character can represent an entire word or group of bytes. n And just to confuse you even more, a word or group of bytes may represent one letter or numeral. n Most encryption schemes vary the pattern of substitution enough so there is no recognizable pattern.

The Code or Cipher n The type of substitution made (one character for many, many characters for one, repeating or non-repeating patterns) and/or the pattern of substitutions is referred to as the code or cipher.

Symmetric Key Encryption n In this type of encryption, each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to another computer.

Public Key Encryption n This type of encryption uses a combination of a private and public key. n The private key is known only to your computer, while the public key is given by your computer to any computer that wants to communicate securely with it.

The Importance of Encryption n With the advancement of computers and interconnectivity, the US governmental institutions and industries are subject to cyber attacks, intrusion, and espionage. n Now that commercial trading on the net is a reality, one of the main targets of data encryption is credit card numbers.

n Most importantly, there is a whole lot of information that we don’t want other people to see, such as: n credit-card information, social security numbers, private correspondence, personal details, sensitive company information, and bank account information.

Ethical Issues Concerning Protection of Data n The debate over encryption revolves around the permanent conflict between industrial competitiveness and personal privacy and the interests of national security and law enforcement. n There is often mistrust felt by citizens and corporations against state mandates to cryptanalyze encrypted information

Security and Freedom through Encryption (SAFE) Act n The SAFE Act ensures that all Americans use escrow by prohibiting the domestic manufacture, sale and importation of any encryption product unless the government is given immediate access to the plaintext of communications and stored files without the knowledge of the user. It also requires that any encryption product manufactured or sold in interstate commerce, or imported into the U.S., shall include features that permit immediate access( pursuant to appropriate judicial process) to the plaintext of communications or electronic information encrypted by such product without the knowledge or cooperation of the person using such product.

Markey-White Amendment n Basically says that domestic encryption cannot be regulated by the Federal government or by the States. n Also creates stiffer penalties for person’s who use encryption to commit or hide their crimes.

Applications for Encryption n File storage: you may find encrypting files a practical way to protect your information. n practical if you fear others may read your n Data transmission: if you plan to send sensitive data files to others or to yourself for online storage, you will probably want to encrypt those files

The End