Using cryptography to protect data in networks. Summary National Taras Shevchenko University of Kiev Ukraine Vsevolod Ievgiienko.

Slides:



Advertisements
Similar presentations
Module XXI Cryptography
Advertisements

Confidential 1 Phoenix Security Architecture and DevID July 2005 Karen Zelenko Phoenix Technologies.
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Meganet Corporation VME Office Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
Presentation. Contemporary Communication Fast – connects us quickly without delays Reliable – works always Global – connects us with the whole world Low.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Using Cryptography to Protect Data in Computer Networks: case study Vsevolod Ievgiienko National Taras Shevchenko University of Kiev Faculty of Cybernetics.
U N C L A S S I F I E D LA-UR LANL Exchange / Blackberry Deployment June 2, 2009 Anil Karmel Solutions Architect Network and Infrastructure Engineering.
ELKAT Security Engineering Ltd. Poland Activity Plan Avi Arbili Regional Sales Director – Europe Cell:+972-(0) 52 – Tel: +972-(0) Fax:
Lecture 5: security: PGP Anish Arora CSE 5473 Introduction to Network Security.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
Principles of Information Security, 2nd edition1 Cryptography.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Implementing Unified Messaging Joseph Blanchard Joseph Mancuso S. Paul Petroski.
Course 2150A: Designing a Secure Microsoft Windows 2000 Network.
Electronic Customer Portal System. Reducing Risks – Increasing Efficiency – Lowering Costs Secure Internet based Communication Gateway direct to your.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Security. Introduction to Security Why do we need security? What happens if data is lost? –Wrong business decisions through lack of information –Long-term.
Prof.P.Bekh, Kiev, Ukraine1 Information security in IT society: humanitarian aspects. Prof. Petro Bekh Taras Shevchenko National University of.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Computer Jobs 2013 Bob Nielson. Average Wage The average wages of all jobs in America >>>> $45,790 > $80,180.
Making the Internet a Better Place for Business NIST PKI Steering Committee March 14, 2002.
By: Surapheal Belay ITEC ABSTRACT According to NIST SP : “ Mail servers are often the most targeted and attacked servers on an organization’s.
Computer Jobs 2014 Bob Nielson. Average Wage The average wages of all jobs in America >>>> $45,790 > $80,180.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
George L. Heron Technology Officer, SafeNet, Inc..
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Information Technology Programs. Why major in IT? “...Total US IT employment is predicted to double in this decade. Similarly, the security of computer.
Chapter 3.  The characteristics and purpose of: ◦ Intranets ◦ Internet ◦ Extranets.
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
PGP ENCRYPTION Prepared by Noel Kigaraba. Introduction This presentation explains the basic information about PGP encryption software. It discusses the.
Protecting and Sharing Documents Lesson 13. Objectives.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Electronic data collection system eSTAT in Statistics Estonia: functionality, authentication and further developments issues 4th June 2007 Maia Ennok,
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
IP Security. P R E S E N T E D B Y ::: Semester : 8 ::: Year : 2009 Naeem Riaz Maria Shakeel Aqsa Nizam.
Electronic data collection System in CSB of Latvia By Karlis Zeila, Vice President, CSB of Latvia IT DG meeting, October , Eurostat.
Security School of Business Eastern Illinois University © Abdou Illia, Fall 2002 (Week 12, Wednesday 11/13/2002)
Advanced file encryption Copyright © 2002 Deerfield.com, All Rights Reserved.
Presentation of Kiev National Taras Shevchenko University.
Communications & Networks National 4 & 5 Computing Science.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Introduction TO Network Administration
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Microsoft Virtual Academy Talbott Crowell | Chief Architect, ThirdM.com Rob Latino | Program Manager in Office 365 Support, Microsoft.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Armenia Twinning 2011 Component F – Information Society, 2 – 6 May DEVELOPMENT OF INFORMATION SOCIETY STATISTICS IN LITHUANIA SURVEY ON.
Online Data Storage Companies MY Docs Online. Comparison Name Personal Edition Enterprise Edition Transcription Edition Price $9.95 monthly rate $4.99.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
ITwin iTwin Presented by: G.Vyshnavi 14A81A0572 CSE-B.
Web Applications Security Cryptography 1
Chapter 6 Application Hardening
e-Health Platform End 2 End encryption
Presented by, K.K.Radhika.
Networks and the Internet
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

Using cryptography to protect data in networks. Summary National Taras Shevchenko University of Kiev Ukraine Vsevolod Ievgiienko

Kiev University Today 21 faculties 154 chairs 318 full professors 1130 associated professors 276 assistant professors 991 scientific staff Founded in 1834Founded in chairs and 9 labs are acting in 4 directions: applied mathematics computer science social applications of software development software engineering 30 full professors 102 associated professors 61 assistant professors, engineers 1021 bachelors and masters

Scientific Partners Association for Communications, Electronics, Intelligence and Information Systems Professionals Faculty of Cybernetics Military Technical Academy (Warsaw, Poland)

AFCEA Ukraine Chapter Prof. Volodymyr Zaslavskyy President of AFCEA Ukraine Chapter Phone: (38044) FAX: (38044)

Summary The result of my research was a set of applications created for secure correspondence and secure storage of data in networks.

Summary A primary objective was to create cheap, simple for an end user and at the same time powerful cryptographic solution. A user must not be a specialist in cryptography to use it. A secondary objective was to make the source code opened enough for verification of all implemented cryptographic algorithms.

Project Development New project is based on the previous one presented at AFCEA's International Student Conference Development of a remote storage system for confidential data suitable for usage in networks of small and middle enterprises.

Project Description A simple, user-friendly software uploads user files to a remote storage space, eliminating all traces of the confidential document on the sending computer. Authorisation requires a unique asymmetric key, eliminating the possibility of the password being discovered through trial-and- error. All encryption operations are done on sending computer and all data is transfered to server via encrypted channel. Unauthorised access is blocked for server administrators.

Project Description Screenshot of BETA version Server Internet, LAN etc.

Project Description Advantages: Strong crypto algorithms: RSA, AES, Twofish, Serpent, SHA2… Simple compilation on different operating systems using GCC or compatible compiler (tested on Microsoft Windows 2003/XP/Vista and FreeBSD 6.3) Server applications does not need much system resources

Contact me Web: Phone: (38050)