CPS 001 32.1 Today’s topics Computer Applications Computer Security Upcoming Operating Systems ( Great Ideas, Chapter 10) Reading Great Ideas, Chapter.

Slides:



Advertisements
Similar presentations
Module XXI Cryptography
Advertisements

Cryptography and Network Security Chapter 9
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
Public Key Encryption Algorithm
Information Systems Ethics, Computer Crime, and Security
Network Security Hwajung Lee. What is Computer Networks? A collection of autonomous computers interconnected by a single technology –Interconnected via:
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
CS1001 Lecture 24. Overview Encryption Encryption Artificial Intelligence Artificial Intelligence Homework 4 Homework 4.
Cryptography and Public Policy Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Encryption Encryption encodes information to hide it from everyone else … maintaining your privacy.
CS110: Computers and the Internet Encryption and Certificates.
Encryption Coursepak little bit in chap 10 of reed.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Lecture Computer Security Ports, Firewalls, Passwords, and Malware.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
SNU IDB Lab. 1 Great Ideas of CS with Java Part 1 WWW & Computer programming in the language Java Ch 1: The World Wide Web Ch 2: Watch out: Here comes.
CompSci Today’s Topics Computer Science 1 Review Upcoming Final Exam: Thursday, 06/30, 2:00pm, Room 229 Social Sciences (here) Reading Great Ideas,
12/01/1999Joe Lewis - Xcert International Inc. Who’s Peeking at Your Files? A Guide to Personal Data Security.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Chapter 21 Public-Key Cryptography and Message Authentication.
Network Security Management Dr. Robert Chi Chair and Professor, IS department Chief editor, Journal of Electronic Commerce Research.
Encryption, continued Public Key encryption and Digital Signatures.
Information Security -- Part II Public-Key Encryption and Hash Functions Frank Yeong-Sung Lin Information Management Department National Taiwan University.
Public-Key Encryption
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Lecture 2: Introduction to Cryptography
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic.
What use are prime numbers? ?. o All the primes, apart from 2, are odd numbers. o 1 is not a prime number. Why? o There are infinitely many prime numbers!
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cryptography Deffie hellman. organization Foundations Symmetric key Symmetric key weaknesses Assymmetric key Deffie hellman – key exchange RSA – public.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Computer Security: Problem
Privacy & Security.
Encryption NSA – used to be able to crack most codes, technology has changed that Encryption is the art of encoding messages so they can’t be understood.
PART VII Security.
Encryption NSA – used to be able to crack most codes, technology has changed that. Now other methods are applied by NSA to access transmissions (see 2013.
Faculty of Science IT Department By Raz Dara MA.
Encryption NSA – used to be able to crack most codes, technology has changed that Encryption is the art of encoding messages so they can’t be understood.
Presentation transcript:

CPS Today’s topics Computer Applications Computer Security Upcoming Operating Systems ( Great Ideas, Chapter 10) Reading Great Ideas, Chapter 11

CPS Computer Security: Problem  The Problem: Billions in Losses  Outright theft  Online scams  Viruses / Worms o Actual damage o Actions to avoid damage  Denial of Service  Etc.  Possible Traps (Public Systems ! ! ! )  Trojan Horse  Onlooker  Cameras

CPS Computer Security: Defenses  Passwords  Using Secure Passwords  Keeping them Secure  Encryption  Simple  Strong  Good Practices  Like all fields, doing something stupid …  Tradeoffs  Is the cure worse than the disease?  Long Live Common Sense!

CPS Good Passwords and Cracking  Briefcase (style) Combination Locks  Brute force methods: Try all combinations 1. Number of wheels 2. Number of position per wheel 3. Time per trial 4. How long does it take?  Contrast to BRUTE brute force method (Always Consider!)  Password on a computer  + More possibilities per “wheel”  + More “wheels” (often up to user)  - Computer based cracking faster!  - Dictionary attacks  Picking a good UNIX password

CPS Encryption  When passwords fail, encryption can be fallback  Also provides extra level of difficulty  Security vs. Privacy  Many levels of encryption: Go through some of them  Single Alphabetic Substitution  Caesar: L FDPH, L VDZ, L FRQTXHUHG  Magic decoder ring?  Cryptoquote  Cracking single alphabetic substitution  Character frequency  (Length of text)

CPS Encryption  Polyalphabetic Substitution  The Vignere Cypher  The Babbit Solution  Cypher Reuse !  One Time Pads  Can be Absolutely Secure  Computers and Random Number Generators ?!  The Key Exchange Problem  Threats  Using your “secure” channel  A padlock analogy  Diffie, Hellman, and Merkle solution

CPS Public Key Encryption  Publishing the Key!  Another padlock analogy  Diffie Proposal (1975)  Rivest, Shamir, and Adleman (RSA)  Finally came up with a practical method that met the proposed specs  Widely used now  Based on factoring (not being able to factor!)  Primes and Factoring  Examples of primes  How to factor into primes  For large numbers it is very hard

CPS Public Key Encryption  Going through an RSA example  Public key: N, K Private key: G Message: M  RSA : C = (M^K)%N M = (C^G)%N  Remainder operator (modulus) % o Wrap around property o Clock or odometer analogy  Follow example in Text...  Breaking the Code  Factoring  Digital Signatures  Using Private Key and Public Key  Replay attack !  Time (analogy: newspaper in hostage picture)

CPS Politics of Strong Encryption  These unbreakable* methods called Strong Encryption  *more or less  Is any method perfect?  Government tried to keep them from getting out  Encryption classified as a munition  Export restrictions...  Anecdotes  PGP – Pretty Good Privacy  Zimmerman  Legal challenges  Cat out of the bag  Recent silence from government  Has the NSA cracked it?

CPS Other Attacks (buzz words)  Many leave no trace  Password Cracking  Considered earlier  IP Spoofing  Weakness in TCP/IP; modern code deals with it  Replay Attack  Saw in Digital Signature discussion  Applies in many situations  (copy of your key made at hardware store)  Man in the Middle  Typically hardware attack  Denial of Service

CPS Whom can you trust?  How to avoid Viruses and Worms  Most infections occur when trying to run unknown  Mail or other communications programs the vector  Trapdoors  Free software may have its price  Common Sense  Consider alternatives  The human factor  Gun to the head method  The Strong Encryption Trap  Forget that password?  Bye – bye !