Cryptography: Securing the Information Age Source: www.aep.ie/product/ technical.html "If you think cryptography can solve your problem, then you don't.

Slides:



Advertisements
Similar presentations
Cryptography Ch-1 prepared by: Diwan.
Advertisements

Digital Signatures and Hash Functions. Digital Signatures.
NSRC Workshop Some fundamental security concerns... Confidentiality - could someone else read my data? Integrity - has my data been changed? Authentication.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Cryptography Basic (cont)
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptographic Technologies
Overview of Cryptography What is Cryptography?
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Public Key Cryptography & PGP Jay D. Dyson, Computer Systems Specialist "If you think cryptography can solve your problem, then you don't understand your.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Public Key Model 8. Cryptography part 2.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Cryptography CSPrinciples II February 12, Needs for Privacy What are some specific needs for privacy when using the internet?
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Linux Networking and Security Chapter 8 Making Data Secure.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Image Representation Privacy/Cryptography CS 104 October 3, 2011.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Chapter 8: Scrambling Through Cryptography Security+ Guide to Network Security Fundamentals Second Edition.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
Cryptography, Authentication and Digital Signatures
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Lecture 2: Introduction to Cryptography
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography Presented By: Yogita Dey Amardeep Kahali Dipanjan Devnagar Minhaajuddin Ahmad Khan ECE4, NIT Securing the Information Age.
Cryptography – Test Review
Cryptography.
Fluency with Information Technology Lawrence Snyder
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Cryptography: Securing the Information Age Source: technical.html "If you think cryptography can solve your problem, then you don't understand your problem and you don't understand cryptography." -- Bruce Schneider

Essential Terms Cryptography Encryption Plain text  Cipher text Decryption Cipher text  Plain text Cryptanalysis Cryptology Source:

Information Security for… Defending against external/internal hackers Defending against industrial espionage Securing E-commerce Securing bank accounts/electronic transfers Securing intellectual property Avoiding liability

Types of Secret Writing Secret writing SteganographyCryptography

Our Concern.. Secret writing SteganographyCryptography SubstitutionTransposition Code Cipher

Copyright 1999 Jay D. Dyson All right reserved Overview of Cryptography Cryptography is an often misunderstood and misused security tool. Today more than ever, privacy is a necessary part of business communications. The following is an overview of public key cryptography and one of its more widely-used implementations, Pretty Good Privacy (PGP). What is Cryptography?

Overview of cryptography.. Terminology: Cryptographic/Cipher System - A method of disguising a message so only authorized users may read it. Cryptology - The study of cryptography. Encryption - The process of converting plaintext into cipher text. Decryption - The process of converting cipher text back to its original plaintext. Cryptographic Algorithm - The computational procedure used to encrypt and decrypt messages. Cryptanalysis - The process of finding a weakness in, or actual breaking of, a cryptographic system.

The simplest and oldest way to send a secret message to someone. The code must be known to the sender or recipient. Types of Cryptographic Systems Secret Codes Code PhraseTrue Meaning My coffee is cold Pass the cream Launch the missiles Don’t launch the missiles

Types of Cryptographic Systems Ciphers Substitution ciphers are the simplest type of cipher system. Each letter of the alphabet is assigned to a number or different letter. ROT13 is a commonly used cipher. A B C D E F G H I J K L M A B C...

Types of Cryptographic Systems One-Time Pads One-Time Pads uses a different key for a specific time period. Truly secure, no patterns evolve. Most vulnerabilities due to human carelessness. Copyright 1999 Jay D. Dyson All right reserved One-Time Pad - Shift each encrypted letter x places to the right fazmyqbgnke Encrypted Message This is a test

Crypto Keys & Algorithms General Concepts and Definitions As a password is used to access a computer system, a cryptographic key is a password or passphrase that is used to unlock an encrypted message. Different encryption systems offer different key lengths - Just as a longer password provides more security (Windows NT excluded) the longer and more complex the key is, the more security an encryption system provides. A cryptographic algorithm is a mathematical function used for encryption and decryption. Most algorithms contain a certain number of “rounds.” This determines how many times the text will be run through the algorithm

Cryptographic Methods Secret Key (symmetric) Cryptography A single key is used to both encrypt and decrypt a message. A secure channel must be in place for users to exchange this common key. Plaintext Message Secret Key Encrypted Message Secret Key

Cryptographic Methods Public Key (asymmetric) Cryptography Two keys are used for this method, the public key is used to encrypt. The private key is used to decrypt. This is used when it isn’t feasible to securely exchange keys. Jay’s Public Key Jay’s Private Key Frank Encrypted Message Clear Text

Cryptographic Methods One-Way Functions One-way functions: Used to generate a fixed-length hash (also known as a message-digest) of a file. This hash is essentially a ‘digital fingerprint’ of the file that would be sent along with a document. The recipient would use the same method to generate a hash. If the hashes do not match the file has been altered. Message Crypto-Algorithm 5058f1af f609cadb75a75dc9d 128 bit digital fingerprint

Private vs. public Cryptography Private (symmetric, secret) key – the same key used for encryption/decryption Problem of key distribution Public (asymmetric) key cryptography – a public key used for encryption and private key for decryption Key distribution problem solved

Currently Available Crypto Algorithms (private key) DES (Data Encryption Standard) and derivatives: double DES and triple DES IDEA (International Data Encryption Standard) Blowfish RC5 (Rivest Cipher #5) AES (Advance Encryption Standard)

Currently Available Crypto Algorithms (public key) RSA (Rivest, Shamir, Adleman) DH (Diffie-Hellman Key Agreement Algorithm) ECDH (Elliptic Curve Diffie-Hellman Key Agreement Algorithm) RPK (Raike Public Key)

Simplified-DES Popularly called S-DES Very simple Uses a 10bit key to encrypt an 8bit data block Formed the basis of DES Provide a low grade of security Hence not much secure

Data Encryption Standard(DES) Most widely used private key cryptographic technique Was not feasible to crack till 1980’s Encrypts 64bit data block with 56bit key Contains many permutation functions hence making it more and more complex. Paved way for double, triple and advanced DES

RSA Developed by Rivest, Shamir and Adleman Uses a pair of public and private key Very much secure and efficient Simple approach Security based on the fact that factorizing n to get p and q is very difficult if n is a large number(>5digits)

Private-key versus public-key cryptography Prime advantage of public-key cryptography is increased security - the private keys do not ever need to be transmitted or revealed to anyone. Public key cryptography is not meant to replace secret-key cryptography, but rather to supplement it, to make it more secure. Example RSA and DES are usually combined as follows 1. The message is encrypted with a random DES key 2. DES-key is encrypted with RSA 3. DES-encrypted message and RSA-encrypted DES-key are sent. This protocol is called RSA digital envelope.

DES vs. RSA RSA is about 1500 times slower than DES – Exponentiation and modulus Generation of numbers used in RSA can take time Generally infeasible to crack RSA with limited resources and time –

Pretty Good Privacy (PGP) Overview & History PGP is a personal high-security cryptographic software application that allows people to exchange messages or files with privacy, authentication, and convenience. PGP can be used to encrypt and digitally sign files and . Developed by Phil Zimmerman in the mid ‘80s. First version released on the Internet in 1991; got immediate NSA attention and encountered legal issues on its use of RSA and Merkle-Hellman cryptography patents. Purchased by ViaCrypt in 1993 (they had RSA license). Re-released in 1994 with RSAREF toolkit license. Purchased by Network Associates in 1998.

PGP (Pretty Good Privacy) a hybrid encryption technology Message is encrypted using a private key algorithm (IDEA or DES as previously used) Key is then encrypted using a public key algorithm (RSA) For file encryption, only IDEA algorithm is used PGP is free for home use

Authentication and Digital Signatures Preventing impostor attacks Preventing content tampering Preventing timing modification Preventing repudiation By: Encryption itself Cryptographic checksum and hash functions

Digital Signatures Made by encrypting a message digest (cryptographic checksum) with the sender’s private key Receiver decrypts with the sender’s public key (roles of private and public keys are flipped)

Benefits of Cryptographic Technologies Data secrecy Data integrity Authentication of message originator Electronic certification and digital signature Non-repudiation

Potential Problems with Cryptographic Technologies? False sense of security if badly implemented Government regulation of cryptographic technologies/export restrictions Encryption prohibited in some countries

How Secure are Today’s Technologies? $250,000 machine cracks 56 bit key DES code in 56 hours IDEA, RC5, RSA, etc. resist complex attacks when properly implemented distributed.net cracked 64 bit RC5 key (1,757 days and 331,252 people) in July, 2002 A computer that breaks DES in 1 second will take 149 trillion years to break AES! Algorithms are not theoretically unbreakable: successful attacks in the future are possible

How Secure are Today’s Technologies? Encryption does not guarantee security! Many ways to beat a crypto system NOT dependent on cryptanalysis, such as: – Viruses, worms, hackers, etc. – TEMPEST attacks, – Unauthorized physical access to secret keys Cryptography is only one element of comprehensive computer security Source: The Gartner Group

What is to be done? The Gartner Group recommends: Develop migration plans to stronger crypto. Begin implementation of modified and stronger algorithmic techniques.

Your questions are welcome! Presented by:- Akshay kumar Ekta raghav Himanshu chaudhary