Crypto Bro Rigby. History

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

GOPAS TechEd 2012 PKI Design Ing. Ondřej Ševeček | GOPAS a.s. |
MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
Conventional Encryption: Algorithms
SSL Implementation Guide Onno W. Purbo
CIS 193A – Lesson6 CRYPTOGRAPHY RAPELCGRQ. CIS 193A – Lesson6 Focus Question Which cryptographic methods help computer users maintain confidentiality,
DNSSEC Cryptography Review DNSSEC Tutorial February 21, 2011 Hong Kong Will.i.am Hervey Allen.
NSRC Workshop Some fundamental security concerns... Confidentiality - could someone else read my data? Integrity - has my data been changed? Authentication.
1 ITNS and CERIAS CISSP Luncheon Series: Cryptography Presented by Addam Schroll, CISSP.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Web Security for Network and System Administrators1 Chapter 4 Encryption.
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Cryptography ECT 582 – Winter 2004 Robin Burke. Discussion.
©Copyrights 2011 Eom, Hyeonsang All Rights Reserved Distributed Information Processing 20 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Lecture 2: Introduction to Cryptography
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Cryptography Gerard Klonarides. What is cryptography? Symmetric Encryption Symmetric Encryption Asymmetric Encryption Asymmetric Encryption Other cryptography.
Various Attacks on Cryptosystems slides (c) 2012 by Richard Newman.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
BCIS 4630 Fundamentals of IT Security
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Basic Network Encryption
Basic Network Encryption
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Crypto Bro Rigby

History

Terms Plaintext Encryption Cipher Cipher text Cryptography Cryptographers

Terms Cryptanalysis Cryptanalysts Cryptology Keys Keyspace Hashing

Symmetric Encryption (Single Key)

How big are keys? 128? Has possible values – The total lifetime of the universe is about 2 61 seconds. – Number of atoms in the earth – Number of atoms in the sun – Number of atoms in the universe 2 265

Algorithms' Stream Ciphers (1 bit at a time) Block Ciphers (Chunks at a time, AES uses 128 bit blocks) Examples – DES, 3DES (No Longer Used) – Twofish, Serpent, AES, Blowfish, CAST5, RC4, TDES, IDEA

Symmetric Encryption DES (Data Encryption Standard) – 56 Bit – Federal Information Processing Standard (FIPS 46) in 1976 – 1997: RSA contest won by distributed crack (10,000 clients) – 1998: EFF built a $250K machine to crack DES in 2 days 2002 AES (May 26 th, 2002) – 5 Finalists (Mars,RC6,Rijndael,Serpent,Twofish) – 128, 192, 256 bit keys. – The largest successful publicly-known brute force attack has been against a 64-bit RC5 key by distributed.net (

Symmetric Encryption 128-bit encryption – 3 x – 1 modern computer needs years to crack 128-bit – 1 billion modern computers need years to crack – 1 billion modern computers need years to crack 256-bit – Some other cracking method required Other avenues are far easier: – Spyware/Rootkits – Social Engineering – Phishing – Password cracking Reference (The Struggle Between Unbreakable Encryption and Stupid Passwords By Brian Basgen

Asymmetric Encryption 2-key

Asymmetric Algorithms’ Diffie-Hellman DSS ElGamal – Based off of Diffie-Hellman RSA Cramer-Shoup

XOR Secret Splitting Secret Sharing

Hashing Digital Fingerprint – MD5 – SHA-1 Algorithm Output size (bits) Internal state size (bits) Block size (bits) Max message size (bits) Word size (bits) RoundsOperationsCollision SHA − ,and,or,xor, rotfl Yes SHA − ,and,or,xor, rotfl 2 63 attack SHA- 256/ / − ,and,or,xor, shr,rotfr None yet SHA- 512/ / − ,and,or,xor, shr,rotfr None yet

Digital Signatures Signing uses Private Key Verifying uses Public Key “Authentication” of message. Hash Message. Sign Hash. Send message with Encrypted Hash. Receiver decrypts hash with public key and then matches hash sent with hash of message.

PKI

Digital Certificates Binds a name to a public key. X.509 Standard Registration with CA – Software, hardware, procedures, policies, people – RA Responsible for verification – Class 1 – – Class 2 – Software signing – Class 3 – Be own CA

Digital Certificates Key Pair Generation Cert creation Cert distribution Key backup and recovery