GROUP 11 Dhita Puspita Larasati11140107 Topan Firmansyah11140486 Dimas Kurnia Ayatullah11140800 Galih Purwanti11140844 Rahma Aprilia Handayani11141704.

Slides:



Advertisements
Similar presentations
Cryptography Ch-1 prepared by: Diwan.
Advertisements

Asymmetric Encryption Prof. Ravi Sandhu. 2 © Ravi Sandhu PUBLIC KEY ENCRYPTION Encryption Algorithm E Decryption Algorithm D Plain- text Plain- text Ciphertext.
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Management Information Systems Lection 05 Coding and encryption CLARK UNIVERSITY College of Professional and Continuing Education (COPACE)
Cryptography The science of writing in secret code.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Principles of Information Security, 2nd edition1 Cryptography.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Lecture 23 Symmetric Encryption
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Informatics and Control Systems Faculty. Student: Levan Julakidze Informatics and Control Systems Faculty Doctorate II year Leader: Zurab Kochladze TSU.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
1st Class Discrete Structures الهياكل المتقطعة أستاذة المادة: م. م
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Information Systems Security
569 Semantic Web. Dr. J. Lu University of windsor, Project Presentation Encrypted Web service application Encrypted Web Application Presented by:
Cryptography, Authentication and Digital Signatures
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Network Encryption Vince Ceccarelli Group 7 TC 200.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Encryption.
Cryptography Lynn Ackler Southern Oregon University.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Lecture 2: Introduction to Cryptography
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Overview of Cryptography & Its Applications
Códigos y Criptografía Francisco Rodríguez Henríquez Códigos y Criptografía Francisco Rodríguez Henríquez CINVESTAV
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Lecture 23 Symmetric Encryption
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
 Cryptography Melissa Pollis. What is Cryptography?  the science or study of the techniques of secret writing, especially code and cipher systems 
INCS 741: Cryptography Overview and Basic Concepts.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.
DISSERTATION ON CRYPTOGRAPHY.
Computer Security Chapter Two
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

GROUP 11 Dhita Puspita Larasati Topan Firmansyah Dimas Kurnia Ayatullah Galih Purwanti Rahma Aprilia Handayani Sindy Wulandari CLASS: 11.2A.05 MAJORS: COMPUTERIZED ACCOUNTING

MEETING 11 CRYPTOGRAPHY CRYPTOGRAPHY

DISCUSSION : Cryptography Cryptography The Concept of Cryptography The Concept of Cryptography Classical Cryptography Classical Cryptography Basic Processes In Cryptography Basic Processes In Cryptography Types Of Cryptography Types Of Cryptography Symmetric Cryptography Symmetric Cryptography Asymmetric algorithms Asymmetric algorithms Hybrid Cryptography Hybrid Cryptography Classification of cryptography Classification of cryptography Criterias Of Cryptography Criterias Of Cryptography Conclusion Conclusion

Cryptography Is ? Cryptography (cryptography) of Greece, consists of two syllables that Crypto and graphia. Crypto meaning hide, whereas graphia means writing. Cryptography is the study of mathematical techniques related to aspects of information security, data confidentiality, the validity of such data, data integrity, and data authentication.But not all aspects of information security can be solved by Cryptography. Cryptography may also be interpreted as a science or art to maintain the security of the message.

The Concept of Cryptography The concept of cryptography has long been used by humans for example in Egypt and Roman civilization, though still very modest. There is also the underlying principles of cryptography, i.e. : Confidelity Confidelity Data integrity Data integrity Authentication Authentication Non-repudiation Non-repudiation

Classical Cryptography In contrast to classical cryptography that focuses the power on confidentiality algorithms used (meaning when the algorithms used were known then the message has been clear "leaked" and its contents can be known by anyone who knows the algorithm), focuses on more modern cryptographic confidentiality keys are used in the algorithms (by the wearer) so that the algorithm can be disseminated to the community without fear of loss of confidentiality for the wearer.

Basic Processes In Cryptography The process of which will be discussed in this article include two basic processes in cryptography, namely : 1.Encryption 2.Depcryption With the same key is used for both the above processes. The used of the same key for both encryption and depcription process is also called the Secret Key, Shared Key or Symetric Key Cryptosystem

Types Of Cryptography Cryptographic algorithm is divided into three sections based on keywords are used: 1.Symmetric Cryptography 2.Asymmetric Cryptography 3.Hybrid Cryptography

Symmetric Cryptography Symmetric cryptography is: code Hill or better known as the Hill cipher is a symmetric key cryptographic algorithms, and is one of the crypto polyalphabetic. Hill cipher was invented by Lester s. Hill in Cryptographic techniques was created with the intention to create ciphers that can not be solved using frequency analysis techniques. In contrast to the caesar cipher, the hill cipher does not replace any of the same alphabet at plainteks with other alphabets on the same cipherteks as using matrix multiplication on basic encryption and decryption. Pros: Operating speed is higher when compared with the asymmetric algorithm. Due to a fairly high speed, it can be used in real-time systems Weaknesses: For each delivery of messages with different user needs different keys as well, so there will be difficulties in the key management. Problems in the delivery of the key itself is called "key distribution problem" Examples of algorithms: Twofish, Rijndael, Camellia

Asymmetric algorithms Asymmetric algorithms (asymmetric algorithm) is an algorithm where the encryption key being used is not the same with the decryption key. The algorithm uses two keys: a public key (the public key) and a private key (the private key). The public key is distributed generally whereas the private key is kept secret by the user. While the public key is known but will be very difficult to know the private key is used. Pros: Security issues on the key distribution can be better The problem of key management is better because fewer number of keys Weaknesses: The speed is lower when compared with symmetric algorithms For the same security level, the key being used longer than symmetric algorithms. Examples of algorithms: RSA, DSA, ElGamal

Hybrid Cryptography Interesting problems in the field of information security is a trade off between speed and convenience. The more secure the more uncomfortable, apply vice versa the more comfortable the more insecure. One example is the field of Cryptography. But this can be overcome by the use of hybrid Cryptography. Hybrid Cryptography is often used because it utilizes the advantages of data- processing speed by symmetric algorithms and ease the transfer of key using an asymmetric algorithm. This has resulted in increased speed without reducing comfort and security. Hybrid cryptographic applications that exist today are generally intended for public use or the mainstream computer users.

Classification of cryptography Classification of cryptographic algorithms based on the length of the data used in a single process: A.Block cipher Algorithm: information/data to be sent in the form of large blocks (for example, 64-bit) where blocks is operated with the same encryption function and will result in confidential information in the blocks of the same size also. Example: RC4, It Seals, A5, The Oryx. B.Stream cipher Algorithm: information/data to be sent in the form of block-operated smaller blocks (bytes or bits), usually one character per unit time-process, using tranformasi encryption that changes every time. For Example: DES, Blowfish, Gost, Idea, RC5, Safer, Square, Twofish, RC6, Loki97.

Criterias Of Cryptography A cryptographic algorithm is said to be safe (computationally secure) when you meet the following three criteria: a)Mathematical Equations that describe the operations of the cryptographic algorithms are very complex so that the algorithm is unlikely be solved in analytic. b)Costs to break ciphertext beyond the value of the information contained in the ciphertext. c)The time required to break ciphertext beyond the length of time that information must be kept confidential.

Cryptography is one of the ancient communication and information media that are still used to this day. Cryptography in Indonesia called a passcode that is briefly may mean the art of protecting data and information from parties who are not desired either while it is transmitted or when stored. While the science of cryptology called passcodes. cryptology is the science that studies of how technical data and protecting that information. Conclusion

Thank You