Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Cryptography Ch-1 prepared by: Diwan.
1 Lect. 3 : Basic Terms Lots of new terminologies in every new fields…
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Crytography Chapter 8.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Secure communication Informatics for economists II Jan Přichystal
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Cryptography CSPrinciples II February 12, Needs for Privacy What are some specific needs for privacy when using the internet?
FORESEC Academy FORESEC Academy Security Essentials (IV)
A Steganography Project Project By: Awadesh Madhogaria.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
Cryptography: Securing the Information Age Source: technical.html "If you think cryptography can solve your problem, then you don't.
Introduction to Stream Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Image Representation Privacy/Cryptography CS 104 October 3, 2011.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
ENCRYPTION Alex Piercey Erica Reid. What is Encryption?  Information secured to hide from the public  Used in many different ways but is mostly used.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
Network Security Section 1: Introduction to security.
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Computer Forensics, Steganography and Cryptography and Related Ethical Issues. Edilasio Pereira Russell Braun Team 8.
Information Security and Secret Messages. Agenda Information Assurance Program Value of Information Secret Messages –Steganography –Caesar Cypher –Keyword.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Chapter 7: Cryptographic Systems
Cryptography is the process of encryption and decryption a message or data. Examples: Banking to keep peoples money safe Schools so we can keep students.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Welcome Topic : Security.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Computer Security (CS4800)
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.
Cryptography Presented By: Yogita Dey Amardeep Kahali Dipanjan Devnagar Minhaajuddin Ahmad Khan ECE4, NIT Securing the Information Age.
Secure communication Informatics for economists II Jan Přichystal
Secret Key Cryptography
Security Issues in Information Technology
The Secure Sockets Layer (SSL) Protocol
Cryptography – Test Review
Introduction to Information Security Introduction & Overview
(Principles of Informatioan security)
Encryption: Image Representation Privacy/Cryptography
Symmetric Cryptography
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Cryptography CS Principles January 19, 2017.
Encryption
Cryptography Basics and Symmetric Cryptography
Chapter 3:Cryptography (16M)
Visit for more Learning Resources
Encryption, Cryptography, and Steganography:
The Secure Sockets Layer (SSL) Protocol
Install AD Certificate Services
Unit 2: Cryptography & Cryptographic Algorithm
Basic of Modern Cryptography
Hashing Hash are the auxiliary values that are used in cryptography.
Computer Security Chapter Two
Presentation transcript:

Agenda Definitions Why cryptography is important? Available technologies Benefits & problems

Essential Terms Cryptography Encryption Plain text  Cipher text Decryption Cipher text  Plain text Cryptanalysis Cryptology

Information Security for…  Defending against external/internal hackers  Defending against industrial espionage  Securing E-commerce  Securing bank accounts/electronic transfers  Securing intellectual property  Avoiding liability

Types of Secret Writing Secret writing Steganography Cryptography

Steganography Steganography – covered writing – is an art of hiding information Popular contemporary steganographic technologies hide information in images

Hiding information in pictures Image in which to hide another image Image to hide within the other image

Retrieving information from pictures Image with other hidden within Recreated image

Types of Secret Writing Secret writing Steganography Cryptography SubstitutionTransposition Code Cipher

Benefits of Cryptographic Technologies Data hiding Data integrity Authentication of message originator Electronic certification and digital signature

Potential Problems with Cryptographic Technologies? False sense of security if badly implemented Government regulation of cryptographic technologies/export restrictions Encryption prohibited in some countries

How Secure are Today’s Technologies? Encryption does not guarantee security! Many ways to beat a crypto system NOT dependent on cryptanalysis, such as: –Viruses, worms, hackers, etc. –Unauthorized physical access to secret data Cryptography is only one element of comprehensive computer security

DOUBTS…??? Your questions are welcome!