McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.

Slides:



Advertisements
Similar presentations
(ENCODING AND DECODING TECHNIQUES)
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
Principles of Information Security, 2nd edition1 Cryptography.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
CMSC 414 Computer (and Network) Security Lecture 5 Jonathan Katz.
Chapter 5 Cryptography Protecting principals communication in systems.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
ICS 454: Principles of Cryptography
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Chapter 8 Network Security 4/17/2017
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Network Security Chapter
CSE 651: Introduction to Network Security
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
SYMPATRIC ENCRYPTION L.Tahani Al jehani. Introduction  Definition  Cryptography, a word with Greek origins, means “secret writing”.  It refers to the.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Dr. Khalid A. Kaabneh Amman Arab University
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Midterm Review Cryptography & Network Security
Chapter 20 Symmetric Encryption and Message Confidentiality.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2003 Chapter 19 Data Encryption.
1.1 Chapter 8 Encipherment Using Modern Symmetric-Key Ciphers Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
Traditional Symmetric-Key Ciphers
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 30 Message Security, User Authentication, and Key Management.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 14 Network Security: Firewalls and VPNs.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 29 Internet Security.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Network Security Chapter 8 12/13/ Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
5.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 5 Introduction to Modern Symmetric-key Ciphers.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (2) Information Security.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Information Security CPIT 425 Instructor: Bashair Alrashed LAB1.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Twelve Network Security.
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
PART VII Security.
Cryptography and Network Security
Introduction to Cryptography I
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security Topics

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapters Chapter 29 Cryptography Chapter 30 Message Authentication, User Authentication, and Key Management Chapter 31 Security Protocols in The Internet

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 29 Cryptography

McGraw-Hill©The McGraw-Hill Companies, Inc., Introduction IntroductiontoCryptography

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 29.1 Cryptography components

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 29.2 Encryption and decryption

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 In cryptography, the encryption/decryption algorithms are public; the keys are secret. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., Symmetric-Key Cryptography Traditional Cipher Block Cipher Operation Modes

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 29.3 Symmetric-key cryptography

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 In symmetric-key cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 In symmetric-key cryptography, the same key is used in both directions. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Symmetric-key cryptography is often used for long messages. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 29.4 Caesar cipher

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 29.5 Example of monoalphabetic substitution

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 In monoalphabetic substitution, the relationship between a character in the plaintext to the character in the ciphertext is always one-to-one. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 29.6 Vigenere cipher

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 In polyalphabetic substitution, the relationship between a character in the plaintext and a character in the ciphertext is one-to-many. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 29.7 Transpositional cipher

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 29.8 Block cipher

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 29.9 P-box

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure S-box

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure Product block

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure DES

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure General scheme of DES

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure Iteration block

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure Triple DES

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 The DES cipher uses the same concept as the Caesar cipher, but the encryption/decryption algorithm is much more complex due to the sixteen 48-bit keys derived from a 56-bit key. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure ECB mode

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure CBC mode

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure CFM

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure CSM

McGraw-Hill©The McGraw-Hill Companies, Inc., Public-Key Cryptography RSA Choosing Public and Private Keys

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure Public-key cryptography

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Public-key algorithms are more efficient for short messages. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure RSA