11-Basic Cryptography Dr. John P. Abraham Professor UTPA.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Digital Signatures and Hash Functions. Digital Signatures.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
Security+ Guide to Network Security Fundamentals, Fourth Edition
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Techniques Instructor: Jerry Gao Ph.D. San Jose State University URL: May,
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptographic Technologies
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Overview of Cryptography Oct. 29, 2002 Su San Im CS Dept. EWU.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
 This Class  Chapter 8. 2 What is network security?  Confidentiality  only sender, intended receiver should “understand” message contents.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Chapter 8: Scrambling Through Cryptography Security+ Guide to Network Security Fundamentals Second Edition.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Cryptography, Authentication and Digital Signatures
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Modern Cryptography.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Security Celia Li Computer Science and Engineering York University.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
 Last Class  Chapter 7 on Data Presentation Formatting and Compression  This Class  Chapter 8.1. and 8.2.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Security Outline Encryption Algorithms Authentication Protocols
Computer Communication & Networks
IS3230 Access Security Unit 9 PKI and Encryption
NET 311 Information Security
Intro to Cryptography Some slides have been taken from:
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Chapter 3 - Public-Key Cryptography & Authentication
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

11-Basic Cryptography Dr. John P. Abraham Professor UTPA

Cryptography “Hidden writing” - Scramble the data Steganography – hides the existence of the data –Terrorist use this to hide what they are transmitting. Julius Ceasar shifted each letter of his message down to another character. Plaintext  encryption  ciphertext

In cryptography, the encryption/decryption algorithms are public; the keys are secret.

Cryptography and security Can protect the confidentiality of info – only the authorized party can view it. Protect integrity of info. Ensures that info is correct, no one altered it. Ensure availability of info – authorized persons can view Can verify authenticity of the sender Non-repudiation

Symmetric-key In symmetric-key cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared.

Security+ Guide to Network Security Fundamentals, Third Edition Asymmetric Cryptographic Algorithms Asymmetric cryptographic algorithms –Also known as public key cryptography –Uses two keys instead of one The public key is known to everyone and can be freely distributed The private key is known only to the recipient of the message Asymmetric cryptography can also be used to create a digital signature 7

Asymmetric-key Public key

Security+ Guide to Network Security Fundamentals, Third Edition Asymmetric Cryptographic Algorithms (continued) A digital signature can: –Verify the sender –Prove the integrity of the message –Prevent the sender from disowning the message 9

Figure Signing the whole document

Security+ Guide to Network Security Fundamentals, Third Edition11

Security+ Guide to Network Security Fundamentals, Third Edition12 Asymmetric Cryptographic Algorithms (continued)

Security+ Guide to Network Security Fundamentals, Third Edition RSA The most common asymmetric cryptography algorithm RSA multiplies two large prime numbers p and q –To compute their product (n=pq) A number e is chosen that is less than n and a prime factor to (p-1)(q-1) Another number d is determined, so that (ed-1) is divisible by (p-1)(q-1) The public key is the pair (n,e) while the private key is (n,d) 13

Security+ Guide to Network Security Fundamentals, Third Edition Cryptographic Algorithms There are three categories of cryptographic algorithms: –Hashing algorithms –Symmetric encryption algorithms –Asymmetric encryption algorithms 14

Security+ Guide to Network Security Fundamentals, Third Edition Hashing Algorithms Hashing –Also called a one-way hash –A process for creating a unique “signature” for a set of data This signature, called a hash or digest, represents the contents Hashing is used only for integrity to ensure that: –Information is in its original form –No unauthorized person or malicious software has altered the data Hash created from a set of data cannot be reversed Hash values are often posted on Internet sites –In order to verify the file integrity of files that can be downloaded 15

Security+ Guide to Network Security Fundamentals, Third Edition Hashing Algorithms (continued) 16 The hashed value is stored on the card.

Security+ Guide to Network Security Fundamentals, Third Edition Hashing Algorithms (continued) A hashing algorithm is considered secure if it has these characteristics: –The ciphertext hash is a fixed size –Two different sets of data cannot produce the same hash, which is known as a collision –It should be impossible to produce a data set that has a desired or predefined hash –The resulting hash ciphertext cannot be reversed The hash serves as a check to verify the message contents 17

Security+ Guide to Network Security Fundamentals, Third Edition18 Man in the middle defeated

Message Digest algorithms Secure Hash Algorithm (SHA) –A more secure hash than MD –A family of hashes SHA-1 –Patterned after MD4, but creates a hash that is 160 bits in length instead of 128 bits SHA-2 –Comprised of four variations, known as SHA-224, SHA-256, SHA-384, and SHA-512 –Considered to be a secure hash Passwords are stored hashed MD5