Cryptography Overview and PGP - Fort Collins, CO Copyright © XTR Systems, LLC Cryptography Overview and Pretty Good Privacy Instructor: Joseph DiVerdi,

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure and Applications
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Principles of Information Security, 2nd edition1 Cryptography.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Copyright Justin Klein Keane InfoSec Training Encryption.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Cryptography Basic (cont)
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Electronic Mail Security. Authentication and confidentiality problems Two systems: - PGP (Pretty Good Privacy) - S/MIME (Science Multipurpose Internet.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Public-Key Cryptology An Asymmetrical Approach to Encryption.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
1 Lesson Internet Organization network Fire wall.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Understanding Linux Directories Fort Collins, CO Copyright © XTR Systems, LLC Understanding the Linux Directory Structure Instructor: Joseph DiVerdi, Ph.D.,
Computer encryption is… Based on the science of cryptography.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Protect Your Data's Privacy! Data Encryption with SQL Server Joe
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography, Authentication and Digital Signatures
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
CSU - DCE Webmaster I HTML - Forms - Fort Collins, CO Copyright © XTR Systems, LLC Designing Web Sites using HTML - Introduction to Forms Instructor:
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Encryption / Security Victor Norman IS333 / CS332 Spring 2014.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
CSU - DCE Webmaster I HTML - Tables - Fort Collins, CO Copyright © XTR Systems, LLC Designing Web Sites using HTML - Introduction to Tables Instructor:
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Webmaster II Introductions - Fort Collins, CO Copyright © XTR Systems, LLC Introduction to Webmaster II Instructor: Joseph DiVerdi, Ph.D., MBA.
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
Network Security Celia Li Computer Science and Engineering York University.
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Slides for Chapter 11: Security.
CSU - DCE Introduction to CSS CSS URLs - Fort Collins, CO Copyright © XTR Systems, LLC Cascading Style Sheets - Specifying URLs Instructor: Joseph.
Privacy and Security Topics From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Known Information Software.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
1 Managing Security Additional notes. 2 Intercepting confidential messages Attacker Taps into the Conversation: Tries to Read Messages Client PC Server.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Web Security.
Digital Signatures.
Cryptography Much of computer security is about keeping secrets
M3: Encryption r By Andrew Stringer.
12 E-Commerce Overview.
Security in Network Communications
Security.
Install AD Certificate Services
Fluency with Information Technology Lawrence Snyder
Presentation transcript:

Cryptography Overview and PGP - Fort Collins, CO Copyright © XTR Systems, LLC Cryptography Overview and Pretty Good Privacy Instructor: Joseph DiVerdi, Ph.D., MBA

Cryptography Overview and PGP - Fort Collins, CO Copyright © XTR Systems, LLC Cryptography Basic Parts Plaintext –Human-readable or software-readable message Ciphertext –Plaintext message after modification to obscure it Algorithm –Mathematical operation used to convert plaintext into ciphertext and vice versa Key –Piece of static data which makes an algorithm's transformation unique

Cryptography Overview and PGP - Fort Collins, CO Copyright © XTR Systems, LLC Key-Based Encryption

Cryptography Overview and PGP - Fort Collins, CO Copyright © XTR Systems, LLC Keys A key is a (very long) series of numbers –It is data only not a program A program is required to encrypt data –Uses a key to create unique encrypted data –Uses a key to "lock" unique encrypted data A program is required to decrypt data –Sometimes the same program used to encrypt –Uses a key to "unlock" unique encrypted data –Can't use just any old key, must be the right one

Cryptography Overview and PGP - Fort Collins, CO Copyright © XTR Systems, LLC Symmetric Key Method

Cryptography Overview and PGP - Fort Collins, CO Copyright © XTR Systems, LLC Public-Private Key Method Two Different but Related Keys –Called a Key-Pair –One Public Key Shared with the world –One Private Key Not shared with anyone! –There is a definite mathematical relationship between the two keys

Cryptography Overview and PGP - Fort Collins, CO Copyright © XTR Systems, LLC Asymmetric Key-Pair Method

Cryptography Overview and PGP - Fort Collins, CO Copyright © XTR Systems, LLC Secure Message Transmission

Cryptography Overview and PGP - Fort Collins, CO Copyright © XTR Systems, LLC Authenticated Sender

Cryptography Overview and PGP - Fort Collins, CO Copyright © XTR Systems, LLC Quantum Cryptography

Cryptography Overview and PGP - Fort Collins, CO Copyright © XTR Systems, LLC Pretty Good Privacy MIT Distribution Center for PGP: – International PGP Page: – PGP Certificate Server: –

Cryptography Overview and PGP - Fort Collins, CO Copyright © XTR Systems, LLC PGP Tools

Cryptography Overview and PGP - Fort Collins, CO Copyright © XTR Systems, LLC PGP Tools