24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

(ENCODING AND DECODING TECHNIQUES)
Public Key Encryption Algorithm
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Public Key Cryptography
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Network Security Chapter
Encryption Methods By: Michael A. Scott
SYMPATRIC ENCRYPTION L.Tahani Al jehani. Introduction  Definition  Cryptography, a word with Greek origins, means “secret writing”.  It refers to the.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Introduction to Public Key Cryptography
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Chapter 12 Cryptography (slides edited by Erin Chambers)
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Dr. Khalid A. Kaabneh Amman Arab University
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
CSCI 5857: Encoding and Encryption
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Midterm Review Cryptography & Network Security
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Symmetric-Key Cryptography
Introduction to cryptography by konrad. Introduction to cryptography Cryptography is the process of encrypting/decrypting data streams using some E(M)/D(M)
1 Public-Key Cryptography and Message Authentication.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2003 Chapter 19 Data Encryption.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Network Security  introduction  cryptography  authentication  key exchange  required reading: text section 7.1.
Computer and Data Security 4th Class
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
- Stream Cipher and Block Cipher - Confusion & Diffusion
Chapter 3:Cryptography (16M)
PART VII Security.
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext, encryption algorithm, ciphertext and decryption algorithm. Two types of cryptography exist: Symmetric-key cryptography and Public-key cryptography

Figure 29.1 Cryptography components

Figure 29.2 Encryption and decryption

24-Nov-15Security Symmetric-key Cryptography (SKC) In SKC, the same key is used by both communicating parties. The algorithm used for decryption is the inverse of the algorithm used for encryption. Advantages: Efficient Disadvantages: Large number of keys required for large number of communicating parties.

Figure 29.3 Symmetric-key cryptography

24-Nov-15Security SKC (Continued…) Traditional ciphers Substitution cipher Monoalphabetic Polyalphabetic Transpositional cipher Block ciphers P-Box S-Box Product Block Data Encryption Standard (DES)

24-Nov-15Security Traditional Cipher Data encryption is based on character. Monoalphabetic One character will be represented by only one other character. Polyalphabetic One character may be represented by more than just one other character depending on the encryption algorithm used.

Figure 29.4 Caesar cipher

Figure 29.5 Example of monoalphabetic substitution

Figure 29.6 Vigenere cipher

24-Nov-15Security Block Cipher Data encryption is based on block of bits P-box Transposition at bit level S-box Combines substitution and transposition (P-box) Product block More complex combination of P- and S-box DES Complex algorithm applied by the US government for nonmilitary and nonclassified use.

Figure 29.7 Transpositional cipher

Figure 29.8 Block cipher

Figure 29.9 P-box

Figure S-box

Figure Product block

Figure DES

Figure General scheme of DES

Figure Iteration block

24-Nov-15Security Public-key Cryptography (PKC) Two different keys are used, private key and public key. Private key is known only by the receiver. Public key is used by the senders. Advantages: The number of keys required for a large number of users is greatly reduced. Disadvantages: Complex algorithm used. Sender authentication is required

Figure Public-key cryptography

24-Nov-15Security RSA The private key is a pair of numbers N and e. The public key is also a pair of numbers N and d. N are common to both parties. To encrypt a message: C = P e mod N where P is the plain text value To decrypt a message: P = C d mod N where C is the ciphertext value

Figure RSA

24-Nov-15Security RSA (Continued…) To ensure the success of its application: Choose two large prime numbers p and q. Compute N = p x q. Choose e (less than N) such that e and (p- 1)(q-1) are relatively prime (having no common factor other than 1) Choose d such that (e x d) mod [(p-1)(q-1)] is equal to 1