McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.

Slides:



Advertisements
Similar presentations
(ENCODING AND DECODING TECHNIQUES)
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
Principles of Information Security, 2nd edition1 Cryptography.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
ICS 454: Principles of Cryptography
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Chapter 8 Network Security 4/17/2017
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Applied Cryptography Chapter 1 Foundations Jaewon Lee.
Network Security Chapter
CSE 651: Introduction to Network Security
Encryption Methods By: Michael A. Scott
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
SYMPATRIC ENCRYPTION L.Tahani Al jehani. Introduction  Definition  Cryptography, a word with Greek origins, means “secret writing”.  It refers to the.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Dr. Khalid A. Kaabneh Amman Arab University
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Midterm Review Cryptography & Network Security
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2003 Chapter 19 Data Encryption.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Traditional Symmetric-Key Ciphers
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 30 Message Security, User Authentication, and Key Management.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 14 Network Security: Firewalls and VPNs.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 29 Internet Security.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Network Security Chapter 8 12/13/ Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
5.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 5 Introduction to Modern Symmetric-key Ciphers.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (2) Information Security.
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Information Security CPIT 425 Instructor: Bashair Alrashed LAB1.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Twelve Network Security.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
PART VII Security.
Cryptography and Network Security
Introduction to Cryptography I
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security Topics

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapters Chapter 29 Cryptography Chapter 30 Message Authentication, User Authentication, and Key Management Chapter 31 Security Protocols in The Internet

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 29 Cryptography

McGraw-Hill©The McGraw-Hill Companies, Inc., Introduction IntroductiontoCryptography

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 29.1 Cryptography components

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 29.2 Encryption and decryption

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 In cryptography, the encryption/decryption algorithms are public; the keys are secret. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., Symmetric-Key Cryptography Traditional Cipher Block Cipher Operation Modes

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 29.3 Symmetric-key cryptography

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 In symmetric-key cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 In symmetric-key cryptography, the same key is used in both directions. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Symmetric-key cryptography is often used for long messages. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 29.4 Caesar cipher

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 29.5 Example of monoalphabetic substitution

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 In monoalphabetic substitution, the relationship between a character in the plaintext to the character in the ciphertext is always one-to-one. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 29.6 Vigenere cipher

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 In polyalphabetic substitution, the relationship between a character in the plaintext and a character in the ciphertext is one-to-many. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 29.7 Transpositional cipher

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 29.8 Block cipher

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure 29.9 P-box

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure S-box

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure Product block

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure DES

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure General scheme of DES

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure Iteration block

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure Triple DES

McGraw-Hill©The McGraw-Hill Companies, Inc., Public-Key Cryptography RSA Choosing Public and Private Keys

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure Public-key cryptography

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Public-key algorithms are more efficient for short messages. Note:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Figure RSA