Mort Anvari Introduction to Encryption Technology To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file.

Slides:



Advertisements
Similar presentations
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Advertisements

Digital Signatures and Hash Functions. Digital Signatures.
OLE Container Carlotta Eaton Exploring Microsoft Visual Basic 5.0 To insert your company logo on this slide From the Insert Menu Select “Picture” Locate.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Overview of Cryptography Oct. 29, 2002 Su San Im CS Dept. EWU.
Electronic mail security -- Pretty Good Privacy.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
Chapter 31 Network Security
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
CpuScope To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file Click OK To resize the logo Click anywhere.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Cryptography, Authentication and Digital Signatures
Public-Key Cryptography CS110 Fall Conventional Encryption.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Chapter 15: Electronic Mail Security
History of Windows Data Sharing Carlotta Eaton Exploring Microsoft Visual Basic 5.0 To insert your company logo on this slide From the Insert Menu Select.
WATER SUPPLY AND REALLOCATION CENTER OF EXPERTISE Jan Hotubbee, CESWT-PE-P SAD Water Supply Workshop Wilmington, NC November 3-6, 2003 To insert your company.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
RBA TOP TEN LIST RBA TOP TEN LIST To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file Click OK To resize.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Pretty Good Privacy (PGP) Security for Electronic .
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file Click OK To resize the logo Click anywhere inside.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Periodic Trends Mr. Chan Northwestern University To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file.
How OLE Works Carlotta Eaton Exploring Microsoft Visual Basic 5.0 To insert your company logo on this slide From the Insert Menu Select “Picture” Locate.
DIGITAL SIGNATURE IMPLEMENTATION
Bernard A. LaBlank records inc Company Handbook We will help you become a star and go make me a sandwich To insert your company logo on this slide From.
Network Security Celia Li Computer Science and Engineering York University.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Shapes and Patterns ©. 2 nd Row Analogues Phosphaalkenes and -ynes.
Of Teachers teaching pre-16s Language © Shapes and Patterns ©
Unit 3 Section 6.4: Internet Security
LIVING IN CHRIST Ephesians 2:1-10
WHO ARE YOU? Ephesians 1:1-14
Dental Office Solutions!
Topic 1: Data, information, knowledge and processing
NET 311 Information Security
What do you do when the teacher is with another student ?
Teacher Support Specialist
Lecture 10: Network Security.
Where do you come from? ©.
Strategy VI The Internet.
Introduction to Encryption Technology
HWKgraphics0.
Presentation transcript:

Mort Anvari Introduction to Encryption Technology To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file Click OK To resize the logo Click anywhere inside the logo. The boxes that appear outside the logo are known as “resize handles.” Use these to resize the object. If you hold down the shift key before using the resize handles, you will maintain the proportions of the object you wish to resize.

2 Encryption What is it? - The conversion of data into a form that cannot be easily understood by unauthorized people - The opposite is decryption, that is, changing the difficult to read form back into the original - It’s usually software, but can be hardware

3 Cryptography - What does it do for me? - Symmetric Encryption - Asymmetric Encryption - One Way Hash - Example: An Encrypted

4 What does it do for me? Confidentiality: The data can only be read by the intended recipients Non-Repudiation: The data cannot be forged. If data is “signed” by a person, the data could only have come from them. No more “I didn’t send that!” Data Integrity: The data cannot be modified without detection

5 Symmetric Encryption - Data is encrypted and decrypted with the same key - Fast - Key must be kept secret - Key must be sent Out of Band - DES and IDEA are symmetric

6 Asymmetric Encryption - Uses 2 keys - Data encrypted with one key can only be decrypted with the other - Public key is shared with all - Public key can be sent In Band - Private key must be kept secret - RSA is asymmetric

7 One Way Hash - A “fingerprint” of data - Any size data = same size hash - Tiny changes in data produce a very different hash

8 Example: Encrypted Anne wants to send to Bob. The plaintext message compressed to make it smaller and the ciphertext stronger. Plaintext Compression Small Plaintext

9 Example: Encrypted The plaintext message is run through a hash algorithm to generate a “fingerprint”. Small Plaintext Hash Function Fingerprint

10 Example: Encrypted The fingerprint is encrypted using Anne’s private key. This makes it into a digital signature. It is then appended to the plaintext. Anne’s Private Key Small Plaintext Signature Fingerprint

11 Example: Encrypted A Random key is generated and the e- mail is symmetrically encrypted using that. Small Plaintext Random Key Ciphertext Encrypted with Random Key Signature

12 Example: Encrypted The Random Key is Encrypted using Bob’s public key. The result is called a “Strong Box”. Remember that only Bob can read the contents of the Box. Bob’s Public Key Random Key A Box for Bob

13 Random Key A Box for Bob Example: Encrypted The Box is attached to the ciphertext and they are sent over to Bob. Ciphertext Encrypted with Random Key To Bob Internet

14 Example: Encrypted Bob decrypts his Strong Box to get the Random Key. Only Bob’s private key can open the Box which was encrypted with his public key. Bob’s Private Key Random Key A Box for Bob

15 Example: Encrypted Bob decrypts the ciphertext using the random key which he got from his Strong Box. Random Key Ciphertext Encrypted with Random Key Small Plaintext Signature

16 Example: Encrypted Bob decrypts Anne’s signature using her public key. Since only Anne could have encrypted it with her private key, Bob knows the message had to come from her. Anne’s Public Key Signature Fingerprint

17 Example: Encrypted Bob runs the unencrypted message through the hash function. If this fingerprint is the same as the one from the signature, the message was not changed in transit. Small Plaintext Hash Function Calculated Fingerprint Received Fingerprint  or 

18 Example: Encrypted Finally, the message is uncompressed. Bob can read the message knowing for certain that it’s from Anne, it’s what Anne wrote and only the two of them could have read it. Plaintext Compression Small Plaintext