Information Security IBK3IBV01 College 4 Paul J. Cornelisse.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Intro 1 Introduction Intro 2 Good Guys and Bad Guys  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Secure communication Informatics for economists II Jan Přichystal
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Cryptography Week-6.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
Cryptography Lecture 1: Introduction Piotr Faliszewski.
CIS 5371 Cryptography Introduction.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
CS110: Computers and the Internet Encryption and Certificates.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Overview and Basic Concepts Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus -
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Cryptography, Authentication and Digital Signatures
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
Encryption.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
CRYPTOGRAPHY & NETWORK SECURITY Introduction and Basic Concepts Eng. Wafaa Kanakri Computer Engineering Umm Al-Qura University.
Overview of Cryptography & Its Applications
Códigos y Criptografía Francisco Rodríguez Henríquez Códigos y Criptografía Francisco Rodríguez Henríquez CINVESTAV
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
Encryption CS110: Computer Science and the Internet.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Public Key Encryption, Secure WWW Transactions & Digital Signatures.
Intro to Cryptography Lesson Introduction
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
INCS 741: Cryptography Overview and Basic Concepts.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Cryptography – Test Review
CIT 380: Securing Computer Systems
Crypto in information security
Cryptography.
Digital Communications
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Information Security IBK3IBV01 College 4 Paul J. Cornelisse

Cryptology Through the centuries, the need for information protection persists Combat has evolved from hand-to-hand to modern warfare, or cyber warfare Protecting sensitive data is critical to preserving trade secrets, government communications, or military strategies

Cryptology Protection is achieved in part through the use of cryptology—more specifically, encryption vital for everyday use in today’s cyber society; online shopping and banking ATM usage digital media require encryption protection to avoid abuse

Cryptology Unfortunately, many of today’s systems lack appropriate protection Passwords and authentication requirements are not protected themselves Either through encryption or encrypted databases This leaves sensitive information vulnerable to unauthorized, prying eyes

Cryptology Cryptology is not a new concept It is “the science of keeping secrets secret” (Delfs and Knebl 2007) It is the study of encrypting algorithms and the art of creating and solving such algorithms, and is composed of both Cryptography Cryptanalysis

Cryptology Cryptography is the art or science of cipher systems used for protection information The term originates from the Greek Kryptos, meaning “hidden” Graphia, meaning “writing”

Cryptology Cryptography Protect sensitive information Prevent corruption Keep secret from unauthorized access/use Tries to compromise between expense and time consumption

Cryptology Cryptography has four basic purposes: Confidentiality Authentication Integrity Nonrepudiation

Cryptology Confidentiality: keeps information secret from unauthorized use

Cryptology Authentication: Corroboration of an entity’s identity, achieved through initial identification between communicators. “prove that you are who you claim to be”

Cryptology Integrity: assures that the message was not illegitimately altered during transmission or during storage and retrieval

Cryptology Nonrepudiation: guarantees that the sender will not deny previous commitments or actions unless they admit the cryptographic signing key has been compromised

Cryptology Cryptanalysis: the practice of breaking ciphers, or decrypting messages without the key, to discover the original message

Cryptology Someone wishes to send a message, which begins as plaintext Plaintext is the original, humanly readable form of a message, which is then encrypted This could be text, numerical data, a program, or any other message form (Delfs and Knebl 2007)

Cryptology When plaintext is encrypted, or enciphered, the original message is obscured using an algorithm or pattern only known to the sender and authorized recipient(s).

Cryptology Encryption must be reversible The algorithm is known as the cipher

Cryptology Once encrypted, the message is referred to as ciphertext, and is only readable when the cipherkey is used in conjunction with the decrypting algorithm

Cryptology Protecting the key, and to whom it is known, is crucial for ensuring the Authenticity Integrity Confidentiality of the transmitted message

Cryptology The work factor, often forgotten, does not describe whether the algorithm can be broken, but how long it takes until it is broken

Cryptology Two ancient ciphers are the Spartan scytale and the Caesar cipher In the Spartan scytale, a segment of parchment is wrapped around a cylinder of certain radius and the message is written lengthwise. The recipient must have a cylinder of equal radius to decrypt The Caesar cipher is a “classical” cipher, using a simple shift of the plaintext alphabet.

Cryptology

In the early twentieth century, cryptography broadened its horizons

Cryptology One of the first among the more complicated cryptosystems used an electronic machine The Enigma rotor machine Enigma, used by the Germans in World War II, applied a substitution cipher multiple times per message.

Cryptology

As more users access the Internet, the need for digital information security increases This has led to the “standardization” of cryptography in a scientific sense Currently, many systems are secure, but rely on plausible assumptions that may one day be “discovered”

Cryptology So basically the standardization and mathematical focus of modern cryptosystems share the same issue suffered by earlier ciphers

Cryptology When explaining applied cryptography, universally, plaintext is written in lowercase Ciphertext is written in all capitals Keys or keywords are also always written in capitals

Cryptology When referring to those who use cryptosystems, certain names typically are used as the placeholders Rather than referring to the sender as “Party A” and the recipient as “Party B,” Party A would be Alice and Party B would be Bob.

Cryptology Alice and Bob are always trying to communicate. Each associate communicating continues alphabetically, for example, Charlie and David want to speak with Alice and Bob. Eve is an eavesdropper, who does not have authorized access to the message. Eve is a passive listener; she does not modify the message Mallory is a malicious attacker and modifies, sends her own, or repeats previous messages Victor is a verifying agent who demonstrates that the intended transaction was successfully executed.

Cryptology Intro

Cryptology Kerckhoff’s Six Principles 1. The system must be practically or mathematically undecipherable 2. The system is not required to be secret and should be able to fall in enemy hands 3. The key must be communicable and retained without effort, and changeable at the will of the correspondents 4. The system must be compatible with the communication channel 5. The system must be portable and not require functioning by multiple people 6. The system must be easy, requiring minimal knowledge of the system rules

Cryptology There are two generations of encrypting methods: Classical Modern

Cryptology Classical ciphers are those that were historically used, like the scytale and Caesar’s, but became impractical either resulting from popular use or advances in technology Modern ciphers consist of substitution or transposition ciphers

Cryptology Classical ciphers use an alphabet of letters, implemented using simple math Classical ciphers can be broken using brute force attacks or frequency analysis Brute force is a standard attack, running all possible keys with a decrypting algorithm until the plaintext is exposed

Cryptology Modern ciphers are typically divided into two criteria: the key type used the data input type

When referring to key types, modern ciphers branch into symmetric (private key cryptography) asymmetric (public key cryptography)

Substitution Ciphers Monoalphabetic substitutions include the Caesar, Atbash, and Keyword ciphers

Example of a substitution cipher is the Caesar shift cipher, which is typically a three-character shift

This shift would change the plaintext “purple” into the ciphertext “MROMIB.”

Cryptology

If the shift was a three-character subtraction, the plaintext message “purple” would then become ciphertext “SXUSOH.”

Cryptology

The Atbash cipher flips the entire alphabet back on itself; the plaintext alphabet is “A–Z” and the ciphertext alphabet is “Z–A,” shown in the next slide. The Atbash cipher would obscure the plaintext “purple” as “KFIKOV.”

Another cipher, the Keyword cipher establishes a keyword such as “HEADY.” This begins the ciphertext alphabet, and the rest is completed using the remaining letters in alphabetic order Using “HEADY” as the keyword, the Keyword cipher changes the plaintext “purple” to “OTQOKY.”

Polyalphabetic substitutions are ciphers using multiple substitution alphabets. The Vigenère cipher is the most famous of this genre, introduced in the sixteenth century by Blaise de Vigenère.

It encrypts plaintext by using a series of Caesar ciphers, based on the keyword The keyword is written as many times as necessary above the plaintext message

Using the Vigenère square, one will use a letter from the plaintext and its associated keyword letter Plaintext letters are listed on the top, creating columns, which intersect with the keyword alphabet along the left side of the square, creating rows

The letter found at the intersection of these two letters is the cipher letter used to encrypt the message The beginning of the plaintext “O” and keyword letter “K” intersect at ciphertext letter “Y.” Therefore, “once upon a time” would become “YVPKM ZWAGL SUR.”

The 25 variations of the Caesar cipher (shifts 0–25) are contained in the square. Each row is a single shift to the right from the row or letter preceding. Therefore, the first row, labeled “A,” is a shift of one. Row “X” is a shift of 23