Cryptography and Its Algorithms Scott Chappell. What is Cryptography?  Definition: the art of writing or solving codes.

Slides:



Advertisements
Similar presentations
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Advertisements

CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Principles of Information Security, 2nd edition1 Cryptography.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
Attacks on Digital Signature Algorithm: RSA
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
Presentation Layer Network Format Local Format Information Transformation “few standards, but a lot of ideas”
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Introduction to Public Key Cryptography
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Cryptography By, Anthony Lonigro & Valentine Mbah.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Based on Bruce Schneier Chapter 7: Key Length Dulal C. Kar.
1 Public-Key Cryptography and Message Authentication.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Lecture 2: Introduction to Cryptography
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
1 Wireless Threats 1 – Cracking WEP Cracking WEP in Chapter 5 of Wireless Maximum Security by Peikari, C. and Fogie, S.
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
1.1 Introduction to Cryptography. 1.2 Basic Cryptography Cryptography is a deep mathematical subject. Cryptographic protocols provide a cornerstone for.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
DES: Data Encryption Standard
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Encryption Encryption: Transforms Message so that Interceptor Cannot Read it –Plaintext (original message) Not necessarily text; Can be graphics, etc.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Security through Encryption
PART VII Security.
Introduction to Symmetric-key and Public-key Cryptography
Fluency with Information Technology Lawrence Snyder
Presentation transcript:

Cryptography and Its Algorithms Scott Chappell

What is Cryptography?  Definition: the art of writing or solving codes

Basic Encryption Methods  Caesar Shift  Simple Substitution Cipher  Fun to use, but are easily cracked by computers and even by humans

Caesar Shift  Replaces each letter of a message with a different one a fixed number of places down the alphabet  Can be shifted either to the right or to the left  The most basic encryption method  This method would shift 3 to the right  To decode, shift 3 to the left

Simple Substitution Cipher  Each letter of the alphabet is replaced with a random letter  To decode, simply reverse the process  Like Caesar, these methods are easy to crack even without a computer because certain letters are used more often than others

Key Cryptography  Cryptographic Algorithms  Encrypt/Decrypt  Transferring the Key

What Can You Encrypt?  Basically anything that you want to keep secure  s, texts, messages, files, documents, letters  There are easy ways online to encrypt any sensitive files that you may have  For average users, an encryption of every file on your computer is not recommended

The Key: What is it?  A long series of letters or numbers with no ordering or grouping  Used to encrypt/decrypt messages  The longer the key is, the harder it is to crack the encrypted message without knowing the key.  However, also takes more computing power with longer keys

Private-Key Cryptography

How Does Private-Key Encryption Work?  Computers each have their own private key which is unique to their computer  The first computer encrypts the message or document with its own key  Therefore, as the message is being sent through cyberspace, it is unreadable to any third parties  The second computer must know the first computer’s private key to decode the message  Risks: Key can be compromised, transfer of key is hard  Two Major types of algorithms: Block Cipher or Stream Cipher

Block Ciphers  For these algorithms, encrypting of the plaintext is done by a single key for a block of fixed length. Generally these blocks can be 64 or 128 bits in size  Usually more secure than stream ciphers  However, the encrypting/decrypting algorithm takes longer  Examples: DES, Blowfish, RC5

DES: Data Encryption Standard Algorithm  One of the first encryption algorithms  A block cipher: meaning it operates with plaintext blocks of a certain size and returns a block of the same size. DES operates on 64-bit blocks  Each 64-bit block is made up of 16 hexadecimal characters, as each hexadecimal equates to a binary of 4 characters long and each character of binary equates to a bit of data  E.g. a  61 

DES Algorithm History  Data Encryption Standard algorithm is today, the most widely used encryption algorithm in the world.  Developed under Richard Nixon’s campaign in the 1970s by National Bureau of Standards because government, industry, and the private sector were storing more and more sensitive data on the web

DES Algorithm History Continued Data Encryption Standard (DES) 1970s uses a 56-bit key  56-bit key results in over 70 quadrillion possible key combinations  Today, that number is too small to be considered entirely secure Advanced Encryption Standard (AES)  Implements 128, 192, or 256-bit keys  Considered secure: 256-bit key has 2^256 combinations. Has superseded DES as the cryptographic algorithm used by US government in 2002

Stream Ciphers  As opposed to block ciphers, stream ciphers encrypt the plaintext bit by bit  The bits of the plaintext are encrypted by different parts of the keystream  Process much faster than block ciphers  However, generally not as secure  Examples: FISH, RC4, SEAL

RC4 Algorithm  A stream cipher  Unique from other ciphers because it allows the user to pick the key size from bits (although generally it is 40)  Created by Ronald Rivest of RSA security  Used in Microsoft Excel, Adobe’s Acrobat 2.0, and BitTorrent clients

Cracking the Key  Example: hexadecimal key of 5B9E  Converts to  This is a 16-bit key because 16 binary numbers  To crack key through “Brute Force Method,” hackers would have to check 2^16 types of keys  Shows how adding even a few more bits to a key makes it exponentially harder to crack

Hacker Capabilities  Today, some of the top computers on the market today such as the dual Pentium 4D with two processors each running at 3.2 Ghz have the capability to guess 4,000,000 keys per second  What if a hacker was using this computer to hack the DES algorithm through brute-force?  56-bit key has 2^56 possible keys so 2^56 / 4,000,000 = 1.80 * 10^11 seconds to check every key  Assuming you only need to check half of the keys to find the right one, it would take over 34,000 years with this computer to find the right key  Computers can be used in parallel  DES key broken in 22 hours and 15 minutes in 1999 by Electronic Frontier Foundation’s machine “Deep Crack.”

Public-Key Cryptography

 Someone or some company sends out a public key for anyone to see  Anyone can encrypt a message and send it back to the original user  However, this message can now only be decrypted by the sender of the public key with their own, personal private key  Even the person that encrypted the message with the public key can no longer decrypt the message  Much much slower than private-key cryptography (about 1,000 times lower). Cannot be used for large amounts of data  Examples: RSA, ElGamal, DSA

RSA Algorithm Example  To begin: Zach sends out his public key for all to see  For RSA, public key is the product of two large prime numbers p and q  While in reality these numbers would be huge, we will use 43 and 37  Therefore our public key is 43*37 = 1591  Zach picks a number k that is relatively prime to (p-1) * (q-1) meaning k does not go evenly into 42*36 = 1512  Zach can pick 23 for k as it does not go into 1512 evenly  Zach sends out k as part of his public key as well

RSA Algorithm Example Continued  Sara wants to send Zach a message: “UNC is best”  First, she must convert this to Decimal from Char with an ASCII table  “UNC is best” converts to  To encrypt it using the public key, Sara will use the % function of programming known as the mod function  The encrypted cipher would have each letter of the plaintext now equal w^23 mod 1591 where w is each number above  Using wolfram alpha, the encrypted message is now

RSA Algorithm Explained Continued  Zach will now find his private key d using The Euclidean Algorithm K = 23 and (p-1) * (q-1) = – 1 * 5 = 1 23x y = 16 – 1 * (17 – 2 * 6) = = 65 * (23 – 1 * 17) – 1 *(17 – 2 * 6) = 1 23 = 1 * – * 23 – * 23 + (23 – 17)*2 = 1 17 = 2 * * 23 – 2 * 1512 – 2 * * 23 = 1 6 = 1 * * 23 – 4 * 1512 = 1 Therefore d = 263 mod 1512

RSA Algorithm Explained Decryption  Finally, Zach has the encrypted message of and the private key of 263  To decrypt, he does each set of numbers^263 mod 1591  Using Wolfram Alpha we find that the cipher text goes back to which Zach can use the ASCII table to convert to “UNC is best”  Can see how these large numbers make computing these functions take a long time

Large Prime Numbers  Essential to Public-Key Cryptography  Advances in Computing  Hackers Gaining Access to Supercomputers

Mersenne Primes  What are they?  Mersenne Primes are prime numbers of the form 2^p – 1  Great Internet Mersenne Prime Search  Largest Known Mersenne Prime is 2^

Digital Signatures  Basically a reverse of the RSA algorithm  If Zach uses his private key to encrypt a message, people who decrypt it with Zach’s public key know that the encryption was done by Zach or someone with Zach’s private key  This places authenticity on the message from Zach, proving that he or someone he has given his private key to sent the message

Practical Use of Public-Key Cryptography  Public-Key Cryptography is much slower than Private-Key Cryptography  One of the major problems with Private-Key Cryptography is actually getting the private key to both parties without it being tampered with  Public-Key Cryptography with a digital signature can allow one party to create a session key and transfer it securely and with authenticity to the second party  After both parties have received this session key, they can transfer large amounts of data by using Private-Key Cryptography

Why is Cryptography Important?  Preventing Hacks  Lost Privacy  Lost Revenue  Lost Trust

Finances of Cryptography  This is a graph of the Asian Pacific Region’s annual spending on security software and hardware  As we can see, these numbers have been rising continuously and are expected to rise more, showing how important security is to companies

Looking to the Future: Honey Encryption  Honey Encryption: When decrypted with an incorrect key from the attacker, the encryption produces a ciphertext that appears to be a plausible message or phrase but is actually incorrect  Helps fight against “Brute Force” methods of hacking by leading them to believe they have the right key

Looking to the Future: Quantum Key  Quantum Key Distribution: Relies on quantum mechanics: It is used when two parties are making a key to use together.  If the key is eavesdropped on by a third party, the quantum balance will be disturbed and the two parties will know that the key is compromised and communication is not suitable