CRYPTOGRAPHY Gayathri V.R. Kunapuli. OUTLINE History of Cryptography Need for cryptography Private Key Cryptosystems Public Key Cryptosystems Comparison.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Introduction to Signcryption November 22, /11/2004 Signcryption Public Key (PK) Cryptography Discovering Public Key (PK) cryptography has made.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Public Key Cryptography and the RSA Algorithm
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Computer Science Lecture 22, page 1 Security in Distributed Systems Introduction Cryptography Authentication Key exchange Readings: Tannenbaum, chapter.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
ASYMMETRIC CIPHERS.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Chapter 12 Cryptography (slides edited by Erin Chambers)
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Prime Numbers Prime numbers only have divisors of 1 and self
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Midterm Review Cryptography & Network Security
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
Stacey Levine. History of cryptography Why cryptography? Private Key Systems Public Key Systems Comparisons and PEM (not) The future - Quantum Cryptography.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Symmetric and Asymmetric Encryption
Public Key Encryption and Digital Signatures
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
Security in Distributed Systems
Presentation transcript:

CRYPTOGRAPHY Gayathri V.R. Kunapuli

OUTLINE History of Cryptography Need for cryptography Private Key Cryptosystems Public Key Cryptosystems Comparison between Public and Private Key Cryptosystems PEM Future Work

History of Cryptography[2] Ceaser Ciphers Transposition Cipher Substitution Cipher Vigene`re Cipher Enigma Machine

Need for Cryptography[1] Authentication of the Communicating Principals Authenticated message carries a Digital Signature

Private Key Cryptosystems[1,2] Also called Symmetric Cryptography Encryption algorithm E turns plain text message M into a cipher text C C=E(M) Decrypt C by using decryption algorithm D which is an inverse function of E M=D(C)

Private Key Cryptosystems cont[1,2] Algorithm decomposed into Function(public) and Key(secret) Encrypted using the key K e and decrypted using the key K d M=D Kd (E Ke (M)) A function and a variable number of keys constitute a class of algorithms indexed by the keys.

Cont… The encryption function is -One-to-one injective mapping -One way function The secrecy rests on the keys rather than on algorithms. The key should be of sufficient length in bits.

DES(Jan,1977)[1,2] Encryption consists of 3 stages of Transposition and 16 stages of Substitution of bits. Easy to implement on VLSI The 56-bit length key was found insufficient and easy to break Repetitions in cipher text give clues to eavesdroppers Spurious data can be injected

Contd… Private Key systems require [n*(n-1)]/2 keys for ‘n’ principals in a system The conversation key must be agreed upon beforehand Management of the keys is a function of the Key Distribution Server(KDS)

Public Key Cryptographic Systems (Need)[1] Also called as the Asymmetric Cryptography To avoid the need to transmit secret keys and To reduce the key requirement to 2n, the public key systems are used

Public Key Cryptosystems Cont Introduced by Diffie and Hellman Each principal keeps a set of encryption keys (Ke & Kd) Encryption algorithm E is public and so is the key Ke Decryption algorithm D and decryption key Kd is kept private Data sent to a principal is encrypted using that corresponding Ke E and D can be made public if Ke and Kd are chosen such that it is impossible to infer Kd from Ke.

RSA(Aug,1977)[1,2,5] The algorithms E and D are inverses Plain text messages are limited to a size is limited to ‘k’ Integer k is chosen such that 2 k < N N =p * q where p & q are LARGE prime numbers Kp (public encyrption key) and Ks (private decryption key) are derived from p & q

Contd The robustness of RSA algorithm relies on the computational complexity in factoring a large number upon which the keys are based. The authenticity of the sender can also be verified.

Comparison between the cryptosystems[1] Private Key DES is computationally efficient Public Key RSA is computationally expensive Possible best use is RSA for short/important data and DES for long or less critical

PEM[1,5] Provides mechanism for the mail users to specify the cryptographic algorithm and parameters to be used for mail messages. Essential data fields in PEM are ◦ DEK ◦ IK ◦ MIC

Extended Works[4] To prevent the Denial-of-Decryption To reduce the time taken for the authentication of the digital signatures Self Generated Certificate Public Key Cryptography

References 1. Chow, Randy; Johnson, Theodore; Distributed Operating Systems & Algorithms, Aiden A.Bruen,Mario A.Forcinito ; Cryptography, I nformation theory and Error-correction, of cryptography 4. Self generated certificate public key cryptography and certificateless signature/Encryption scheme in the standard model ASIACCS’07, March 20-22, 2007, Singapore. 5. les/Hebert.html (April 2007)