Cryptography and Code Breaking Cryptography is the study and practice of hiding messages.

Slides:



Advertisements
Similar presentations
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Advertisements

Interlock Protocol - Akanksha Srivastava 2002A7PS589.
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Cryptography 101 How is data actually secured. RSA Public Key Encryption RSA – names after the inventors –Rivest, Shamir, and Adleman Basic Idea: Your.
Attacks on Digital Signature Algorithm: RSA
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
Cryptography Prof. Seth D. Bergmann Rowan University Computer Science.
August 6, 2003 Security Systems for Distributed Models in Ptolemy II Rakesh Reddy Carnegie Mellon University Motivation.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
Computer Science Lecture 22, page 1 Security in Distributed Systems Introduction Cryptography Authentication Key exchange Readings: Tannenbaum, chapter.
A Cryptography Tutorial Jim Xu College of Computing Georgia Tech
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Introduction to Public Key Cryptography
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Enhancing Security with S/MIME Chuck Connell,
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
1 Lesson Internet Organization network Fire wall.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Computer Security coursework 2 Dr Alexei Vernitski.
Asymmetric-Key Cryptography Also known as public-key cryptography, performs encryption and decryption with two different algorithms. Each node announces.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Public-Key Cryptography CS110 Fall Conventional Encryption.
LIS508 last lecture: Cryptography & Security Thomas Krichel
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
``Chaffing and Winnowing’’ & Crypto Policy Comments Ronald L. Rivest Cryptography and Information Security Group MIT Lab for Computer Science April 1998.
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 23/10/2015 | pag. 2.
MA/CSSE 473 Day 10 Primality testing summary Data Encryption RSA.
Encryption.
Cryptography Dave Feinberg. Suppose I send an from to Who has access to that ? What if I want the.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Overview of Cryptography & Its Applications
The First Ten Years of Public-Key Cryptography Paper by: Whitfield Diffie Presentation by Taotao Zhao.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Cryptography Readings Encryption, Decryption, & Digital Certificates.
Section #9: Bitcoins. Digital currency Unique string of bits Use cryptography for security and privacy Not tied to names: hard to trace Finite set of.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
1 Managing Security Additional notes. 2 Intercepting confidential messages Attacker Taps into the Conversation: Tries to Read Messages Client PC Server.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Network Security  introduction  cryptography  authentication  key exchange  required reading: text section 7.1.
Symmetric and Asymmetric Encryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Topic 1: Data, information, knowledge and processing
Public – Private Key Cryptography
Purpose: how do computers keep our information secret?
Presentation transcript:

Cryptography and Code Breaking Cryptography is the study and practice of hiding messages.

Places Cryptography is Used

Austria in the 1990's A series of letter bombs were sent to various recipients. The list of recipients was encrypted by the terrorists. The terrorists wanted to demonstrate that the government was powerless to stop them.

Cryptographic Methods There are two common types of cryptography. Private Key Cryptography Public Key Cryptography

Private Key Cryptography Using Private Key Cryptography you have to exchange keys prior to communication. The Key must be kept private from third parties.

Public Key Cryptography Using Public Key Cryptography you don't have to exchange keys prior to communicating. Two keys are used with this method, a public key and a personal key.

Personal Key The personal key is two randomly chosen prime numbers. Example: P = 7, Q = 11 This key is not shared with anyone. It is used by the receiver to decrypt the message.

Public Key The public key is the product of the two chosen primes from the personal key. Example: N = P * Q = 7 * 11 = 77 This key is shared with everyone. It is used to encrypt messages to be sent to the person with the matching personal key.

Factorization The strength lies in the difficulty of factoring numbers. What are the factors of 77? 7 and 11 What are the factors of ? 8867 and 7901

Example Keys Here is an example of a small public key that could be used to encrypt a message Can you tell the factors?

Factors Using our method you would find that the factors are: and

My Team Studied Factorization If you can factor the public key you can decipher the message. We devised what we thought was a new technique to factor numbers. We discovered that this technique already existed (fermat factorization).

Applications of Research The mail bombers accidently used a weak key. This allowed the encryption to be broken. The technique used to break the message was the same technique my team reinvented, fermat factorization.

Take Away Messages Cryptography is used everywhere! Cryptography is not always secure. More researchers are needed.