Half a secret Linguistics 294L Modern uses of cryptography Linguistics 294L Modern uses of cryptography.

Slides:



Advertisements
Similar presentations
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Advertisements

CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Requirements for a Secure Voting System  Only authorized voters can vote  No one can vote more than once  No one can determine for whom anyone else.
Digital Signatures. Anononymity and the Internet.
Cryptography in World War II Jefferson Institute for Lifelong Learning at UVa Spring 2006 David Evans Class 4: Modern Cryptography
Public Key Algorithms …….. RAIT M. Chatterjee.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Distributed Systems1 Lecture 12: RSA Distributed Systems2 Plan for today: Introduce RSA and a toy example using small numbers. This is.
Chap 3: Key exchange protocols In most systems, we distinguish the short term keys from the long term ones: –A short term key (session key) is used to.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Introduction to Modern Cryptography Lecture 7 1.RSA Public Key CryptoSystem 2.One way Trapdoor Functions.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
The Idea of Public Key Cryptography Cunsheng Ding HKUST, Hong Kong.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Encryption Methods By: Michael A. Scott
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Rachana Y. Patil 1 1.
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
Encryption Coursepak little bit in chap 10 of reed.
COEN 351 E-Commerce Security Essentials of Cryptography.
Public-Key Cryptography CS110 Fall Conventional Encryption.
LIS508 last lecture: Cryptography & Security Thomas Krichel
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Public Key Cryptography By: Noor Dhia Al- Shakarchy.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Cryptography is the process of encryption and decryption a message or data. Examples: Banking to keep peoples money safe Schools so we can keep students.
Facilities for Secure Communication The Internet is insecure The Internet is a shared collection of networks. Unfortunately, that makes it insecure An.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Copyright 1999 S.D. Personick. All Rights Reserved. Telecommunications Networking II Lecture 41b Cryptography and Its Applications.
ECE509 Cyber Security : Concept, Theory, and Practice Key Management Spring 2014.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
COEN 351 E-Commerce Security
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Cryptography Gerard Klonarides. What is cryptography? Symmetric Encryption Symmetric Encryption Asymmetric Encryption Asymmetric Encryption Other cryptography.
DIGITAL SIGNATURE IMPLEMENTATION
Week 4 - Wednesday.  What did we talk about last time?  Finished DES  AES.
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
SOA Seminar1 Seminar on Service Oriented Architecture RSA.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
How Secure Works Stephen Smith | November 27, 2013.
Digital Signatures.
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Hash Functions Which of these problems is easier to solve:
Privacy & Security.
Public Key Encryption Systems
Public-Key Cryptography and RSA
Big Numbers: Mathematics and Internet Commerce
Group theory exercise.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Public-Key Cryptography
Public Key Cryptography
Public Key Infrastructure
Diffie-Hellman Secure Key Exchange 1976.
MSIT 543 Cryptography Concepts and Techniques How RSA Encryption Works
Chapter 29 Cryptography and Network Security
Public Key Encryption Systems
Secure Diffie-Hellman Algorithm
Presentation transcript:

Half a secret Linguistics 294L Modern uses of cryptography Linguistics 294L Modern uses of cryptography

Information has value Some secrets are obviously worth keeping PIN numbers SSN login passwords product blueprints

What secrets? Would I like to see my competitor’s sales figures? Would I like to see my competitor’s customer list? Did it cost me money or effort to make? If so, consider protecting it?

Information has value Information asymmetries can be useful. Potential stealer can’t safely eat any of the melons. One of these melons is poisoned

Information has value Information asymmetries can be negated. Potential stealer can’t safely eat any of the melons. But neither can owner. They now need to pool information. Now two of the melons are poisoned

Other similar things Three signatures on a company check Vaults with multiple keys Nuclear submarine launch protocols

Diffie- Hellman Public Key Cryptography Whitfield Diffie Public Key Cryptography Whitfield Diffie

Diffie- Hellman Public Key Cryptography Martin Hellman Public Key Cryptography Martin Hellman

Key distribution Up to now, we have been assuming the need for an agreed shared key. The crucial idea Diffie and Hellman had was to imagine cutting this key in two. One half for encryption The other half for decryption

Uses of half secrets I can publish my encryption key, anyone can send me confidential messages. If I keep my decryption key secret, no- one else can read the messages

Uses of half secrets I can publish my decryption key, anyone can decrypt my messages If I keep my encryption key secret,anything encrypted with that key must have come from me.