Stacey Levine. History of cryptography Why cryptography? Private Key Systems Public Key Systems Comparisons and PEM (not) The future - Quantum Cryptography.

Slides:



Advertisements
Similar presentations
Cryptography Ch-1 prepared by: Diwan.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Public Key Cryptography
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Computer Science Lecture 22, page 1 Security in Distributed Systems Introduction Cryptography Authentication Key exchange Readings: Tannenbaum, chapter.
Public Key Cryptography Bryan Pearsaul. Outline What is Cryptology? Symmetric Ciphers Asymmetric Ciphers Diffie-Hellman RSA (Rivest/Shamir/Adleman) Moral.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Public Key Model 8. Cryptography part 2.
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Cryptography CSPrinciples II February 12, Needs for Privacy What are some specific needs for privacy when using the internet?
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Cryptography What is cryptography? The study of message secrecy The art of writing or solving codes Heavy mathematics Information Theory Statistics Number.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Image Representation Privacy/Cryptography CS 104 October 3, 2011.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Midterm Review Cryptography & Network Security
Computer and Internet Security. Introduction Both individuals and companies are vulnerable to data theft and hacker attacks that can compromise data,
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Lecture 2: Introduction to Cryptography
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
IT 221: Introduction to Information Security Principles Lecture 4: Public-Key Cryptography For Educational Purposes Only Revised: September 15, 2002.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
By Hani AlQaffas.  Cryptography is a technique used to hide the meaning of a message and is derived from the Greek word kryptos (hidden).  This is different.
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
CRYPTOGRAPHY Gayathri V.R. Kunapuli. OUTLINE History of Cryptography Need for cryptography Private Key Cryptosystems Public Key Cryptosystems Comparison.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
INCS 741: Cryptography Overview and Basic Concepts.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Network Security  introduction  cryptography  authentication  key exchange  required reading: text section 7.1.
Cryptography – Test Review
Chapter 8 Network Security.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Public Key Infrastructure
PART VII Security.
Fluency with Information Technology Lawrence Snyder
Secure Diffie-Hellman Algorithm
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Stacey Levine

History of cryptography Why cryptography? Private Key Systems Public Key Systems Comparisons and PEM (not) The future - Quantum Cryptography

Earliest recorded us around 1900BC in Egypt Around 100BC Julius Caesar used substitution cipher 1623 – Sir Francis Bacon described bilateral cipher A type of steganography (hiding) Lots of other uses/advances – most notable Enigma machine in WWII 1970’s - Dr. Horst Feistal invented DES 1977 magazine The Scientific American – RSA announced 2007 Quantum Cryptography successfully used to transmit 50 miles [8]

Message passing between authenticated principals Authenticate message has digital signature

Encryption algorithm E turns plain text message M into a cipher text C C=E(M) Decrypt C by using decryption algorithm D which is an inverse function of E M=D(C)

Confidentiality kept by keeping algorithms secret. Not practical over distributed systems – too many algorithms. Solution is to decompose algorithm Function - public Key - private

Encryption algorithm with secret key Ke Decryption key Kd M=D kd ( E ke (M)) Requirements of function (algorithm) Different messages with same key  distinct result Same message different key  distinct results Key impossible to infer from plaintext/ciphertext

The keys Ke and Kd are different, but it is convenient to choose a key K that can be applied to both. The longer the key (the more bits) the more secure it is

DES – developed by IBM  56 bit key – sufficient because 2 56 =7.2 *  According to the book this too large to enumerate with modern computers but our book is from 1998  The plaintext is broken down into 64 bit blocks  Each block is encrypted using the key  Drawback is that if blocks are repetitive in plaintext, so will the ciphertext be giving a clue to the interlopers.  This can be addressed with chaining – each block is XOR’d with previous encrypted block BEFORE encryption.

Private key systems require [n*(n-1)]/2 keys Keys must be agreed on before secure communication can start. The keys can be distributed in a key distribution system which will be covered next week.

Introduced by Diffie and Hellman Each principal keeps a set of encryption keys ( Ke & Kd ) Encryption algorithm E is public and so is the key Ke Decryption algorithm D and decryption key Kd is kept private. Data sent to a principal is encrypted using that persons Ke

Basically a two key system It is possible to make E and D public if Ke and Kd are kept private and impossible to infer RSA uses this approach E and D are public. And are inverse of each other. Relies on computational complexity in factoring large numbers upon which keys are placed.

 Message is limited to k size bits  Integer k is chosen such that 2 k < N  N =p * q where p & q are LARGE prime numbers  Kp (public encyrption key) and Ks (private decryption key) are derived from p & q

 Private Key DES is computationally efficient  Public Key RSA is computationally expensive  Possible best use is RSA for short/important data and DES for long or less critical  Privacy Enhanced (PEM) initiative does this (NOTE: this is gone now..) – basically used certificates  PGP took over

 Based on Quantum theory  The act of observing affects what is being observed  Schrodinger’s Cat  quantum indeterminacy or the observer's paradox

Al Sends Message Bob Gets Message Interloper

1. Chow, Randy; Johnson, Theodore; Distributed Operating Systems & Algorithms, [April 2007] 3. What is Quantum Physics, 4. Elliott, C., Pearson, D., and Troxel, G Quantum cryptography in practice. In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols For Computer Communications (Karlsruhe, Germany, August , 2003). SIGCOMM '03. ACM Press, New York, NY, DOI= 5. Papanikolaou, N An introduction to quantum cryptography. Crossroads 11, 3 (May. 2005), 3-3. DOI= 6. Diffie, W Ultimate cryptography. Commun. ACM 44, 3 (Mar. 2001), 84. DOI= 7. Components for quantum cryptography Zbinden, H.; Ribordy, G.; Stucki, D. Optical Fiber Communication Conference, 2006 and the 2006 National Fiber Optic Engineers Conference. OFC 2006, Vol., Iss., 5-10 March 2006 Pages: 3 pp.- 8. E.S.;”Hack-Proof Internet”, Popular Science Magazine, February 2007, pg (April 2007)