Presentation is loading. Please wait.

Presentation is loading. Please wait.

Encryption Power Crunch Tyler Morgan. Encryption & Cryptography What it is, methods, and brief description of cryptography.

Similar presentations


Presentation on theme: "Encryption Power Crunch Tyler Morgan. Encryption & Cryptography What it is, methods, and brief description of cryptography."— Presentation transcript:

1 Encryption Power Crunch Tyler Morgan

2 Encryption & Cryptography What it is, methods, and brief description of cryptography.

3 What is Encryption? Using Cryptography Protects data In transit At rest Verification of secured connection

4 What is Cryptography? Writing or solving codes Uses algorithms Public key Private key

5 Types of Cryptography One way (Hash) SHA1decrypted-text  f9144510fe087232b517028e2257da0a9db42e9f MD5decrypted-text  4d9574506ac2486f8fcf969e002b3d38 SHA256decrypted-text  a24976d07742d855ccb962a707fd95c087dd09737683bd379e085ba5d96ef58f Two way Caesar cipher using key: 16 decrypted-text  qrpelcgrq-grkg  decrypted-text Base64 decrypted-text  ZGVjcnlwdGVkLXRleHQ=  decrypted-text 3DES Key: 66c9aef783a6adabd86422e80abec09d5f84a3643d64ef01 Init Vector(IV): 382198d117678388 decrypted-text  43408aa71e6798beb3ad387374f245f2  decrypted-text

6 Where is Encryption being used? Military Communications, signals, purchases, etc. Residential Phones, data, and backups Commercial Card purchases and transactions Corporation Secrets, hard drives, data, Intellectual property, etc. Underground Communications, transactions, websites, leaked information, et.

7 Why is Encryption being used? Value Secretive Identity Tampering Privacy

8 Encryption Strengths and Weaknesses Where encryption is strong, where it is weak, and how it is considered weak

9 Weaknesses of Encryption Attacks Leaks Reverse Engineering Quantum Computers Computing Power Available Resources

10 Types of Attack Brute Force Dictionary Attack Rainbow Tables Every Combo Side Channel Timing Power-monitoring Electromagnetic Acoustic cryptanalysis Differential fault analysis Data remanence Collision Hello 89232323 Fagergrgegrelgkrlg 89232323

11 HeartBleed Vs. CacheBleed Internet based exploit TLS/SSL openSSL Physical based exploit Complex Not seen in wild More Info

12 TLS vs SSL By Port Explicit Expects security negotiations SSL 3.0 POODLE Vulnerability Not used by Government Prior to POODLE By Protocol Implicit Insecure then encrypted TLS 1.0 – BEAST attack TLS 1.1 and 1.2 standard

13 Weak Security vs No Security Protects Value depended Exposure depended Risk Analysis

14 “ ” If there is a will there a way… About “Unbreakable” Encryption Encryption is able to be broken, all about in what time frame

15 About “Unbreakable” Encryption Improved Computing Power Assuming strong complex password Successful by 75% of estimated time

16 Government & Backdoors When and why encryption was banned, about “backdoors”, how governments could effect the future of encryption.

17 Ban of Exporting Crypto Technology Crypto regulated after WWII Banned until 1992 Gradually eased until 2000 Some restrictions still remained Could be charged with Treason More Information

18 What is a Backdoor? Not well defined Could be: Deliberate bug inside software Ability to bypass security Ability to record without person knowing Weakening underlying security Ability to access remotely

19 Why not to Have a Backdoor Compromises security Improves successful hack chances Further problems when not patched

20 Governments Shaping the Future Ability to perform mass surveillance “unbreakable” encryption easily accessed Strong as the weakest link Trust vs Power Underground market Closed vs Open sourced projects


Download ppt "Encryption Power Crunch Tyler Morgan. Encryption & Cryptography What it is, methods, and brief description of cryptography."

Similar presentations


Ads by Google