Download presentation
Presentation is loading. Please wait.
Published byFrank Bates Modified over 8 years ago
1
Encryption Power Crunch Tyler Morgan
2
Encryption & Cryptography What it is, methods, and brief description of cryptography.
3
What is Encryption? Using Cryptography Protects data In transit At rest Verification of secured connection
4
What is Cryptography? Writing or solving codes Uses algorithms Public key Private key
5
Types of Cryptography One way (Hash) SHA1decrypted-text f9144510fe087232b517028e2257da0a9db42e9f MD5decrypted-text 4d9574506ac2486f8fcf969e002b3d38 SHA256decrypted-text a24976d07742d855ccb962a707fd95c087dd09737683bd379e085ba5d96ef58f Two way Caesar cipher using key: 16 decrypted-text qrpelcgrq-grkg decrypted-text Base64 decrypted-text ZGVjcnlwdGVkLXRleHQ= decrypted-text 3DES Key: 66c9aef783a6adabd86422e80abec09d5f84a3643d64ef01 Init Vector(IV): 382198d117678388 decrypted-text 43408aa71e6798beb3ad387374f245f2 decrypted-text
6
Where is Encryption being used? Military Communications, signals, purchases, etc. Residential Phones, data, and backups Commercial Card purchases and transactions Corporation Secrets, hard drives, data, Intellectual property, etc. Underground Communications, transactions, websites, leaked information, et.
7
Why is Encryption being used? Value Secretive Identity Tampering Privacy
8
Encryption Strengths and Weaknesses Where encryption is strong, where it is weak, and how it is considered weak
9
Weaknesses of Encryption Attacks Leaks Reverse Engineering Quantum Computers Computing Power Available Resources
10
Types of Attack Brute Force Dictionary Attack Rainbow Tables Every Combo Side Channel Timing Power-monitoring Electromagnetic Acoustic cryptanalysis Differential fault analysis Data remanence Collision Hello 89232323 Fagergrgegrelgkrlg 89232323
11
HeartBleed Vs. CacheBleed Internet based exploit TLS/SSL openSSL Physical based exploit Complex Not seen in wild More Info
12
TLS vs SSL By Port Explicit Expects security negotiations SSL 3.0 POODLE Vulnerability Not used by Government Prior to POODLE By Protocol Implicit Insecure then encrypted TLS 1.0 – BEAST attack TLS 1.1 and 1.2 standard
13
Weak Security vs No Security Protects Value depended Exposure depended Risk Analysis
14
“ ” If there is a will there a way… About “Unbreakable” Encryption Encryption is able to be broken, all about in what time frame
15
About “Unbreakable” Encryption Improved Computing Power Assuming strong complex password Successful by 75% of estimated time
16
Government & Backdoors When and why encryption was banned, about “backdoors”, how governments could effect the future of encryption.
17
Ban of Exporting Crypto Technology Crypto regulated after WWII Banned until 1992 Gradually eased until 2000 Some restrictions still remained Could be charged with Treason More Information
18
What is a Backdoor? Not well defined Could be: Deliberate bug inside software Ability to bypass security Ability to record without person knowing Weakening underlying security Ability to access remotely
19
Why not to Have a Backdoor Compromises security Improves successful hack chances Further problems when not patched
20
Governments Shaping the Future Ability to perform mass surveillance “unbreakable” encryption easily accessed Strong as the weakest link Trust vs Power Underground market Closed vs Open sourced projects
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.