Presentation is loading. Please wait.

Presentation is loading. Please wait.

Encryption Encryption has been around a long time. From the simple Ceaser cipher thru the Enigma wheel.

Similar presentations


Presentation on theme: "Encryption Encryption has been around a long time. From the simple Ceaser cipher thru the Enigma wheel."— Presentation transcript:

1 Encryption Encryption has been around a long time. From the simple Ceaser cipher thru the Enigma wheel.

2 Picture

3

4

5

6 Example of internal operation Enigma wiring diagram showing current flow. The "A" key is encoded to the "D" lamp. D yields A, but A never yields A.

7 Example of internal operation The scrambling action of the Enigma rotors shown for two consecutive letters—current is passed into set of rotors, around the reflector, and back out through the rotors again. The greyed-out lines represent other possible circuits within each rotor, which are hard-wired to contacts on each rotor. Letter A encrypts differently with consecutive key presses, first to G, and then to C. This is because the right hand rotor has stepped, sending the signal on a completely different route.

8 Difference between rsa and dsa RSA - Rivest Shimar Adleman In cryptography, RSA is an algorithm for public-key cryptography. It was the first algorithm known to be suitable for signing as well as encryption, and one of the first great advances in public key cryptography. RSA is widely used in electronic commerce protocols, and is believed to be secure given sufficiently long keys and the use of up-to-date implementations. DSA - Digital Signature Algorithm. A primary algorithm used in many security-based applications and products; one of the two possible types that can be used with OpenSSH to support version 2 of the "ssh" protocol, "ssh-keygen -t dsa".

9 Diference between pgp + gpg GPG - The GNU Privacy Guard GnuPG is the GNU project's complete and free implementation of the OpenPGP standard as defined by RFC4880. GnuPG allows to encrypt and sign your data and communication, features a versatile key managment system as well as access modules for all kinds of public key directories. PGP – Pretty good protection. Abbreviated as PGP, a technique developed by Philip Zimmerman for encrypting messages. PGP is one of the most common ways to protect messages on the Internet because it is effective, easy to use, and free. PGP is based on the public-key method, which uses two keys -- one is a public key that you disseminate to anyone from whom you want to receive a message. The other is a private key that you use to decrypt messages that you receive.

10 Installing open ssh server Goto synaptic package manager and search for openssh server Install open ssh-server and allso make shure openssh-client is allso installed. Notes : ssh runs in background. you can configure ssh with webmin website training http://www.decf.berkeley.edu/help/security/ssh/ Install openssh-server and allso make shure openssh-client is installed. Notes: 1) sshd runs in background. 2) You can configure ssh with webmin website training http://www.decf.berkeley.edu/help/security/ssh/

11 purpose of ssh keys Secure Shell or SSH is a network protocol that allows data to be exchanged over a secure channel between two computers.network protocolsecure channel Encryption provides confidentiality and integrity of data. SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary.Encryptionpublic-key cryptography authenticate

12 SSH Key generation (((((( ssh keygen is for generating keys for ssh ))))) 1) To begin open a terminal and type ssh-keygen -C "Key from Laptop" -t dsa 2) Hit enter to put key in default place home/.ssh or type where to put the file and what name to call the file = /home/brett/Desktop/ssh_keys/laptop_keys.id_dsa example : (id_dsa is standard file name) /home/v_7.10/brett/Desktop/ssh_keys/laptop_keys.id_dsa 3) If you want a passwordless key just hit the enter key when prompted for password. 4) If you want keys with a password enter password of user the key belongs to or any one you want.

13 SSH Key generation What each thing does in this line ssh-keygen -C "Key from Laptop" -t dsa Notes: 1) There are 3 kinds of keys rsa1,rsa,dsa. 2) Use dsa is better. By default the keys are saved in.ssh folder of the user presently logged in. ssh-keygen = Is the program that does the key generation. -c = Allows you to give the key a name at the end of the key after the key is generated. "key from laptop" = Is the name at end of key. -t dsa = Is the type of encryption types are rsa1,rsa,dsa (dsa is best to use) -f /home/v_7.10/brett/.ssh/dsa-key = Is the path and file name /dsa-key can allso be /brettsdsa-key

14 Private key -----BEGIN DSA PRIVATE KEY----- MIIBugIBAAKBgQCPcCFihHGXtLsGXapTwKmdDpzv6Nj6hANX9PBVgtMKqy2TRegn UKcc8LVr+ps+0t1D7JLyniXqlEa1TS4vjE4Tl9gdoqnAbc5E8GGNCvLJq2N/nGa+ DJgz659lkruMBxRN68mdcsz0x03Bsm56DSAD5sd5lCulr/XHtkPyW1jpcwIVANRB r9yhe7kYVscWYAPPROFl7O2nAoGAN5GQL6BLSKvEmnbvaZgc2+iHiVEenIa8Rv6s 1tIjOxOKlf4WpNQCKlXh4ZE4sO8j2v8DMepZvc/8qAQuaLDOBLeUI4EazNJ1YqCR I0YKwyPfWf2FsNfNL2EOGUWl8U5bYzQD2XGFSZbCy0FjMVrIvM5QSWpVHOPP7ntf OaSgttwCgYAii8enPt3q7kKKRVv3Rr7vefaSha/vue0i3w3BjVB2IpXYaMNyBC/D PxO8V53XvzY1FDSDEK3+NbErOtNFf5l+JmEnNg4oNt4qEA9ZVIT/m13VDJMbklCb SkskvpD4n+xBz83DHaC5i6V0yh/NArNac2TBsfqC7effibagyISEYwIUPhvaj+lC os8IarpPZ5BogTBFI5g= -----END DSA PRIVATE KEY-

15 Public key ssh-dss AAAAB3NzaC1kc3MAAACBAI9wIWKEcZe0uwZdqlPAqZ0OnO/o2PqEA1f08FWC0wqr LZNF6CdQpxzwtWv6mz7S3UPskvKeJeqURrVNLi+MThOX2B2iqcBtzkTwYY0K8smrY3 +cZr4MmDPrn2WSu4wHFE3ryZ1yzPTHTcGybnoNIAPmx3mUK6Wv9ce2Q/JbWOlzAAA AFQDUQa/coXu5GFbHFmADz0ThZeztpwAAAIA3kZAvoEtIq8Sadu9pmBzb6IeJUR6chrx G/qzW0iM7E4qV/hak1AIqVeHhkTiw7yPa/wMx6lm9z/yoBC5osM4Et5QjgRrM0nVioJEjRg rDI99Z/YWw180vYQ4ZRaXxTltjNAPZcYVJlsLLQWMxWsi8zlBJalUc48/ue185pKC23AA AAIAii8enPt3q7kKKRVv3Rr7vefaSha/vue0i3w3BjVB2IpXYaMNyBC/DPxO8V53XvzY1F DSDEK3+NbErOtNFf5l+JmEnNg4oNt4qEA9ZVIT/m13VDJMbklCbSkskvpD4n+xBz83DH aC5i6V0yh/NArNac2TBsfqC7effibagyISEYw== test

16 Encrypting a file in kgpg

17 Decrypting in kgpg

18 Encrypting and decrypting in terminal Note: $ stands for users home director Encrypting $ gpg -r brettb -e /home/v_7.10/brett/Desktop/encryption teaching/example_file_to_encrypt Decrypting $ gpg -d /home/v_7.10/brett/Desktop/encryption teaching/example_file_to_encrypt.asc > example_file_to_encrypt

19 Encrypting in krusader krusader can be installed in add/remove You allso should install kubuntu desktop to have all features of krusader work properly.

20 Decrypting in Krusader

21 Encrypting in Kgpg

22 decrypting in Kgpg

23 Digital signatures A signature is a short representation of the contents of a file or message

24 Email encryption Can be used in mozilla thunderbird. Install enigmail.

25 Web http + https HTTP - Short for HyperText Transfer Protocol, the underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. HTTPS - Is the Hyper-Text Transfer Protocol with SSL Encryption. It is the most popular network protocol for establishiing secure connections for exchanging documents on the World- Wide Web. It is basically HTTP carried over a TCP socket, which has been secured using SSL.

26


Download ppt "Encryption Encryption has been around a long time. From the simple Ceaser cipher thru the Enigma wheel."

Similar presentations


Ads by Google