Presentation is loading. Please wait.

Presentation is loading. Please wait.

Asynchronous Cryptology: Implementations and Applications

Similar presentations


Presentation on theme: "Asynchronous Cryptology: Implementations and Applications"— Presentation transcript:

1 Asynchronous Cryptology: Implementations and Applications
Tim Ransom James Corsi Summer Bridge 2013 August 2, 2013

2 Overview What is Cryptology? Symmetric vs. Asymmetric
Public vs. Private Keys What makes them secure? Acknowledgements

3 What is Cryptology? The encryption and decryption of a message to ensure a secret communication Has become very prominent after WWI with the introduction of computers Combines the fields of applied mathematics, computer science and electrical engineering

4 Symmetric vs. Asymmetric
Symmetric Advantages: Higher rates of throughput Keys are relatively short Simple symmetric keys can be composed to create a stronger cipher Public Key Advantages: Same keys can be used for long periods of time Public keys reduce the total number of keys needed, making management much simpler Only the private key must be kept secret Symmetric Disadvantages: For two parties, both keys must be kept secret Digital signature verifications typically require large keys for public validation Public Key Disadvantages: Throughput speeds can be very slow No public scheme has been proven secure

5 Public vs. Private Keys Public keys are freely available and usually encrypt data Public keys can decrypt data to publicly announce information Private keys are usually used to decrypt messages encrypted with the related public key They can be used for encryption to verify the author of the message

6 What makes them secure? RSA Algorithms DH Algorithms
Extra security measures: Trusted Third Party (TTP) Digital Signature

7 Acknowledgements Dr. Tashakkori Dr. Norris Appalachian State
The National Science Foundation STEP program

8 References Menezes, Alfred J., Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. Boca Raton: CRC, Print. Pfleeger, Charles P., and Shari L. Pfleeger. Security in Computing. 3rd ed. Upper Saddle River: Prentice Hall, Print. Pieprzyk, Josef, Thomas Hardjono, and Jennifer Seberry. Fundamentals of Computer Security. New York: Springer-Verlag Berlin Heidelberg, Print. Garrett, Paul, and Daniel Lieman. Public-key Cryptography: American Mathematical Society Short Course, January 13-14, 2003, Baltimore, Maryland. Vol. 62. Providence, RI: American Mathematical Society, Print Abhishek. “Symmetric and Asymmetric Encryption.” Drawing. Cryptocats.com 27 August < “Public-key-crypto-1” by KohanX - CC: BY “Public key shared secret” by David Gothberg - CC: BY “Diffie-Hellman Key Exchange” by Flugaal - CC: BY


Download ppt "Asynchronous Cryptology: Implementations and Applications"

Similar presentations


Ads by Google