Download presentation
Presentation is loading. Please wait.
Published bySophie McCoy Modified over 9 years ago
1
Using Cryptography to Protect Data in Computer Networks: case study Vsevolod Ievgiienko National Taras Shevchenko University of Kiev Faculty of Cybernetics Ukraine
2
Introduction Information security Business Banks Online payments Individual persons
3
Introduction Computer System Reliability Security Safety … Cryptography … …
4
Security Security is considered as a part of reliability and survivability problem “Who watches the watchmen?”
5
Safety Optimization problem x - system configuration C - system cost R - system reliability index S - system safety index
6
Information security problems T ypes of violations Disconnection Interception Modification Falsification
7
Information security problems Violations Active Passive - imitation- stream analysis - recreation - modification - hindering in service
8
Information security problems System security services Confidentiality Authentication Integrity Impossibility of refuse
9
Algorithms Symmetric (DES, AES, Blowfish, Serpent, Twofish) E – encryption D – decryption К – secret key М – message С – encrypted message
10
Algorithms Asymmetric (RSA, Elgamal, Elliptic Curves Cryptography) E – encryption D – decryption КUx – public key (user X) КRx – private key (user X) М – message С – encrypted message
11
Principles of planning Principle of different types Use a few algorithms of one type that have a different structure
12
Encryption software solution Remote encrypted file system Secret messaging
13
Encryption algorithms RSA with up to 4096-bit keys Digital signatures based on RSA Trusted timestamping X.509 3-steps authentication Blowfish with 448-bit keys SHA-256 and SHA-512 hash functions HMAC-SHA-256 modified ANSI X9.17 pseudo-random numbers generator PKCS5 for making keys from passwords Deflate compression algorithm CRC32 checksums DoD-5220.22-M for data wiping
14
Sources “Reliability: past, present, future”, I. Ushakov “Applied Cryptography”, B. Schneier “Handbook of Applied Cryptography”, A. Menezes, P. van Oorschot, S. Vanstone www.wasm.ru/forum www.pgpru.com www.pgp.com www.gnupg.org www.cipherwall.com http://www.financialcryptography.com http://www.schneier.com
15
THE END Questions? Contacts: E-mail: admin@rest-company.kiev.uaadmin@rest-company.kiev.ua Tel: +38050-3-555-999 ICQ: 333269
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.