Download presentation
Presentation is loading. Please wait.
1
“The Security Guru” Bruce Schneier Mario Basque Comp-1631 Winter, 2011
2
Outline About Bruce Managed Security Solutions Group – BT What is; Twofish Blowfish Yarrow Hash functions Skein Threefish Conclusion
3
The Beginning Born on January 15, 1963 Graduate of the American University in 1988 Has a Masters in Computer Science Bruce is a renowned security expert and author Bruce on Security http://www.youtube.com/watch? v=IoXoHlI86rQ
4
Bruce has created and co-created many sophisticated algorithms for security purposes These algorithms are mostly aimed for businesses trying to protect their information from hackers He has also writes novels, some of his latest are; Secrets and Lies, and Cryptography Engineering, Applied Cryptography (best seller) Cryptography is the practice and study of hiding information
5
Managed Security Solutions Group - BT Bruce started Managed Security Solutions (formally counterpane labs) in 1999 (sold to BT Group in 2006) Bruce is the CTO (Chief Security Technology Officer) of Managed Security Solutions This company is described by Bruce as “making security products work” They offer monitoring services to businesses to try and prevent attacks from hackers
6
Encryption Algorithm Encryption is the process of taking plain text and transforming it to cipher text Bruce is a security expert he uses this process and helps large businesses (especially banks) to hide information so hackers can’t get private information Let’s look at some Algorithm that Bruce Schneier created
7
Twofish
8
Blowfish
9
Twofish / Blowfish Twofish is a symmetric key block cipher with a block sizes of 128 bits and key sizes up to 256 bits Blowfish is also a symmetric key block cipher but a little bigger in size and faster, it takes a variable length-key of 32 bits to 448 bits A combination of S-boxes, with a complex key schedule make up the process of Twofish and Blowfish
10
Terminology Block Cipher: takes plain text as an input and translates it into cipher text S-Box (substitution-box): it performs substitutions, in block ciphers, they are typically used to obscure the relationship between the key and the cipher text
11
Yarrow Uses a system called pseudorandom number generator (PRNG) – generates random numbers on a computer The numbers have to be large enough so it can’t be hacked PRNG had been broken before by a couple of Berkley Students Yarrow generates cryptographically secure pseudorandom numbers on a computer. It can also be used as a real random number generator, accepting random inputs from analog random sources, it’s security is said to be a step up from normal PRNG
12
Hash Function As you can see hash functions are very simple but difficult to decode It takes the key, switches it into a set of numbers and/or letters ( called a hash) and stores the values in a array
13
Skein Hash Function The name Skein refers to how The skin function intertwines the input, similar to a coil of yarn It’s a new family of cryptographic Hash functions (look at next slide) It’s design combines speed, Security, simplicity, and a great deal of flexibility in a modular Package that is easy to analyse
14
Threefish Threefish is in the Skein hash function family Does not use s-boxes, nor does it use any other form of a table look ups It uses addition and exclusive operations to cipher text Key sizes are 256 bits, 512 bits, and 1024 bits
15
Conclusion He writes a blog every month called crypto-gram (http://www.schneier.com/crypto- gram.html) which has around 150, 000 subscribers http://www.schneier.com/crypto- gram.htmlhttp://www.schneier.com/crypto- gram.html Bruce is an expert at what he does, known as one of the best in the world, that’s probably why the Economist gave him the nickname “The Security Guru”
16
References http://www.daylife.com/topic/Bruce_Schnei er/articles http://www.daylife.com/topic/Bruce_Schnei er/articles http://www.daylife.com/topic/Bruce_Schnei er/articles Schneier, Bruce. Moveable Type, www.schneier.com Pictures courtesy of; http://ca.images.search.yahoo.com/image s
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.