Presentation is loading. Please wait.

Presentation is loading. Please wait.

Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.

Similar presentations


Presentation on theme: "Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification."— Presentation transcript:

1 Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification

2  Cryptography  Encryption and decryption  History of cryptography  Conventional cryptography  Public key cryptography  Key  Digital signature  Hash function  Digital certificates  Summary  Resources

3  cryptography is the science of using mathematics to encrypt and decrypt data  strong/week  cryptographically algorithm – cipher  cryptanalysis - attackers

4 plaintext encryptiondecryption ciphertextplaintext

5  steganography  substitute encryption  shift of letters  tables  Vigneres crypt THISISTHEMESSAGE KEYKEYKEYKEYKEYK ATYEYEATHPHEEQKH.- /..../---/.---

6  secret-key or symmetric-key encryption  Data Encryption Standard DAS plaintext encryptiondecryption ciphertextplaintext

7 Key management:  fast  expensive key  useful for not moving date  secure the way of the key

8  Asymmetric coding plaintext encryptiondecryption chiphertext plaintext Public key Private key

9 Key management:  Solves the problem of key distribution Systems:  Elgamal (Tahela Elgamala)  RSA(Rivest, Shamir, Adleman)  DSA (Digital Signature Algorithm)

10  PGP - private and public key cryptography  compresses the plaintext  program used for sending E-mails

11 plaintext is encrypted with a session key session key is encrypted with public key cipher text and encrypted session key

12 encrypted messageencrypted session key chipertext recipient’s private key used to decrypt session key session key used to decrypt ciphertext original plaintext

13  big numbers measured in bits  public and private keys are mathematically related  larger keys - cryptographically secure for a longer period of time  very difficult to derive the private key from the public key  stored in encrypted form

14  verify that the information is intact  authentication and data integrity  non-repudiation  purpose as a handwritten signature

15 Signing Verifying Public key Private key

16  A one-way hash function takes variable- length message of any length  Produces a fixed-length output (160-bits)  Ensures that, if the information is changed an entirely different output value is produced

17 plaintext Plaintext + signature Hash function

18  certs  changing information about the correct key  is a form of credential  used to thwart attempts to substitute one person’s key for another

19 A digital certificate consists of three things:  public key  certificate information (“Identity” information about the user, such as name, user ID, and so on.)  one or more digital signatures  certificate server

20 certification user ID cerrtificate user ID signature

21  Now you know what is Cryptography  Cryptography uses nowadays private or public keys or both  Digital signature is like your personal signature  Hash function creates something like a fingerprint  Digital certificates is like your ID card in the society

22

23  http://cs.wikipedia.org/wiki/Kryptografie http://cs.wikipedia.org/wiki/Kryptografie  http://fisher.osu.edu/~muhanna_1/pdf/crypto.pdf http://fisher.osu.edu/~muhanna_1/pdf/crypto.pdf  http://axion.physics.ubc.ca/crypt.html http://axion.physics.ubc.ca/crypt.html  http://www.austinlinks.com/Crypto/


Download ppt "Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification."

Similar presentations


Ads by Google