Download presentation
Presentation is loading. Please wait.
Published byMarybeth May Modified over 9 years ago
1
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification
2
Cryptography Encryption and decryption History of cryptography Conventional cryptography Public key cryptography Key Digital signature Hash function Digital certificates Summary Resources
3
cryptography is the science of using mathematics to encrypt and decrypt data strong/week cryptographically algorithm – cipher cryptanalysis - attackers
4
plaintext encryptiondecryption ciphertextplaintext
5
steganography substitute encryption shift of letters tables Vigneres crypt THISISTHEMESSAGE KEYKEYKEYKEYKEYK ATYEYEATHPHEEQKH.- /..../---/.---
6
secret-key or symmetric-key encryption Data Encryption Standard DAS plaintext encryptiondecryption ciphertextplaintext
7
Key management: fast expensive key useful for not moving date secure the way of the key
8
Asymmetric coding plaintext encryptiondecryption chiphertext plaintext Public key Private key
9
Key management: Solves the problem of key distribution Systems: Elgamal (Tahela Elgamala) RSA(Rivest, Shamir, Adleman) DSA (Digital Signature Algorithm)
10
PGP - private and public key cryptography compresses the plaintext program used for sending E-mails
11
plaintext is encrypted with a session key session key is encrypted with public key cipher text and encrypted session key
12
encrypted messageencrypted session key chipertext recipient’s private key used to decrypt session key session key used to decrypt ciphertext original plaintext
13
big numbers measured in bits public and private keys are mathematically related larger keys - cryptographically secure for a longer period of time very difficult to derive the private key from the public key stored in encrypted form
14
verify that the information is intact authentication and data integrity non-repudiation purpose as a handwritten signature
15
Signing Verifying Public key Private key
16
A one-way hash function takes variable- length message of any length Produces a fixed-length output (160-bits) Ensures that, if the information is changed an entirely different output value is produced
17
plaintext Plaintext + signature Hash function
18
certs changing information about the correct key is a form of credential used to thwart attempts to substitute one person’s key for another
19
A digital certificate consists of three things: public key certificate information (“Identity” information about the user, such as name, user ID, and so on.) one or more digital signatures certificate server
20
certification user ID cerrtificate user ID signature
21
Now you know what is Cryptography Cryptography uses nowadays private or public keys or both Digital signature is like your personal signature Hash function creates something like a fingerprint Digital certificates is like your ID card in the society
23
http://cs.wikipedia.org/wiki/Kryptografie http://cs.wikipedia.org/wiki/Kryptografie http://fisher.osu.edu/~muhanna_1/pdf/crypto.pdf http://fisher.osu.edu/~muhanna_1/pdf/crypto.pdf http://axion.physics.ubc.ca/crypt.html http://axion.physics.ubc.ca/crypt.html http://www.austinlinks.com/Crypto/
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.