Presentation is loading. Please wait.

Presentation is loading. Please wait.

Using Cryptography to Protect Data in Computer Networks: case study Vsevolod Ievgiienko National Taras Shevchenko University of Kiev Faculty of Cybernetics.

Similar presentations


Presentation on theme: "Using Cryptography to Protect Data in Computer Networks: case study Vsevolod Ievgiienko National Taras Shevchenko University of Kiev Faculty of Cybernetics."— Presentation transcript:

1 Using Cryptography to Protect Data in Computer Networks: case study Vsevolod Ievgiienko National Taras Shevchenko University of Kiev Faculty of Cybernetics Ukraine

2 Introduction Information security Business Banks Online payments Individual persons

3 Introduction Computer System Reliability Security Safety … Cryptography … …

4 Security Security is considered as a part of reliability and survivability problem “Who watches the watchmen?”

5 Safety Optimization problem  x - system configuration  C - system cost  R - system reliability index  S - system safety index

6 Information security problems T ypes of violations Disconnection Interception Modification Falsification

7 Information security problems Violations Active Passive - imitation- stream analysis - recreation - modification - hindering in service

8 Information security problems System security services Confidentiality Authentication Integrity Impossibility of refuse

9 Algorithms Symmetric (DES, AES, Blowfish, Serpent, Twofish) E – encryption D – decryption К – secret key М – message С – encrypted message

10 Algorithms Asymmetric (RSA, Elgamal, Elliptic Curves Cryptography) E – encryption D – decryption КUx – public key (user X) КRx – private key (user X) М – message С – encrypted message

11 Principles of planning Principle of different types Use a few algorithms of one type that have a different structure

12 Encryption software solution Remote encrypted file system Secret messaging

13 Encryption algorithms RSA with up to 4096-bit keys Digital signatures based on RSA Trusted timestamping X.509 3-steps authentication Blowfish with 448-bit keys SHA-256 and SHA-512 hash functions HMAC-SHA-256 modified ANSI X9.17 pseudo-random numbers generator PKCS5 for making keys from passwords Deflate compression algorithm CRC32 checksums DoD-5220.22-M for data wiping

14 Sources “Reliability: past, present, future”, I. Ushakov “Applied Cryptography”, B. Schneier “Handbook of Applied Cryptography”, A. Menezes, P. van Oorschot, S. Vanstone www.wasm.ru/forum www.pgpru.com www.pgp.com www.gnupg.org www.cipherwall.com http://www.financialcryptography.com http://www.schneier.com

15 THE END Questions? Contacts: E-mail: admin@rest-company.kiev.uaadmin@rest-company.kiev.ua Tel: +38050-3-555-999 ICQ: 333269


Download ppt "Using Cryptography to Protect Data in Computer Networks: case study Vsevolod Ievgiienko National Taras Shevchenko University of Kiev Faculty of Cybernetics."

Similar presentations


Ads by Google