Software Security Seminar - 1 Chapter 10. Using Algorithms 2002. 10. 10. 발표자 : 이장원 Applied Cryptography.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Cryptography encryption authentication digital signatures
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints Adapted from the notes By Lami Kaya, © 2009 Pearson Education.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Security (Part 2) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 13, Thursday 4/5/2007)
Cryptographic Technologies
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
CS1001 Lecture 24. Overview Encryption Encryption Artificial Intelligence Artificial Intelligence Homework 4 Homework 4.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
1 PIN Security Management and Concerns Susan Langford Sr. Cryptographer CACR Information Security Workshop.
Network Security Chapter
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Chapter 3 – Computer Hardware Computer Components – Hardware (cont.) Lecture 3.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
System Software System software deals with the physical complexities of how the hardware works. System software generally consists of four kinds of programs:
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Chapter Ten The Application and Presentation Layers.
Types of Electronic Infection
Smart Card Technology & Features
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Chapter 15: Electronic Mail Security
Darci Miyashiro Math 480 April 29, 2013
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Network Security David Lazăr.
Chapter 7: Cryptographic Systems
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Pretty Good Privacy (PGP) Security for Electronic .
SECURITY – Chapter 15 SECURITY – Chapter 15 ….for authentication and confidentiality PGP 1.Uses best algorithms as building blocks 2.General.
Security School of Business Eastern Illinois University © Abdou Illia, Fall 2002 (Week 12, Wednesday 11/13/2002)
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Software Security Seminar - 1 Chapter 10. Using Algorithms 조미성 Applied Cryptography.
Overview of Cryptography & Its Applications
Privacy and Integrity: “ Two Essences of Network Security” Presenter Prosanta Gope Advisor Tzonelih Hwang Quantum Information and Network Security Lab,
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Mort Anvari Introduction to Encryption Technology To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Windows 95/98 Installation and Configuration Presented by Hua Wei.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Part 1  Cryptography 1 Integrity Part 1  Cryptography 2 Data Integrity  Integrity  detect unauthorized writing (i.e., modification of data)  Example:
PGP Desktop (Client only) By: Courtney Wirtz & Vincent Verner.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Attacks on Public Key Encryption Algorithms
ONLINE SECURE DATA SERVICE
Introduction to Encryption Technology
Presentation transcript:

Software Security Seminar - 1 Chapter 10. Using Algorithms 발표자 : 이장원 Applied Cryptography

Software Security Seminar - 2 Contents 10.5 Hardware Encryption vs Symmetric Cryptography 10.6 Compression, Encoding, and Encryption 10.7 Detecting Encryption 10.8 Hiding Ciphertext in Ciphertext 10.9 Destruction Information

Software Security Seminar - 3 Hardware Encryption vs Symmetric Cryptography  Speed - Encryption algorithm (DES, RSA) run inefficiently on general- purpose processors  Security - Encryption algorithm has no physical protection Hardware VLSI chips : coated with chemical Clipper & Capstone Chips : designed to be tamperproof [24] IBM’s Cryptographic system : include tamper-resistant modules to hold keys.[24]

Software Security Seminar - 4 Hardware Encryption vs Symmetric Cryptography(conti.)  Ease of installation - cheaper to put special-purpose encryption hardware in the telephone, fax, & modem than to put in a microprocessor & software - easier to install a dedicated hardware encryption device than to modify the computer’s system software Hardware(conti.)

Software Security Seminar - 5 Hardware Encryption vs Symmetric Cryptography(conti.)  Three basic kinds of encryption hardware Hardware(Conti.) Self contained encryption module : perform functions such as password verification and key management for banks Dedicated encryption boxes for communications links  T-1 encryption boxes  Newer boxes : accept higher bit rate and more versatile

Software Security Seminar - 6 Hardware Encryption vs Symmetric Cryptography(conti.)  Three basic kinds of encryption hardware Hardware(Conti.) Board : plug into PC  PC-Board encryptor usually encrypt everything written to the hard disk and can be configured to encrypt everything sent to the floppy disk and serial port as well  Not shielded against electromagnatic radiation or physical interference

Software Security Seminar - 7 Hardware Encryption vs Symmetric Cryptography(conti.)  Disadvantage : Speed, Cost, Ease of Modification(Manipulation)  Advantage : Flexibility, Portability, Ease of Use and Upgrade  Operating Systems Software

Software Security Seminar - 8 Compression, Encoding, and Encryption Compressing a file before encryption reduces redundancy. Compressing a file before encryption speeds up the entire process.  Data compression algorithm  Add any type of transmission encoding, or error detection and recovery Add that after encryption.  Decryption after Error Control

Software Security Seminar - 9 Detecting Encryption Rely on the fact that most popular encryption programs have well- defined header : Electronic-mail message encrypted with either PEM or PGP. How distinguishing the ciphertext from seemingly random bits?  How detecting an encryptied file ? - Examine the file 1)ASCII file : easy to spot 2)TIFF, TeX, C, …, Executable code : standard identifying characteristics 3)Unix files : magic number - Try to uncompress the file - Try to compress the file

Software Security Seminar - 10 Hiding Ciphertext in Ciphertext −Use one-time pad : P : plaintext, D : dummy plaintext, C : ciphertext K : real key, K ’ : dummy key Alice : encrypt P + K= C A & Bob : share K B : decrypt C + K= P A & B : surrender K ’ = C + D Police : recover the dummy plaintext C + K ’ = D WIBN to be able encrypt a file s.t there are two possible decryptions each with a different key.

Software Security Seminar - 11 Destruction Information -To erase a file so that file-recovery software cannot read it, physically write over all of the file’s bits on the disk. -Most commercial programs : overwriting three times