CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Information Systems Security
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography, Authentication and Digital Signatures
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Chapter 7: Cryptographic Systems
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
1 Thuy, Le Huu | Pentalog VN Web Services Security.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Cryptology aka Cryptography Tim Cahill Ryan Church.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Security Using Armstrong Numbers and Authentication using Colors
Basics of Cryptography
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
Encryption
Cryptography.
Chapter 3:Cryptography (16M)
Security.
Install AD Certificate Services
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Unit 2: Cryptography & Cryptographic Algorithm
Basic of Modern Cryptography
Computer Security Chapter Two
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original form

TERMINOLOGIES -Encryption(Enciphering) :Process of encoding the message so that meaning is not obvious or not in understandable form -Decryption(Deciphering): Reverse process of encryption -Plaintext: The original form of the message - Cipher text: Disguised(encrypted) message

Key : Critical (secret) information used in cipher and known only to sender and receiver Symmetric – Shared key Asymmetric – Public key Code: Algorithm used for transforming the intelligible (plain text) to unintelligible (cipher text) Cipher: Is algorithm /Code used for transforming plaintext to cipher text Cryptanalysis (Code breaking): Study of method for transforming cipher text to plaintext without having knowledge of any key Cryptology : Area of cryptography and cryptanalysis together is called as cryptology

OBJECTIVES Availability : Ensures the availability of desired resource Confidentiality : only sender and receiver can understand the message Integrity: Sender and receiver may have provision to check the integrity of data & get themselves ensured that message is not altered Anonymity : Ensures the privacy of the origin of data Authenticity : Sender or receiver want to confirm the identity of each other and may be possible they would access some service after giving there authentication Authorization: Access to the resources are authorized

TWO TYPES OF ENCRYPTION TWO TYPES OF ENCRYPTION SYMMETRIC - Symmetric key cryptography Is also termed as private or secret key encryption because secret key is shared between sender and receiver ASYMMETRIC- Two keys are involved in asymmetric encryption. One key is used by sender to encrypt the data and other by receiver to decrypt the data

Cryptographic Techniques All cryptographic algorithms are based on following two techniques- Substitution, Transposition (Permutation) Substitution Technique: Is one in which the letters of the plaintext are replaced by other letters (i.e. Fixed symbols or alphabets) Transposition Technique: Method of disguising text or alphabet by shuffling or exchanging their position

PUBLIC KEY CRYPTOGRAPHY Asymmetric key cryptography. Two keys Public, Private. PUBLIC key is used by the sender. PRIVATE key is available to the reciever only. Both the keys are related based on complex mathematical formulas. There needs to be some methods for transferring PUBLIC keys. Example- X.509 Digital Certificates.

DIGITAL CERTIFICATES DIGITAL CERTIFICATES Intended for AUTHENTICATION purpose. A certificate is a file of information that identifies a user and its details like organisation name, organisation issuing the certificate, address. Certificate is send as a reply when the client /server sends a query to start a connection. The other party’s public key can be extracted. To create it a PUBLIC KEY INFRASTRUCTURE (PKI) is required.

PKI PKI It is a framework that consists of hardware;software;policies that exist to manage, create, store, and distribute keys IMPORTANT PARTS OF PKI  Digital certificates  Certificate authorities  Certificate generation and destruction  Key management

CRYPTOGRAPHIC ALGORITHMS CRYPTOGRAPHIC ALGORITHMS MD5 (Message Digest 5) SHA (Secure Hash Algorithm) RC4 RC5 MAC (Message authentication Code) HMAC