Cryptography Presented By: Yogita Dey Amardeep Kahali Dipanjan Devnagar Minhaajuddin Ahmad Khan ECE4, NIT Securing the Information Age.

Slides:



Advertisements
Similar presentations
Cryptography Ch-1 prepared by: Diwan.
Advertisements

1 CS 854 – Hot Topics in Computer and Communications Security Fall 2006 Introduction to Cryptography and Security.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
Principles of Information Security, 2nd edition1 Cryptography.
Web Security for Network and System Administrators1 Chapter 4 Encryption.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
Lecture 23 Cryptography CPE 401 / 601 Computer Network Systems Slides are modified from Jim Kurose & Keith Ross.
Cryptography CSPrinciples II February 12, Needs for Privacy What are some specific needs for privacy when using the internet?
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Cryptography: Securing the Information Age Source: technical.html "If you think cryptography can solve your problem, then you don't.
Image Representation Privacy/Cryptography CS 104 October 3, 2011.
Chapter 8: Scrambling Through Cryptography Security+ Guide to Network Security Fundamentals Second Edition.
Information Systems Security
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
Network Security7-1 Chapter 8: Network Security Chapter goals: r understand principles of network security: m cryptography and its many uses beyond “confidentiality”
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Lecture 2: Introduction to Cryptography
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Secret Key Cryptography
Cryptography – Test Review
A Summary in Fifteen Minutes mas y menos
Chapter 8: Network Security
ISA 400 Management of Information Security
Symmetric Cryptography
Opracowanie językowe dr inż. J. Jarnicki
Data Security B. R. Chandavarkar Asst. Prof., CSE Dept., NITK, Surathkal. brc.nitk.ac.in.
Cryptography Why Cryptography Symmetric Encryption
What is network security?
Cryptographic Algorithms
Security.
Cryptography CS Principles January 19, 2017.
Cryptography.
Chapter 8: Network Security
Cryptography Basics and Symmetric Cryptography
Chapter 3:Cryptography (16M)
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Security through Encryption
PART VII Security.
Security in Network Communications
Introduction to Symmetric-key and Public-key Cryptography
Security.
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Chapter 8: Network Security
Chapter 8: Network Security
Presentation transcript:

Cryptography Presented By: Yogita Dey Amardeep Kahali Dipanjan Devnagar Minhaajuddin Ahmad Khan ECE4, NIT Securing the Information Age

Background Information Security requirements have changed in recent times Traditionally provided by physical and administrative mechanisms Computer use requires automated tools to protect files and other stored information Use of networks and communications links requires measures to protect data during transmission

Need for Information Security Defending against external/internal hackers Defending against industrial espionage Securing E-commerce Securing bank accounts/electronic transfers Securing intellectual property Avoiding liability

Threats to Information Security Pervasiveness of /networks Online storage of sensitive information Insecure technologies (e.g. wireless) Trend towards paperless society Weak legal protection of privacy

Essential Terms Cryptography Encryption (code) Plain text  Cipher text Decryption (decode) Cipher text  Plain text Cryptanalysis Cryptology

Cryptographic Algorithms Symmetric Key or secret key: Involves use of one key. Asymmetric key or public key: Involves use of two keys viz. public and private. Message Digest. Hash Functions.

Symmetric Key Cryptography Same secret key is used by both sender and receiver, which is shared between them. Sender uses the key and an encryption algorithm for encryption. Receiver uses the same key and the corresponding decryption algorithm for decryption.

Traditional Ciphers Substitution Mono alphabetic e.g. Caesar cipher Poly alphabetic e.g. Vigenère cipher, Hill cipher Transposition Scytale Reverse Rail Fence Geometric Row/Column

Modern Ciphers Simple Modern Ciphers XOR Cipher Rotation Cipher S-box (Substitution) P-box (Permutation) Modern Round Ciphers DES (Data Encryption Standard) and derivatives: double DES and triple DES IDEA (International Data Encryption Algorithm) Blowfish CAST-128 RC5 (Rivest Cipher #5) AES (Advanced Encryption Standard)

Two types of symmetric ciphers Stream ciphers – Encrypt one bit at time Block ciphers – Break plaintext message in equal-size blocks – Encrypt each block as a unit

Stream Ciphers Combine each bit of keystream with bit of plaintext to get bit of ciphertext m(i) = i th bit of message k s (i) = i th bit of keystream c(i) = i th bit of ciphertext c(i) = k s (i) m(i) m(i) = k s (i) c(i)

RC5 Stream Cipher Feistel like network Variable block size (32,63 or 128 bits) Key size (0 to 2040 bits) Use of data dependent rotations Really simple 12-round RC5 (with 64-bit blocks) is susceptible to a differential attack using 244 chosen plaintexts

Block Ciphers Message to be encrypted is processed in blocks of k bits (e.g., 64-bit blocks). 1-to-1 mapping is used to map k-bit block of plaintext to k-bit block of ciphertext Example with k=3 input output input output

Data Encryption Standard (DES) US encryption standard designed by IBM [NIST 1993] 56-bit symmetric key, 64-bit plaintext input Block cipher with cipher block chaining 56-bit-key-encrypted phrase decrypted (brute force) in less than a day No known good analytic attack

Data Encryption Standard (DES) initial permutation 16 identical “rounds” of function application, each using different 48 bits of key final permutation DES operation

Advanced Encryption Standard (AES) New (Nov. 2001) symmetric-key NIST standard, replacing DES Based on Rijndael Algorithm Processes data in 128 bit blocks 128, 192, or 256 bit keys Brute force decryption taking 1 sec on DES, takes 149 trillion years for AES

Asymmetric Key Cryptography Here sender and receiver do not share keys. There are two different keys: a private key which is kept by the receiver and a public key that is known to all. Sender uses public key to encrypt and receiver uses the private key to decrypt the message.

RSA (Rivest, Shamir, Adelman) DH (Diffie-Hellman Key Agreement Algorithm) ECDH (Elliptic Curve Diffie-Hellman Key Agreement Algorithm) RPK (Raike Public Key) Public Key Crypto Algorithms

Choose two distinct prime numbers p and q. Compute n = pq Compute φ (n) = (p – 1)(q – 1) Choose an integer e such that 1 < e < φ (n) and e and φ (n) are coprime Determine d = e -1 mod φ (n) e is released as the public key exponent and d is kept as the private key exponent RSA Algorithm

RSA Algorithm (contd.)

A hybrid encryption technology Message is encrypted using a private key algorithm (IDEA) Key is then encrypted using a public key algorithm (RSA) For file encryption, only IDEA algorithm is used PGP is free for home use Pretty Good Privacy (PGP)

Digital Signatures Made by encrypting a message digest (cryptographic checksum) with the sender’s private key Receiver decrypts with the sender’s public key (roles of private and public keys are flipped) Prevents Impostor attacks Content tampering Timing modification

Currently Available Technologies MD4 and MD5 (Message Digest) SHA-1 (Secure Hash Algorithm version 1) DSA (The Digital Signature Algorithm) ECDSA (Elliptic Curve DSA) Kerberos OPS (Open Profiling Standard) VeriSign Digital IDs

Benefits of Cryptographic Technologies Data secrecy Data integrity Authentication of message originator Electronic certification and digital signature Non-repudiation

Potential Problems False sense of security if badly implemented Government regulation of cryptographic technologies/export restrictions Encryption prohibited in some countries All public key schemes are susceptible to brute force attacks…only the work factor varies With decreasing cost of computer power and mathematical discoveries, work factor is decreasing

Remarks Encryption does not guarantee security! Many ways to beat a crypto system NOT dependent on cryptanalysis, such as: Viruses, worms, hackers, etc. TEMPEST attacks Unauthorized physical access to secret keys Cryptography is only one element of comprehensive computer security

Thank You