Opracowanie językowe dr inż. J. Jarnicki

Slides:



Advertisements
Similar presentations
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
Principles of Information Security, 2nd edition1 Cryptography.
Web Security for Network and System Administrators1 Chapter 4 Encryption.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Chapter 8 Network Security 4/17/2017
Network Security Chapter
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Network Security Chapter 8.
Encryption Methods By: Michael A. Scott
Network Security Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
Internet Engineering Czesław Smutnicki Discrete Mathematics – Cryptography.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Network Security. Information secrecy-only specified parties know the information exchanged. Provided by criptography. Information integrity-the information.
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Crypto Bro Rigby. History
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Chapter 7: Cryptographic Systems
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Network Security Chapter 8 12/13/ Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Network Security. Three tools Hash Function Block Cipher Public Key / Private Key.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Network Security Chapter 8 Institute of Information Science and Technology. Chengdu University YiYong 2008 年 2 月 25 日.
Internet Engineering Czesław Smutnicki Discrete Mathematics – Cryptography.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Reviews Rocky K. C. Chang 20 April 2007.
Security Outline Encryption Algorithms Authentication Protocols
Advanced Computer Networks
Cryptography Why Cryptography Symmetric Encryption
Network Security.
Opracowanie językowe dr inż. J. Jarnicki
Chapter 8 Network Security.
Basic Network Encryption
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-501)
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Chapter 8 Network Security.
PART VII Security.
Security in Network Communications
Security.
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Section 2: Cryptography
Network Security.
Public-Key, Digital Signatures, Management, Security
Basic Network Encryption
Advanced Computer Networks
Network Security Chapter 8.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Opracowanie językowe dr inż. J. Jarnicki Internet Engineering Czesław Smutnicki Discrete Mathematics – Cryptography

CONTENTS DES algorithm Triple-DES algorithm RSA algorithm MD5 algorithm CRC algorithm ssh service

SECURITY IN COMPUTER NETWORKS Cryptography Algorithms with symmetrical keys Algorithms with public (non-symmetrical) keys Digital signature Management of public keys Security of communications Trustworthiness protocols Security of e-mail Security of www Social aspects of computer networks

CRYPTOGRAPHY Introduction: encryption = transformation (bit-after-bit, character-after-character), coding = replacing, open text, algorithm, key, encrypted text, intruder, cryptoanalysis, cryptology Substituting ciphers Transposition ciphers Once-used keys (XOR of data and key) Quantized cryptography: phaeton, polarisation, strigth linear basis, diagonal basis, qubit, once-used key Fundamental rules of cryptography: redundancy, timeliness

ALGORITHMS WITH SYMMETRICAL KEYS P-box, S-box, cascade DES Triple DES AES Encryption modes: coding book, linking of coding blocks, feedback, streaming code, counting method Other coding: IDEA, RC4, RC5, Rijndael, Serpent, Twofish Cryptoanalysis: differential, linear

ALGORITHM WITH SYMMETRICAL KEYS P-box: 8 lines S-box: 3 lines Aggregate (cascade): 12 lines S1 S5 S9 S2 S6 S10 P1 P2 P3 P4 S3 S7 S11 Decoder 8->3 S4 S8 S12 Decoder 3->8 P-box permutation=key cascade: 64 ..256 lines, >18 stages (hardware), >8 (software), 1 stage=iteration=P+S

DES = DATA ENCRYPTION STANDARD open text 64 bits L 32 bits (i-1) P 32 bits (i-1) starting transposition iteration 1 Key 56 bits iteration 2 . L(i) XOR f(P(i-1),K(i)) iteration 16 transposition of 32-bit halves final transposition inverse to starting encrypted data 64 bits L 32 bits (i) P 32 bits (i)

DES cont. L 32 bits (i-1) P 32 bits (i-1) 32 bits 32 bits -> 48 bits indirect key XOR K S-box: in 8 x 6 L(i) XOR f(P(i-1),K(i)) S1 S2 S3 S4 S5 S6 S7 S8 S-box: out 8 x 4 P-box indirect key has been obtained by certain transformation of fundamental key of 56 bits. Applied is so-called whitening operation (additional random keys) L 32 bits (i) P 32 bits (i)

TRIPLE DES 2 keys encryption(K1)-decryption(K2)-encryption(K1)

AES= ADAVANCED ENCRYPTION STANDARD Competition Symmetrical key Public project Keys 128, 192, 256-bits Easily implementable (hardware, software) Free-access licence Rijndael (86), Serpent (59), Twofish (31), RC6 (23), MARS (13)

ALGORYITHM WITH PUBLIC KEYS: RSA Choose two prime numbers p i q Find n=p*q and z=(p-1)*(q-1) Find any d relatively prime with z Find any number e such that (e*d) mod z=1 Public key (e,n) Private key (d,n) Encryption of message P decryption of hiden text C

DIGITAL SIGNATURE Receiver can verify the authentity of Sender signature Sender cannot renege of sending the message with this contents Receiver cannot change the obtained message contents Signature based on symmetric keys (certification institution) Signature based on public keys (secret key theft, changing of secret key) Message shortcut (hashing): MD5, SHA-1,

MANAGEMENT OF PUBLIC KEYS Certificates Standard X.509 Infrastructure of public keys: confidence chain, certfication track, confidence anchors, certificate cancel,

SECURITY OF COMMUNICATION IPsec: transport mode, tunel mode, trafic analysis Firewalls, packet filter, application gateway, DoS attack, DDoS Private virtual networks Security in wireless networks: WEP (RC4), Bluetooth (SAFER+)

TRUSTWORTHINESS PROTOCOLS Trustworthiness on the base of shared secret key Setting shared secret key: key exchange Trustworthiness with the use of key distribution center Trustworthiness based on Kerberos Trustworthiness with the use of public keys

SECURITY OF E-MAIL PGP PEM S/MIME

SECURITY OF WWW Emergences Secure names SSL Security of movable code

SOCIAL ASPECTS OF COMPUTER NETWORKS Privacy protection policy Freedom of a word Intelectual property rigths

Thank you for your attention DISCRETE MATHEMATICS Czesław Smutnicki