Crypto in information security

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Intro 1 Introduction Intro 2 Good Guys and Bad Guys  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Lecture 23 Symmetric Encryption
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
Cryptography, Authentication and Digital Signatures
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Public Key Encryption.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Lecture 23 Symmetric Encryption
Intro to Cryptography Lesson Introduction
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Computer Security (CS4800)
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Security Protecting information data confidentiality
CIT 380: Securing Computer Systems
ISA 400 Management of Information Security
Symmetric Cryptography
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
e-Health Platform End 2 End encryption
What is network security?
Chapter 8 Network Security.
Encryption
Basic Network Encryption
Introduction to security goals and usage of cryptographic algorithms
Cryptography.
CSCI-235 Micro-Computer Applications
Presented by: Dr. Munam Ali Shah
Cryptography Basics and Symmetric Cryptography
Chapter 3:Cryptography (16M)
Security through Encryption
PART VII Security.
Security in Network Communications
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
Introduction to Symmetric-key and Public-key Cryptography
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
DISSERTATION ON CRYPTOGRAPHY.
Chapter 29 Cryptography and Network Security
Unit 2: Cryptography & Cryptographic Algorithm
Basic of Modern Cryptography
Hashing Hash are the auxiliary values that are used in cryptography.
Computer Security Chapter Two
Symmetric Encryption or conventional / private-key / single-key
Chapter Goals Define cryptography
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Crypto in information security Elmira ebrahimi, nazanin bayati, mona porbidei, shaghayegh arabnia Teacher:ms.raeisian Fall2015 Shariaty technical college

Introduction Developing in computer network Secure data???? Crypto via key The Roman Empire Most users, especially "encrypt information, Governments and military users

Information security The protection of information and information systems from unauthorized activities reach out, Disclosure, read, copy or record, manipulate, change, wreck.

Information security Significant impact on the privacy of information security Fields can work: Securing networks and Infrastructure securing applications and data bases security testing auditing and information systems program review Planning the continuation of trade and reviews of electronic crimes, etc.

Base concepts As the definition of information security, privacy, integrity means and availability information from unauthorized individuals

"Availability" "integrity“ "Confidentiality"

availability The information should be when needed by authorized persons are available

integrity Integrity means that the data will prevent unauthorized change detection and change the information in the event of unauthorized tampering

Confidentiality means that prevent information disclosure to unauthorized individuals In credit card, card number is encrypted Privacy breach Like s.o. look at your data or send your data by mobile

Access control To secure information Limited to authorized people Higher secure higher mechanism Mechanism use authorization

authorization What u are? What u have? What u know?

Science of Encryption Encryption Decryption

Science of encryption The science of codes and passwords Need to prove the identity of the sender and the recipient The message In the meantime Should not change the content of the message to make sure

Encryption The operational initial data using an algorithm and a key becomes a non-understandable text no access to key, access to information from the encrypted text is impossible

decryption A device or program that encrypted data returns to the first State The change of non-readable codes to text readable

Applications of cryptography Credit card information The issue of membership in the forums Private information Details of the personal information Sensitive information in an organization Information relating to bank accounts

Crypto Cryptography  making “secret codes” Cryptanalysis  breaking “secret codes” Crypto  all of the above (and more) 17

Definitions of cryptography (plaintext) (Ciphertext) (key) 18

Algorithms Basic assumption This is known as Kerckhoffs’ Principle The system is completely known to the attacker Only the key is secret That is, crypto algorithms are not secret This is known as Kerckhoffs’ Principle Why do we make this assumption? 19

History 20

Simple Substitution Ciphertext: Khoor Jxbv Shift by 3 Plaintext HELLO GUYS Key: a b c d e f g h i j k l m n o p q r s t u v w x y D E F G H I J K L M N O P Q R S T U V W X Y Z A B z C Plaintext Ciphertext Ciphertext: Khoor Jxbv Shift by 3 21

Caesar’s cipher http://enigma.louisedade.co.uk/howitworks.html 22

Double Transposition 23

One-time Pad: Encryption e=000 h=001 i=010 k=011 l=100 r=101 s=110 t=111 24

Taxonomy of Cryptography Symmetric Key Same key for encryption and decryption Two types: Stream ciphers _ like a one-time pad, Block ciphers Public Key (or asymmetric crypto) Two keys, one for encryption (public), and one for decryption (private) Also, digital signatures  nothing comparable in symmetric key crypto Hash algorithms Sometimes viewed as “one way” crypto 25

Symmetric Key Crypto Stream Ciphers Once upon a time, the king of crypto Today, not as popular as block ciphers A5/1 Based on shift registers Used in GSM mobile phone system 26

A5/1 maj(x8, y10, z10)     X Y Z 27 x0 x1 x2 x3 x4 x5 x6 x7 x8 x9

Block Ciphers Plaintext and ciphertext consist of fixed-sized blocks Ciphertext obtained from plaintext by iterating a round function Input to round function consists of key and the output of previous round Usually implemented in software Data Encryption Standard(DES) Advanced Encryption Standard(AES) 28

Public Key Cryptography Two keys Sender uses recipient’s public key to encrypt Recipient uses private key to decrypt Based on “trap door one way function” RSA is the gold standard in public key crypto 29

Hash Function Crypto hash function h(x) must provide Compression output length is small Efficiency h(x) easy to compute for any x One-way given a value y it is infeasible to find an x such that h(x) = y 30

Visual Cryptography If a pixel is black, randomly choose c or d If a pixel is white, randomly choose a or b for Alice’s/Bob’s shares If a pixel is black, randomly choose c or d no info from one share 31

منابع http://wikipedia.org/wiki/(computer_security) www.irannetbook.com Wikipedia hit.mums.ac.ir www.sarzaminDownload.com www.certcc.ir

Question ??

Thanks For Listening