Cryptography Why Cryptography Symmetric Encryption

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

Digital Signatures. Anononymity and the Internet.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Cryptography, Authentication and Digital Signatures
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
Computer and Network Security - Message Digests, Kerberos, PKI –
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Web Security.
The Secure Sockets Layer (SSL) Protocol
Web Security CS-431.
RSA Laboratories’ PKCS Series - a Tutorial
Digital Signatures.
Cryptography: an overview
Cryptography: an overview
Basics of Cryptography
Security Outline Encryption Algorithms Authentication Protocols
Symmetric and Asymmetric Encryption
Symmetric Cryptography
Opracowanie językowe dr inż. J. Jarnicki
Advanced Computer Networks
Cryptography Much of computer security is about keeping secrets
Computer Communication & Networks
e-Health Platform End 2 End encryption
Security.
Chapter 8 Network Security.
SSL Implementation Guide
Cryptography and Security Technologies
Cryptography.
Presented by: Dr. Munam Ali Shah
M3: Encryption r By Andrew Stringer.
Cryptography Basics and Symmetric Cryptography
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
Asymmetric Cryptography
PART VII Security.
Security in Network Communications
Network Security – Kerberos
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
Introduction to Symmetric-key and Public-key Cryptography
Security.
CS Introduction to Operating Systems
The Secure Sockets Layer (SSL) Protocol
Cryptography: an overview
Protocol ap1.0: Alice says “I am Alice”
Section 2: Cryptography
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Chapter 29 Cryptography and Network Security
Advanced Computer Networks
Fluency with Information Technology Lawrence Snyder
Security in Distributed Systems
Introduction to Cryptography
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Cryptography Why Cryptography Symmetric Encryption Key exchange Public-Key Cryptography Key exchange Certification

Why Cryptography General Security Goal - Confidentiality - Authentication - Integrity - Availability - Irrefutable (not mention in this book)

Cryptography - general To send messages over e network, which is unable to understand for a third part General technique: Plain text Encode (algorithm and key) Cipher text (send over the network) Decode (algorithm and key)

Cryptography - coding Old days simple letter transformation e.g. c for an a and d for a b and so on To day Symmetric key Public-private keys

Cryptography - Symmetric Using the same key to encode and decode Which goal are fulfilled ? Confidentiality Authentication Integrity Availability Irrefutable Confidentiality – yes Authentication - yes Integrity - yes - Availability - no - Irrefutable - perhaps

Cryptography - Symmetric Implementations: DES (Data Encryption Standard)– most known today modified to triple DES key length 64bit (3*64 bit) (round 10 min) to day even 128 bit (round 1000 billion year) Other IDEA, RC5

Cryptography - Symmetric Key exchange: Problem to exchange the key - we can not send it with a mail - then it would not be secret any longer Using a Key Distribution Center (KDC) - I have an agreement with the KDC and with this an secret key. - So have all I communicate with. (see figure 2.10).

Cryptography - Symmetric Windows use Symmetric key in an implementation called Kerberos: All like KDC but you get grant (a key) to a resource for a certain time (all called a ticket)

Cryptography Asymmetric Using the different keys to encode and decode You always have a pair of keys a public key and a private key If you encode with a public key – you must decode with a private key If you encode with a private key – you must decode with a public key

Cryptography Asymmetric Which goal are fulfilled from A to B (B public Key)? Confidentiality Authentication Integrity Availability Irrefutable Confidentiality – yes Authentication - no Integrity - no - Availability - no - Irrefutable - no

Cryptography Asymmetric Which goal are fulfilled from A to B (A private Key)? Confidentiality Authentication Integrity Availability Irrefutable Confidentiality – no Authentication - yes Integrity - yes - Availability - no - Irrefutable - no

Cryptography Asymmetric Can we fulfilled both Confidentiality and Authentication / Integrity and (Irrefutable) YES – encode with A private key and then with B public key

Cryptography Asymmetric Implementations: RSA – most known key length recommended 1024bit

Cryptography Asymmetric Key exchange: Problem to exchange the key - public key are public to everyone - But do we believe the sender of the key Using Certification - I believe in some Certification Authorities e.g. VeriSign, Thrust, (in DK TDC) - get the public key from one of those trusted third part companies.

Cryptography Asymmetric To fulfilled the goal you must encode 2 times (A private and B public) A more easy way is to create a Message Digest (MD) a sort of a checksum (Digital Signature) And this ‘checksum’ are encoded with A’s private key. Then the hole message + the MD are encoded with B’s public key

Cryptography Mixed Using asymmetric keys to exchange a symmetric key for rest of this session. This increase the speed of encryption and decryption.