Encryption 10-4-2017.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Encryption Methods By: Michael A. Scott
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Cryptography, Authentication and Digital Signatures
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Lecture 2: Introduction to Cryptography
Intro to Cryptography Lesson Introduction
1.1 Introduction to Cryptography. 1.2 Basic Cryptography Cryptography is a deep mathematical subject. Cryptographic protocols provide a cornerstone for.
Network Security Celia Li Computer Science and Engineering York University.
Computer Security (CS4800)
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
1.1 Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography – Test Review
CS480 Cryptography and Information Security
Message Authentication Code
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
CIT 380: Securing Computer Systems
Key Exchange References: Applied Cryptography, Bruce Schneier
Computer Communication & Networks
Cryptographic Hash Function
Chapter 8 Network Security.
Data Encryption Standard
Information and Network Security
Introduction to security goals and usage of cryptographic algorithms
Data Compression and Encryption
Cryptography.
NET 311 Information Security
Chapter 3:Cryptography (16M)
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 2 Mumtaz Ali Rajput +92 – 301-
Security through Encryption
PART VII Security.
NET 311 Information Security
Security.
Network Security Security Techniques: Encryption & decryption :
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
NET 311 Information Security
Cryptography Reference: Network Security
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Cryptography : Introduction
DISSERTATION ON CRYPTOGRAPHY.
Introduction to Cryptography (1)
Chapter 29 Cryptography and Network Security
Unit 2: Cryptography & Cryptographic Algorithm
Basic of Modern Cryptography
Computer Security Chapter Two
Security Attacks, Mechanisms, and Services
Modern Cryptography.
Basics Of Symmetric Encryption
Cryptanalysis Network Security.
Introduction to Cryptography
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Encryption 10-4-2017

Techniques: The actual implementation of security goals needs some techniques. Two techniques are cryptography steganography

Cont... Cryptography, a word with Greek origin, means “secret writing”. use to transforming messages to make them secure and immune to attacks, in the past cryptography referred only to the encryption and decryption of messages using secret keys Today it is defined as involving three distinct mechanisms: symmetric-key encripherment asymmetric-key encipherment hashing.

Symmetric-key Encipherment In symmetric encipherment, an entity, say Alice, can send a message to other entity, say Bob, over an insecure channel with the assumption that an adversary, say Eve, cannot understand the contents of the message by simply eavesdropping over the channel. Alice encrypts the message using an encryption algorithm. Bob decrypts the message using a decryption algorithm. Symmetric-key encipherment uses a single secret key for both encryption and decryption. In symmetric-key enciphering, Alice puts the message in a box and locks the box using the shared secret key; Bob unlocks the box with the same key and takes out the messages.

SYMMETRIC CIPHER MODEL A symmetric encryption scheme has five ingredients They are Plaintext: This is the original intelligible message or data that is fed into the algorithm as input. 2. Encryption algorithm: The encryption algorithm performs various substitutions and transformations on the plaintext. 3. Secret key: The secret key is also input to the encryption algorithm. The key is a value independent of the plaintext and of the algorithm. The algorithm will produce a different output depending on the specific key being used at the time. The exact substitutions and transformations performed by the algorithm depend on the key.

4. Cipher text: This is the scrambled message produced as output 4. Cipher text: This is the scrambled message produced as output. It depends on the plaintext and the secret key. For a given message, two different keys will produce two different cipher texts. The cipher text is an apparently random stream of data and, 5. Decryption algorithm: This is essentially the encryption algorithm run in reverse. It takes the cipher text and the secret key and produces the original plaintext

Asymmetric Encipherment In asymmetric encipherment, we have the same situation as the symmetric-key encipherment, with a few exceptions. First, there are two keys instead of one; one public key and one private key. To send a secure message to Bob, Alice firsts encrypts the message using Bob’s public key. To decrypts the message, Bob uses his own private key

Hashing In hashing, a fixed-length message digest is created out of a variable- length message. The digest is normally much smaller than the message. To be useful, both the message and the digest must be sent to Bob. Hashing is used to provide check values, which were discussed later in relation to providing data integrity.

Digital Signature

Steganography This is the art of hiding messages in another form. Message is not altered as in encryption. A text can hide a message. For example “red umbrella needed” may mean the message “run”. The first letter of each word in the text becomes the message. An image can also be used for hiding messages.

Authentication model Peer entity authentication: Corroboration of the Identity of two entities participating in communication. Peer entity authentication needs during the data transfer It attempts to provide confidence that an entity is not performing either a masquerade or an unauthorized replay of a previous connection. Data origin authentication: corroboration of the source of a message (sender).

Encryption All encryption algorithms are based on two general principles: Substitution: in which each element in the plaintext is mapped into another element, and Transposition in which elements in the plaintext are rearranged.