Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptography Ch-1 prepared by: Diwan.
Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Principles of Information Security, 2nd edition1 Cryptography.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Network Management and Security
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption Methods By: Michael A. Scott
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
1st Class Discrete Structures الهياكل المتقطعة أستاذة المادة: م. م
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
ITMS – 3153 Information Systems Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Computer Security (CS4800)
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Chapter Two: Classic Cryptography
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
COMPUTER AND NETWORK SECURITY First of all, an introduction to the field of computer security and some of relevant issues are presented. Then, a background.
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Basics of Cryptography
Chapter 2 Basic Encryption and Decryption
Encryption
Cryptography.
CSCI-235 Micro-Computer Applications
Outline Some Basic Terminology Symmetric Encryption
Chapter 3:Cryptography (16M)
Simple Encryption- Lesson 5
DISSERTATION ON CRYPTOGRAPHY.
Digital Communications
Computer Security Chapter Two
Basics Of Symmetric Encryption
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Using Cryptography to Secure Information

Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption / Asymmetric Encryption

Lesson: Introduction to Cryptography What Is Cryptography? What Are Algorithms? What Are Keys? Common Uses of Cryptography

What Is Cryptography? Cryptography is a set of techniques used to encode and decode information Ciphertext hides information in a message while it is transferred from one location to another or while stored Ciphertext hello Encryption Decryption Plaintext *A%$q

Services Confidentiality: prevents others from reading the information Integrity checking: reassuring that the information has not been altered since it was generated Authentication: verifying someone's (or something's) identity

Terminology Encryption/Decryption: o encode/decode: translating entire words or phrases o encipher/decipher: translating letters of symbols individually Plaintext/Ciphertext Key Cryptosystem Cryptography / Cryptanalysis Cryptology

Terminology Encryption is the process of encoding a message so that its meaning is not obvious; decryption is the reverse process, transforming an encrypted message back into its normal, original form. we say that we encode, encrypt, or encipher the original message to hide its meaning. Then, we decode, decrypt, or decipher it to reveal the original message. A system for encryption and decryption is called a cryptosystem.

Algorithm (Plaintext) = Ciphertext What Are Algorithms? You can publish algorithms or keep them secret Multiple users can use the same algorithm to encrypt or decrypt multiple data sources AlgorithmPlaintextCiphertext Advance 2 spacesAC KM Examples e=f(m) Algorithms are mathematical formulas to encrypt or decrypt data

Encryption Algorithms The cryptosystem involves a set of rules for how to encrypt the plaintext and how to decrypt the ciphertext. The encryption and decryption rules, called algorithms, often use a device called a key, denoted by K, so that the resulting ciphertext depends on the original plaintext message, the algorithm, and the key value. We write this dependence as c = e k ( m ) Essentially, e is a set of encryption algorithms, and the key k selects one specific algorithm from the set. We see later in this chapter that a cryptosystem such as the Caesar cipher is keyless but that keyed encryptions are more difficult to break. An encryption algorithm, or cipher, is a means of transforming plaintext into ciphertext, under the control of a secret key. This process is called encryption or encipherment. given c depends totally on the secrecy of k.

c = e k ( m ) m is the plaintext, e is the cipher function, k is the secret key, c is the ciphertext. The reverse process is called decryption or decipherment, and we write m = d k ( c ) d is the decipher function, Note, that the encryption and decryption algorithms e, d are public, the secrecy of m given c depends totally on the secrecy of k.

Symmetric Cryptosytem the encryption and decryption keys are the same, This form is called symmetric encryption because d and e are mirror-image processes

What Are Keys? Keys are normally secret Key length and complexity influence the strength of encryption A key is a string of bits that is used to vary the results of an algorithm Algorithm and Key (Plaintext) = Ciphertext Algorithm and Key (Plaintext) = Ciphertext Examples AlgorithmKeyPlaintextCiphertext Advance x spaces3AD 5AF

Three Techniques in Encryption Shift Cipher each letter is translated to a letter a fixed number of places after it in the alphabet. ( Caesar Cipher ) Substitution One symbol is exchanged for another, This technique is called a monoalphabetic cipher or simple substitution. only one alphabet substitution was used to encrypt the whole alphabet. Polyalphabetic substitution cipher, encrypt each letter with a different alphabet ( Vigenere Cipher ) Transposition (Permutation) The order of the symbols is rearranged

Shift Cipher The Caesar Cipher: A shiff of 3: c i =e(m i )=( m i +3 ) mod 26 Plaintext ABCDEFGHIJKLMNOPQRSTUVWXYZ Ciphertext defghijklmnopqrstuvwxyzabc Using this encryption, the message PLEASE CALL ME would be encoded as PLEASE CALL ME S …….. There are only 26 possible keys, so the time for this exhaustive key search is very small.

Shift Cipher i=7 c i =e(m i )=m i +7 Using above encryption algorithm, encrypt this message, HELLO