Section 2: Cryptography

Slides:



Advertisements
Similar presentations
Conventional Encryption: Algorithms
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 Pertemuan 11 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Network Security Chapter
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Network Security Section 1: Introduction to security.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
DES Attacks and Triple DES
SSL/TLS How to send your credit card number securely over the internet.
Section 3: Public Key, Digital Signature
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
CS480 Cryptography and Information Security
Provides Confidentiality
Opracowanie językowe dr inż. J. Jarnicki
Cryptography Why Cryptography Symmetric Encryption
Triple DES.
e-Health Platform End 2 End encryption
CSCE 715: Network Systems Security
Network Security.
Security.
6b. Practical Constructions of Symmetric-Key Primitives.
Symmetric Algorithm of Cryptography
Chapter 8 Network Security.
Data Encryption Standard
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Encryption
Basic Network Encryption
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Vernam Cipher Group Members: Muhammad Awais Muhammad Hasnain khan
Outline Desirable characteristics of ciphers Stream and block ciphers
- Stream Cipher and Block Cipher - Confusion & Diffusion
Simplified IDEA Cryptography and Network Security.
Lecture 2.2: Private Key Cryptography II
NET 311 Information Security
Cryptography after DES
M3: Encryption r By Andrew Stringer.
Symmetric Key Block Ciphers
Cryptography and Network Security Chapter 3
Chapter 8 Network Security.
Security through Encryption
PART VII Security.
Rivest, Shamir and Adleman
ICS 454: Principles of Cryptography
Security.
Block Ciphers and the Data Encryption Standard (DES)
csci5233 computer security & integrity (Chap. 4)
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Chapter -2 Block Ciphers and the Data Encryption Standard
Network Security.
DES (Data Encryption Standards)
SYMMETRIC ENCRYPTION.
Computer Security IT423 Semester II
Exercise 1: Let’s Communicate - Decrypt The message
Basic Network Encryption
DES (Data Encryption Standard)
Hashing Hash are the auxiliary values that are used in cryptography.
Security: Public Key Cryptography
Triple DES Network Security.
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Advanced Encryption Standard
Cipher-Based MAC Network Security.
Feistel Cipher Structure
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
PGP CSC 492 Presentation May 2, 2007 Brandon Skari Ruby Matejcik.
Presentation transcript:

Section 2: Cryptography Network Security Section 2: Cryptography

2 Cryptography Rules huh!? Right Order! Redundancy What is the solution? Redundancy Cipher text should contain redundancies data Example: Fired Employee! The Couch Potato! huh!? Right Order!

2 Cryptography Rules Valid for 10 sec Freshness Ensure the freshness of every message. Example: Again Fired Employee! Timestamp Valid for 10 sec ----------------------------------------------------------------

Symmetric-Key Algorithms Use one key for encryptions and decryption Has both Hardware and software implementation

Data Encryption Standard (DES) DES Main Function Extend 32 bit to 48 bit XOR E with Ki Send 8 groups to S-box Send to P-Box DES Whitening Generate random key

Triple DES To short DES key length Why 2 keys? Why EDE instead of EEE? Easy transportation Compatibility with pervious version

Example of DES