Introduction to Encryption Technology

Slides:



Advertisements
Similar presentations
OLE Container Carlotta Eaton Exploring Microsoft Visual Basic 5.0 To insert your company logo on this slide From the Insert Menu Select “Picture” Locate.
Advertisements

Overview of Cryptography Oct. 29, 2002 Su San Im CS Dept. EWU.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
Chapter 31 Network Security
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
CpuScope To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file Click OK To resize the logo Click anywhere.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
History of Windows Data Sharing Carlotta Eaton Exploring Microsoft Visual Basic 5.0 To insert your company logo on this slide From the Insert Menu Select.
WATER SUPPLY AND REALLOCATION CENTER OF EXPERTISE Jan Hotubbee, CESWT-PE-P SAD Water Supply Workshop Wilmington, NC November 3-6, 2003 To insert your company.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
RBA TOP TEN LIST RBA TOP TEN LIST To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file Click OK To resize.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Mort Anvari Introduction to Encryption Technology To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file.
Periodic Trends Mr. Chan Northwestern University To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file.
How OLE Works Carlotta Eaton Exploring Microsoft Visual Basic 5.0 To insert your company logo on this slide From the Insert Menu Select “Picture” Locate.
Bernard A. LaBlank records inc Company Handbook We will help you become a star and go make me a sandwich To insert your company logo on this slide From.
Network Security Celia Li Computer Science and Engineering York University.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Shapes and Patterns ©. 2 nd Row Analogues Phosphaalkenes and -ynes.
Of Teachers teaching pre-16s Language © Shapes and Patterns ©
Security Protecting information data confidentiality
Basics of Cryptography
Unit 3 Section 6.4: Internet Security
1. Public Key Encryption (A Simple Case)
<XYZ Corporation>
<XYZ Corporation>
CPS 512 Distributed Systems
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
e-Health Platform End 2 End encryption
Section 4.6: Digital Signatures
LIVING IN CHRIST Ephesians 2:1-10
WHO ARE YOU? Ephesians 1:1-14
<XYZ Corporation>
Chapter 9 Security 9.1 The security environment
Cryptography.
Encryption
Basic Network Encryption
Dental Office Solutions!
Topic 1: Data, information, knowledge and processing
Presented by: Dr. Munam Ali Shah
Classroom Interventions 4 Chronic Problems
NET 311 Information Security
What do you do when the teacher is with another student ?
Teacher Support Specialist
Lecture 4 - Cryptography
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
Electronic Mail Security
Lecture 10: Network Security.
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Where do you come from? ©.
Strategy VI The Internet.
Basic Network Encryption
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Operating Systems Concepts
Security: Integrity, Authentication, Non-repudiation
Symmetric Encryption or conventional / private-key / single-key
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Shapes and Patterns.
HWKgraphics0.
Presentation transcript:

Introduction to Encryption Technology To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file Click OK To resize the logo Click anywhere inside the logo. The boxes that appear outside the logo are known as “resize handles.” Use these to resize the object. If you hold down the shift key before using the resize handles, you will maintain the proportions of the object you wish to resize. Introduction to Encryption Technology Mort Anvari

Encryption What is it? - The conversion of data into a form that cannot be easily understood by unauthorized people - The opposite is decryption, that is, changing the difficult to read form back into the original - It’s usually software, but can be hardware

Cryptography - What does it do for me? - Symmetric Encryption - Asymmetric Encryption - One Way Hash - Example: An Encrypted E-Mail

What does it do for me? Confidentiality: The data can only be read by the intended recipients Non-Repudiation: The data cannot be forged. If data is “signed” by a person, the data could only have come from them. No more “I didn’t send that!” Data Integrity: The data cannot be modified without detection

Symmetric Encryption - Data is encrypted and decrypted with the same key - Fast - Key must be kept secret - Key must be sent Out of Band - DES and IDEA are symmetric

Asymmetric Encryption - Uses 2 keys - Data encrypted with one key can only be decrypted with the other - Public key is shared with all - Public key can be sent In Band - Private key must be kept secret - RSA is asymmetric

One Way Hash - A “fingerprint” of data - Any size data = same size hash - Tiny changes in data produce a very different hash

Example: Encrypted E-Mail Anne wants to send e-mail to Bob. The plaintext message compressed to make it smaller and the ciphertext stronger. Plaintext Small Plaintext Compression

Example: Encrypted E-Mail The plaintext message is run through a hash algorithm to generate a “fingerprint”. Small Plaintext Hash Function Fingerprint

Example: Encrypted E-Mail The fingerprint is encrypted using Anne’s private key. This makes it into a digital signature. It is then appended to the plaintext. Small Plaintext Anne’s Private Key Fingerprint Signature

Example: Encrypted E-Mail A Random key is generated and the e-mail is symmetrically encrypted using that. Small Plaintext Ciphertext Encrypted with Random Key Random Key Signature

Example: Encrypted E-Mail The Random Key is Encrypted using Bob’s public key. The result is called a “Strong Box”. Remember that only Bob can read the contents of the Box. Bob’s Public Key Random Key A Box for Bob Random Key

Example: Encrypted E-Mail The Box is attached to the ciphertext and they are sent over e-mail to Bob. Random Key A Box for Bob Internet To Bob Ciphertext Encrypted with Random Key

Example: Encrypted E-Mail Bob decrypts his Strong Box to get the Random Key. Only Bob’s private key can open the Box which was encrypted with his public key. Bob’s Private Key Random Key A Box for Bob Random Key

Example: Encrypted E-Mail Bob decrypts the ciphertext using the random key which he got from his Strong Box. Ciphertext Encrypted with Random Key Small Plaintext Signature Random Key

Example: Encrypted E-Mail Bob decrypts Anne’s signature using her public key. Since only Anne could have encrypted it with her private key, Bob knows the message had to come from her. Anne’s Public Key Signature Fingerprint

Example: Encrypted E-Mail Bob runs the unencrypted message through the hash function. If this fingerprint is the same as the one from the signature, the message was not changed in transit. Calculated Fingerprint Small Plaintext Hash Function  or  Received Fingerprint

Example: Encrypted E-Mail Finally, the message is uncompressed. Bob can read the message knowing for certain that it’s from Anne, it’s what Anne wrote and only the two of them could have read it. Plaintext Small Plaintext Compression