رمزنگاری و امضای دیجیتالی

Slides:



Advertisements
Similar presentations
Cryptography Ch-1 prepared by: Diwan.
Advertisements

Public Key Infrastructure and Applications
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Information Security & Cryptographic Principles. Infosec and Cryptography Subjects / Topics : 1. Introduction to computer cryptography 1. Introduction.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
Overview of PKI Perry Tancredi VeriSign, Inc.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Lecture 24 Cryptography CPE 401 / 601 Computer Network Systems slides are modified from Jim Kurose and Keith Ross and Dave Hollinger.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Diffie-Hellman Key Exchange
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Public Key Cryptography July Topics  Symmetric and Asymmetric Cryptography  Public Key Cryptography  Digital Signatures  Digital Certificates.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
PGP Encryption Justin Shelby. Encryption Methods  There are two basic key types for cryptography Symmetric Asymmetric.
May 2002Patroklos Argyroudis1 A crash course in cryptography and network security Patroklos Argyroudis CITY Liberal Studies.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
David Evans CS200: Computer Science University of Virginia Computer Science Class 36: Public-Key Cryptography If you want.
Networks Management and Security Lecture 3.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
The Cryptography Chronicles
Network Security David Lazăr.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture 2: Introduction to Cryptography
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Elliptic Curve Cryptography
Potential vulnerabilities of IPsec-based VPN
14-1 Last time Internet Application Security and Privacy Basics of cryptography Symmetric-key encryption.
Mort Anvari Introduction to Encryption Technology To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
ENGR 101 Compression and Encryption. Todays Lecture  Encryption  Symmetric Ciphers  Public Key Cryptography  Hashing.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
Computer Communication & Networks
Public-Key Cryptography and RSA
Public-key Cryptography
NET 311 Information Security
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Presentation transcript:

رمزنگاری و امضای دیجیتالی فصل چهارم رمزنگاری و امضای دیجیتالی

رمز سزار (Caesar) A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 t h i s a e c r m g . 19 7 8 18 26 4 2 17 12 6 27 Key = 5 24 12 13 23 3 5 9 7 22 17 11 4 Y M N X D F J H W R L E

Symmetric Cryptography (رمزنگاری متقارن) Message (Example: Hello) Message Common key کلید مشترک بین A و B A B Encrypted Message (Example: GH&$ALJK#!@) Encrypt رمزگذاری Decrypt رمزگشایی شنود 3DES, DES, AES, RC2, RC5 Problems: Alice and Bob must agree on the secret key without anyone else finding out Anyone who intercepts the key in transit can later read, modify, and forge all messages encrypted using that key

Asymmetric Cryptography (رمزنگاری نامتقارن) Message (Example: Hello) Message Public key کلید عمومی B Private key کلید خصوصی B A B Encrypted Message (Example: GH&$ALJK#!@) Encrypt رمزگذاری Decrypt رمزگشایی شنود RSA, DSA, ECC, IDEA Problems: Key exchange has to be done in a secure way Encryption and decryption are extremely SLOW

(Example: GH&$ALJK#!@ , GH%$A) رمزنگاری ترکیبی Message (Example: Hello) Message Session key کلید نشست A B تولید کلید متقارن Encrypted Message (Example: GH&$ALJK#!@ , GH%$A) رمزگذاری پیغام با کلید نشست رمزگشایی پیغام با کلید نشست شنود رمزگذاری کلید نشست با کلید عمومی B رمزگشایی کلید نشست با کلید خصوصی B

Hash Functions It was the best of times, it was the worst of times It was the best of thymes, it was the worst of times Small Difference 3au8 e43j jm8x g84w Hash Function b6hy 8dhy w72k 5pqd Hash Function Large Difference Examples: MD5 (128 bit), SHA-1 (160 bit)

Signature & Verification Hashing + Encryption = Signature Creation Message (Example: Hello) Transmitted Message Example: Hello , fg%#e%@d12A Signature B A Message Digest Hash Function Expected Digest Decrypt رمزگشایی با کلید عمومی A Message Digest Hash Function Encrypt رمزگذاری با کلید خصوصی A Signature If these are the same, then the message has not changed Hashing + Decryption = Signature Verification