Cryptography. Survey Results -More than 50% students or someone they know purchase goods, use banking, access or give out personal information online.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

UNM Information Assurance Scholarship for Service (SFS) Program.
Management Information Systems Lection 05 Coding and encryption CLARK UNIVERSITY College of Professional and Continuing Education (COPACE)
Crytography Chapter 8.
Security & Encryption Thomas Fenske & Joseph Minter.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Chapter 17 Controls and Security Measures
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
[[ NET-CENTRIC CAPABILITIES TURBULENCE TECHNICAL OVERVIEW : AUGUST 2007 ]] MATH CAREERS AT NATIONAL SECURITY AGENCY Jill Calhoun May 2010.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
MS in Information Systems & Assurance (MS-ISA) Stephen D. Burd Anderson School of Management & UNM Center for Information Assurance Research and Education.
Technology Awareness & Information Security. Survey Results 50% class has smart phones 64% class has shared personal info over the internet 71% class.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
University of Tulsa - Center for Information Security Center for Information Security: An Overview October 4th, 2002.
Introduction Cryptography: process of making and using codes to secure transmission of information Encryption: converting original message into a form.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Cryptography By, Anthony Lonigro & Valentine Mbah.
ECE Lecture 1 Security Services.
I NTRODUCTION TO C RYPTOLOGY Cryptoanalysts, Encryption, and Decryption.
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Information Security and Secret Messages. Agenda Information Assurance Program Value of Information Secret Messages –Steganography –Caesar Cypher –Keyword.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Public Key Encryption.
Center for Cybersecurity Research and Education (CCRE)
CIS 325: Data Communications1 Chapter Seventeen Network Security.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
CSCI-235 Micro-Computers in Science Privacy & Security.
Some of these PowerPoint pages were created by my friend Shawna Haider.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Department of Computer and Information Sciences
Mission Davenport University prepares and transforms students to achieve the highest levels of academic performance, leading them to excel and advance.
Crypto in information security
Associate Degree in Cyber security
Cryptography.
Wiretapping and Encryption
Virginia Union University
Chapter 3:Cryptography (16M)
UNM Information Assurance Scholarship for Service (SFS) Program
Unit 2: Cryptography & Cryptographic Algorithm
UNM Information Assurance Scholarship for Service (SFS) Program
Computer Security Chapter Two
UNM Information Assurance Scholarship for Service (SFS) Program
Presentation transcript:

Cryptography

Survey Results -More than 50% students or someone they know purchase goods, use banking, access or give out personal information online -79% students use social networking website such as MySpace and Facebook -More than 50% students spend more than 2 hours everyday in the internet -85% students agree that internet security is concern of EVERYONE

Video -Sheldon's World of Warcraft character hacked - big-bang-theoryhttp://gawker.com/ /sheldons-world-of-warcraft-character-hacked-on-the- big-bang-theory

Security Threats

Recent News -Credit Card Breach at Home Depot and Target -Identity theft -Big Data

Encrypt - en·crypt (n-kr pt) tr.v. en·crypt·ed, en·crypt·ing, en·crypts. 1.To put into code or cipher. 2.Computer Science To alter (a file, for example) using a secret. Code - symbol or signal used to represent or communicate something-else Cryptosystem - consists of three algorithms Key Generation Encryption Decryption Encryption Terminology

Encryption -Terminolgy Cipher or Cypher- any method of transforming a message to conceal its meaning. –ciphertext or cryptogram is the encrypted form of the message. –Plain or clear text refers to either unencrypted text or successfully decrypted text. Key – used to decrypt or de-cypher the encrypted message.

Encryption Methods Bit stream Block ciphering Symmetric Asmmetric Hybrid - In practice Ciphers Substitution ciphers Transposition ciphers XOR function Veignere cipher Vernam cipher

Uses in History

Hashing Hashing is the transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string.

Demo - HashCalc HashCal- compute multiple hashes, checksums and HMACs for files, text and hex strings

Cipher Wheel Spies Like Us - Decipher it LA Noir - The Secret MessageLA Noir - The Secret Message Ceasar’s Cipher. Substitution Cipher created by Julius Ceasar. Also known as a shift Cipher ACTIVITY: Let’s make a code wheel!

Demo-Cipher Wheel Encode H=Q we are cool spies cipher is fun Decode I=L PHHW PH DW QRRQ DOEXTXHUTXH ERWDQLFDO JDUGHQ

NSA - CRYPTOKIDS AMERICA’S FUTURE CODEBREAKERS

More Resources PBS: How Enigma Works: Cryptology - Purdue: 12/teaching_resources/lessons_presentations/cryptology.htmlhttp:// 12/teaching_resources/lessons_presentations/cryptology.html Crypto Museum: NSA- CryptoKids America The NSA/CSS core missions are to protect U.S. national security systems and to produce foreign signals intelligence information.

Applications Digital Certificates: certifies the ownership of a public key by the named subject of the certificate. Main providers: Symantec (VeriSign), Comodo SSL, Go Daddy, GlobalSign

Issues with Digitial Certificate In 2010, VeriSign is hacked Comodo is hacked in 2009 and 2011 Hackers issued digitial certificates to one or more unauthorized parties

Applications (cont.) Digital Signatures

Applications (cont.) Passwords

IA Program at UNM Information Systems (IS) is a discipline that bridges business and computer science. IS professionals contribute to organizations in many ways including: –Planning an organization's technology-related strategy and infrastructure –Acquiring, developing, and managing computer hardware, networks, software, and related services –Developing and managing an organization's databases –Analyzing data to improve an organization's marketing, operations, and strategic planning

MS-ISA Program Targeted at students with an undergraduate degree in one of the following fields: –Accounting –Computer science (CS) or computer-related engineering –Information systems (IS) or information technology (IT) Areas of Study –Cybersecurity and information assurance –Data analytics (Big data) –Database management and data warehousing –Fraud, white collar crime and digital & financial forensics –Information system acquisition, development, and management –System & network administration and security

Why choose IA at UNM Information Assurance Program at UNM Anderson An AACSB accredited program A designation from the National Security Agency (NSA) and the Department of Homeland Security (DHS) as a center of academic excellence in IA education and research A partnership with the FBI and its Regional Computer Forensics Lab (RCFLA designation from the National Security Agency (NSA) and the Department of Homeland Security (DHS) as a center of academic excellence in IA education and research A partnership with the FBI and its Regional Computer Forensics Lab (RCFL), housed at UNM, through training, and student internships and co-ops.RCFLUNM A partnership with the Department of Energy's first satellite office for the Center for Cyber Defenders through Sandia National Laboratories. Center for Cyber Defenders The Metro Law Enforcement Internship program

Scholarship Program UNM Information Assurance Scholarship for Service Program Pursue a Master's degree in Information Assurance at UNM. Scholarship pays all costs for three semesters: $2000 per month stipend, all tuition & fees, book allowance, travel allowance. Customize the degree program to your background and career goals: computer & network security, computer forensics, white collar crime, auditing, and compliance. Complete a summer internship with a Federal agency in Washington, D.C.

What you can do while in school Competitions: National Collegiate Cyber Defense Competition (CCDC) and Computer and Network Vulnerability Assessment Simulation (CANVAS) Get involved with student organization - Network Exploitation Security Team (NEST)

Career Path Work for government –Department of Defense –National Security Agency –Department of Commerce –Department of Energy –Department of Homeland Security Jobs’ titles –Computer Security Specialist –Database Administrators –Computer and Information Scientists –Computer Support Specialists –Network Systems and Data Communications Analysts –The Computer Systems Administrator –Computer and Information Systems Managers –Management Information Systems Directors –Project Managers –Local Area Network and Wide Area Network Managers

Questions? Spies Like Us