PUBLIC KEY CRYPTOGRAPHY A brief overview By Andy Brodie.

Slides:



Advertisements
Similar presentations
Conventional Encryption: Algorithms
Advertisements

Computer Science 101 Data Encryption And Computer Networks.
Sri Lanka Institute of Information Technology
Digital Signatures. Anononymity and the Internet.
Asymmetric-Key Cryptography

Public Key Encryption Algorithm
Shared Secrets Keeping secrets on the web. Encryption Goal : hidden in plain sight.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Cryptography 101 How is data actually secured. RSA Public Key Encryption RSA – names after the inventors –Rivest, Shamir, and Adleman Basic Idea: Your.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
No-Key Cryptography Nathan Marks Based on Massey-Omura US Patent # 4,567,600.
Public Key Cryptography
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Encryption Methods By: Michael A. Scott
ASYMMETRIC CIPHERS.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Public Key Model 8. Cryptography part 2.
Cryptography Week-6.
Public-Key Cryptology An Asymmetrical Approach to Encryption.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
CIS 450 – Network Security Chapter 8 – Password Security.
Public-Key Cryptography CS110 Fall Conventional Encryption.
HDCP1.4+ Material for Certification 10 August 2012 Sony Corporation 2012/8/10 Sony Confidential 1.
Network Encryption Vince Ceccarelli Group 7 TC 200.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Strength of Cryptographic Systems Dr. C F Chong, Dr. K P Chow Department of Computer Science and Information Systems The University of Hong Kong.
DES Attacks and Triple DES
Computer and Network Security Rabie A. Ramadan Lecture 6.
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
Encryption.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012.
Cryptography Overview and PGP - Fort Collins, CO Copyright © XTR Systems, LLC Cryptography Overview and Pretty Good Privacy Instructor: Joseph DiVerdi,
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
What use are prime numbers? ?. o All the primes, apart from 2, are odd numbers. o 1 is not a prime number. Why? o There are infinitely many prime numbers!
14-1 Last time Internet Application Security and Privacy Basics of cryptography Symmetric-key encryption.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Cryptography and Code Breaking Cryptography is the study and practice of hiding messages.
System Security: Cryptography Technologies CPE Operating Systems
BCIS 4630 Fundamentals of IT Security
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
1 Managing Security Additional notes. 2 Intercepting confidential messages Attacker Taps into the Conversation: Tries to Read Messages Client PC Server.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Public Key Cryptography
Digital Signatures.
Asymmetric-Key Cryptography
Privacy & Security.
HEY DOUG HOW ARE YOU? NKE JUAM NUC GXK EUA. HEY DOUG HOW ARE YOU? NKE JUAM NUC GXK EUA.
Introduction Of System Security
M3: Encryption r By Andrew Stringer.
Cryptography a Presentation Prepared by Vytautas Kondratas.
Digital Signatures Reference: Pfleeger , Charles P., Security in Computing, 2nd Edition, Prentice Hall, /7/2019 Ref: Pfleeger96, Ch.4.
Symmetric-Key Cryptography
Public – Private Key Cryptography
Presentation transcript:

PUBLIC KEY CRYPTOGRAPHY A brief overview By Andy Brodie

PUBLIC/PRIVATE KEYS A normal lock, for example on a door, has one key. If you have a key, you can lock and unlock the door. This is a useful way of securing content (whatever is behind the door). Asymmetric keys mean that the lock has two keys. One key can only lock the door (a public key) One key can only unlock the door (a private key) Encryption and decryption is a metaphor for locking and unlocking the door to get at whatever is behind the door. This is really, really powerful.

BENEFITS OF ASYMMETRIC KEYS If you give away the public key (that encrypts) then anyone can protect content. No-one else can decrypt and read the content unless they have the private key. But, there’s more… it works the other way around too!

BUT HOW DO THEY WORK? Private keys must be unguessable. It must be impossible to derive the private key from the public key. Keys are calculated from very, very large prime numbers. Key “strength” is measure in bits, i.e. the number of bits the key consists of. E.g. an 8-bit key has a range of 256 potential values (2 8 ). This is not very secure as it would be trivial to manufacture all 256 keys and try them against the lock (a brute force attack) A 2048 bit key has a range of 3.23x with 616 zeros after the end. Even the Milliard Gargantubrain could only manage ~1x10 57 in a millisecond!

MATHS

REAL MATHS!

ENCRYPTING AND DECRYPTING

END This work is licensed under the Creative Commons Attribution 4.0 International License.Creative Commons Attribution 4.0 International License