Computers in Society Encryption. Shameless Plug Catch the kayak club trip to Glenwood on Saturday. Fun!

Slides:



Advertisements
Similar presentations
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Advertisements

COS 461 Fall 1997 Todays Lecture u intro to security in networking –confidentiality –integrity –authentication –authorization u orientation for assignment.
Public Key Infrastructure Alex Bardas. What is Cryptography ? Cryptography is a mathematical method of protecting information –Cryptography is part of,
Conventional Encryption: Algorithms
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
Attacks on Digital Signature Algorithm: RSA
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
The Idea of Public Key Cryptography Cunsheng Ding HKUST, Hong Kong.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Diffie-Hellman Key Exchange
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
ASYMMETRIC CIPHERS.
Dan Boneh Introduction What is cryptography? Online Cryptography Course Dan Boneh.
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
Public Key Model 8. Cryptography part 2.
Public Key Encryption An example of how a bank might accomplish encryption.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Enhancing Security with S/MIME Chuck Connell,
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
Computer encryption is… Based on the science of cryptography.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
East High School Math Week Jeff Kinne UW Computer Science.
1 Security and Cryptography: basic aspects Ortal Arazi College of Engineering Dept. of Electrical & Computer Engineering The University of Tennessee.
1 Network Security Basics. 2 Network Security Foundations: r what is security? r cryptography r authentication r message integrity r key distribution.
Class 4 Asymmetric Cryptography and Trusting Internal Components CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
Encryption CS110: Computer Science and the Internet.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
April 20023CSG11 Electronic Commerce Encryption John Wordsworth Department of Computer Science The University of Reading Room.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
Breaking Cryptosystems Joshua Langford University of Texas at Tyler Fall 2007 Advisor: Dr. Ramona Ranalli Alger.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Digital Signatures Last Updated: Oct 14, 2017.
Chap 6: Security and Protection
Keys Campbell R. Harvey Duke University, NBER and
Campbell R. Harvey Duke University and NBER
Message Security, User Authentication, and Key Management
Cryptography Lecture 27.
Campbell R. Harvey Duke University and NBER
Recap unit 2 Review cipher systems, RSA Digital signatures
Protocol ap1.0: Alice says “I am Alice”
Lecture 10: Network Security.
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
One Time Signature.
Public – Private Key Cryptography
Security: Integrity, Authentication, Non-repudiation
PGP CSC 492 Presentation May 2, 2007 Brandon Skari Ruby Matejcik.
Presentation transcript:

Computers in Society Encryption

Shameless Plug Catch the kayak club trip to Glenwood on Saturday. Fun!

Homework Did you do it? It’s your responsibility to be keeping up with the class home page and watch the homework assignments. I will accept this one up until next Tuesday but if it’s not in right now you’ve lost a letter grade.

Presentations Do you know when you’re on the schedule? Are you getting ready? Have you chosen a topic? If you’re not coming in to see me well before (at least a week!) you’re going to be in trouble. My job is to help you make the best presentation possible. But you have to come in and see me to get my help.

Homework There is no formal homework for next week BUT it’s time to get started on your term paper. I need a proposal by Thursday. Details in the wiki – click on “Term Paper”.

STORM WORM! Beware!

Privacy and Security Encryption Anonymity Trust

Encryption What is the difference between public key encryption and secret key encryption? What is the role of the random number in cryptography? If Alice used public key crypto, what will you have to know to send her a private message? What analogy does Wikipedia use for Public Key encryption?

Encryption Explain how this analogy corresponds to computer-based crypto What analogy corresponds to a digital signature? What is the basic problem of public key encryption? What is a certificate? How is a digital signature different from a real one?

Encryption What is the underlying algorithmic idea behind public key encryption? What mathematical function is behind RSA? Is popularity an indication of quality in encryption? What applications make use of cryptography? How does the example of a message from Bob to Alice using a private key work? What “danger” does Wikipedia mention?

Encryption What is a “brute force” attack on an encryption algorithm? Can we prove that an encryption system is not subject to attack? What is a “Man in the Middle” attack? What is key revocation? What are some examples of systems in which trust is of paramount importance?