BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Chapter 11: Cryptography
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
1 ITNS and CERIAS CISSP Luncheon Series: Cryptography Presented by Addam Schroll, CISSP.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
Cryptography.
Web Security for Network and System Administrators1 Chapter 4 Encryption.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Cryptography Basic (cont)
Chapter 5 Cryptography Protecting principals communication in systems.
Cryptographic Technologies
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
ASYMMETRIC CIPHERS.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
Introduction to Public Key Cryptography
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Crypto Bro Rigby. History
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Cryptography, Authentication and Digital Signatures
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
SEC835 Cryptography Basic. Major Security Services Present in any web application Cryptography, or cryptosystem User’s authentication Access control Audit.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
1 Public-Key Cryptography and Message Authentication.
Encryption.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Lecture 2: Introduction to Cryptography
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Intro to Cryptography Lesson Introduction
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Cryptography Gerard Klonarides. What is cryptography? Symmetric Encryption Symmetric Encryption Asymmetric Encryption Asymmetric Encryption Other cryptography.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY

Contents Introduction Basic Terms Cryptographic Services Symmetric Algorithms Asymmetric Algorithms Hashing Algorithms Digital Signature Public Key Infrastructure Cryptanalysis Attacks

Introduction The study of techniques related to all aspects of data The word "cryptography" is derived from the ancient Greek words "kryptos" (hidden) and "graphia" (writing). Within the field of cryptology one can see two separate divisions:  Cryptography  Cryptanalysis.

Introduction Cryptography  The cryptographer seeks methods to ensure the safety and security of conversations. Cryptanalysis  Cryptanalyst tries to undo the former's work by breaking cryptographer systems.

Basic Terms Plaintext – the original intelligible message Ciphertext – the transformed message Chiper – the algorithm that does the encryption Key – some critical information used by the cipher, known only to the sender receiver. Keyspace – Total number of possible values of keys in a crypto algorithm

Basic Terms Cryptosystem – The combination of algorithm, key, and key management functions used to perform cryptographic operations Cryptology - both cryptography and cryptanalysis Encryption : the process of converting plaintext to cipher text using a cipher and a key Decryption : the process of converting cipher text to plaintext

Cryptographic Services Confidentiality: To help protect a user's identity or data from being read. Data integrity: To help protect data from being changed. Authentication: To ensure that data originates from a particular party. Non-repudiation: To prevent a particular party from denying that they sent a message.

Symmetric Algorithms Symmetric algorithms use a single key shared by two communicating parties. The shared key must remain secret to ensure the confidentiality of the encrypted data. Sharing key is the is the main technological challenge of this kind of encryption Symmetric algorithms are used for:  Confidentiality  Data integrity

Symmetric Algorithms DES((Data Encryption Standard)  Block size is 64 bits  Key size is 56 bits 3DES(Triple Data Encryption Standard)  Using DES twice on a given message  3DES is a viable and popular symmetric block algorithm AES (Advanced Encryption Standard)  NIST( National Institute of Standards and Technology ) replaced DES in 1997 with AES  Uses the Rijndael algorithm  Supports key/block sizes of 128, 192, and 256 bits  Uses 10/12/14 rounds as block size increases

Symmetric Algorithms IDEA (International Data Encryption Algorithm)  Operates on 64 bit blocks in 8 rounds with 128 bit key  Considered stronger than DES and is used in PGP(Pretty Good Privacy) Blowfish  64 bit block cipher with up to 448 bit key and 16 rounds  Designed by Bruce Schneier RC5  Block size 32/64/128 bits  Variable key size up to 2048 bits  Created by Ron Rivest

Asymmetric Algorithms In asymmetric cryptography, each user has two keys: a public key and a private key. The public key is made public. For example, it may be published on a Web site. The private key must be kept secret. It is never shared with anyone. Their main use is in solving the key exchange problem for symmetric cryptography Asymmetric algorithms tend to be very inefficient cause it is very slow, about 100 times slower than DES

Asymmetric Algorithms Diffie-Hellman  First widely known public key cryptography algorithm  Provides means for secure key exchange over insecure channel RSA  Stands for inventors names, Rivest, Shamir, and Adleman  Relies on difficulty of finding prime factorization of large numbers

Hashing Algorithms Cryptographic hashing functions are used to ensure the integrity of data. Cryptographic hashing functions are sometimes called cryptographic checksums or integrity checksums. Hashing functions are also used for digital signatures

Hashing Algorithms MD5  Computes 128-bit hash value  Widely used for file integrity checking SHA-1  Computes 160-bit hash value  NIST approved message digest algorithm

Digital Signature Public key encryption enabled the development of the technology of digital signatures. Digital signatures are somewhat analogous to traditional handwritten signatures. Digital signatures are strongly bound to the document, but weakly bound to the individual. A digital signature is computed, in part, using the contents of the document being signed.

Digital Signature Hash of message encrypted with private key The receiver verifies the signature with sender public key DSS provides Sender authentication Verification of message integrity Non-Repudiation

Public Key Infrastructure A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that can identify an individual or an organization and directory services that can store and, when necessary, revoke the certificates. public keydigital certificate

Public Key Infrastructure A public key infrastructure consists of:  A certificate authority (CA) that issues and verifies digital certificate. A certificate includes the public key or information about the public keyCAdigital certificate  A registration authority (RA) that acts as the verifier for the certificate authority before a digital certificate is issued to a requestorRA  One or more directories where the certificates (with their public keys) are held  A certificate management system

Cryptanalysis Attacks Brute force  Trying all key values in the keyspace Frequency Analysis  Guess values based on frequency of occurrence Dictionary Attack  Find plaintext based on common words

Cryptanalysis Attacks Replay Attack  Repeating previous known values Factoring Attacks  Find keys through prime factorization Known Plaintext  Format or content of plaintext available Known cipher attacks  The attacker has the ciphertext and tries to decrypt the message by generating all possible keys

Cryptanalysis Attacks Chosen Plaintext  Attack can encrypt chosen plaintext Chosen Ciphertext  Decrypt known ciphertext to discover key Differential Power Analysis  Side Channel Attack  Identify algorithm and key length

THANK YOU Q/A