Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.

Slides:



Advertisements
Similar presentations
Digital Signatures. Anononymity and the Internet.
Advertisements

Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Internet Technology: A Sampler Ramesh Johari Massachusetts Institute of Technology
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
The Idea of Public Key Cryptography Cunsheng Ding HKUST, Hong Kong.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
Public-Key Cryptology An Asymmetrical Approach to Encryption.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
PGP Encryption Justin Shelby. Encryption Methods  There are two basic key types for cryptography Symmetric Asymmetric.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Computer encryption is… Based on the science of cryptography.
Pertemuan-13 Enkripsi and Authentication. Symmetric-key Cryptography  Data encrypted and decrypted with same key  Classical examples: Caesar cipher,
Learning Aid Type Text Page 206 MGS GROUP C Svitlana Panasik.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Types of Electronic Infection
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Public Key Encryption  Illustration  Uses  Importance  RSA  Cryptcard.
Encryption.
Cryptography Lynn Ackler Southern Oregon University.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Cryptography Overview and PGP - Fort Collins, CO Copyright © XTR Systems, LLC Cryptography Overview and Pretty Good Privacy Instructor: Joseph DiVerdi,
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
Public Key Encryption 3 Digital Signatures or The Box within a Box.
14-1 Last time Internet Application Security and Privacy Basics of cryptography Symmetric-key encryption.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Encryption. What is encryption? Encryption is conversion of original data to another data that can be converted back to original data by authorized persons.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
CIS 325: Data Communications1 Chapter Seventeen Network Security.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
CHAOS CRYPTOGRAPHY Nathaniel Speiser Physics
April 20023CSG11 Electronic Commerce Encryption John Wordsworth Department of Computer Science The University of Reading Room.
CIA AAA. C I A Confidentiality I A Confidentiality Integrity A.
Paper On Cryptography CS300 Technical Paper Review Avinash Chambhare Abdus Samad.
Encryption Name : Maryam Mohammed Alshami ID:H
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
ENGR 101 Compression and Encryption. Todays Lecture  Encryption  Symmetric Ciphers  Public Key Cryptography  Hashing.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Digital Signatures.
Public-key Cryptography
Topic 1: Data, information, knowledge and processing
Encryption The Good kind of obscurity
M3: Encryption r By Andrew Stringer.
Electronic Payment Security Technologies
Purpose: how do computers keep our information secret?
COMPUTER SAFTEY IS IMPORTANT….
Presentation transcript:

Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can also incur legal penalties e.g. loss of laptops, CDs, etc. by public bodies or organisations working for them.

Symmetric (private key) encryption both ends use the same private key

Computers use mathematically generated digital keys (e.g. Generated from a password) and the encryption algorithms can be very fast e.g.TrueCrypt which can encrypt/decrypt hard disks 'on the fly', i.e. you don't notice any slow down in disk access Encryption time depends on length of key but longer keys are harder to break Problem – both ends have to have same key How can we transmit it ? , phone, text message? If a 100 people send secure messages to each other we need 4950 different keys

Asymmetric (public key) encryption Public key to lock the box (anyone can have it) Private key to unlock the box (I keep this)

To use asymmetric encryption we generate two mathematically related keys Public key used to encrypt files you can this to anyone or put it on your web site, etc, etc People use this to encrypt files and send them to you, e.g. using Private key (you keep this secret) which you use to decrypt files you receive

See