Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Computer Science 101 Data Encryption And Computer Networks.
Principles of Information Security, 2nd edition1 Cryptography.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, Java Version, Third Edition.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Chapter 5 Cryptography Protecting principals communication in systems.
Cryptographic Technologies
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Lecture 23 Symmetric Encryption
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Computer Science Lecture 22, page 1 Security in Distributed Systems Introduction Cryptography Authentication Key exchange Readings: Tannenbaum, chapter.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Chapter 8 Information Security 1.
Computer Science 101 Cryptography Part II
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
Linux Networking and Security Chapter 8 Making Data Secure.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Midterm Review Cryptography & Network Security
Chapter 20 Symmetric Encryption and Message Confidentiality.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Lecture 23 Symmetric Encryption
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Cryptology aka Cryptography Tim Cahill Ryan Church.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Cryptography and Its Algorithms Scott Chappell. What is Cryptography?  Definition: the art of writing or solving codes.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
8: Network Security8-1 Chapter 8 Network Security A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students,
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter-2 Classical Encryption Techniques.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
PART VII Security.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4) Section 13.3 inserted into Ch. 9 slides

Invitation to Computer Science, C++ Version, Fourth Edition 2 Step 3: Committing to an Online Purchase Must provide security for transmission of sensitive information  Encryption: Encoding data to be transmitted into a scrambled form using a scheme agreed upon between the sender and the receiver  Authentication: Verifying the identify of the receiver of your message

Invitation to Computer Science, C++ Version, Fourth Edition 3 Information Security Information security  Data protection, whether on disk or transmitted across a network  Authentication: Prevents access by hackers  Encryption: Makes data meaningless if hackers do get it

Invitation to Computer Science, C++ Version, Fourth Edition 4 Encryption Overview Cryptography  The science of “secret writing” Plaintext  A message that is not encoded Ciphertext  An encrypted message

Invitation to Computer Science, C++ Version, Fourth Edition 5 Encryption Overview (continued) Process of encryption and decryption  Plaintext is encrypted before it is sent  Ciphertext is decrypted back to plaintext when it is received A symmetric encryption algorithm  Requires a secret key known to both the sender and receiver Sender encrypts the plaintext using the key Receiver decrypts the message using the key

Invitation to Computer Science, C++ Version, Fourth Edition 6 Encryption Overview (continued) Asymmetric encryption algorithm  Also called public key encryption algorithm  The key for encryption and the key for decryption are different Person A makes an encryption key public Anyone can encrypt a message using the public key and send it to A Only A has the decryption key and can decrypt the message

Invitation to Computer Science, C++ Version, Fourth Edition 7 Simple Encryption Algorithms: Caesar Cipher Caesar cipher  Also called a shift cipher  Each character in the message is shifted to another character some fixed distance farther along in the alphabet  Stream cipher: Encodes one character at a time  Substitution cipher: A single letter of plaintext generates a single letter of ciphertext

Invitation to Computer Science, C++ Version, Fourth Edition 8 Block Cipher A group or block of plaintext letters gets encoded into a block of ciphertext, but not by substituting one at a time for each character Each plaintext character in the block contributes to more than one ciphertext character

Invitation to Computer Science, C++ Version, Fourth Edition 9 Block Cipher (continued) One ciphertext character is created as a result of more than one plaintext letter Diffusion (scattering) of the plaintext within the ciphertext

Invitation to Computer Science, C++ Version, Fourth Edition 10 DES Stands for Data Encryption Standard Designed to protect electronic information A block cipher Blocks: 64 bits long Key: 64-bit binary key (only 56 bits are used)

Invitation to Computer Science, C++ Version, Fourth Edition 11 DES (continued) Every substitution, reduction, expansion, and permutation is determined by a well-known set of tables The same algorithm serves as the decryption algorithm

Invitation to Computer Science, C++ Version, Fourth Edition 12 Figure The DES Encryption Algorithm

Invitation to Computer Science, C++ Version, Fourth Edition 13 DES (continued) Triple DES  Improves the security of DES  Requires two 56-bit keys  Runs the DES algorithm three times AES (Advanced Encryption Standard)  Uses successive rounds of computations that mix up the data and the key  Key length: 128, 192, or 256 bits

Invitation to Computer Science, C++ Version, Fourth Edition 14 Public-Key Systems RSA  Most common public key encryption algorithm  Based on results from number theory  If n is a large number, it is extremely difficult to find the prime factors for n  RSA is often used in the initial stage of communication between client and server

Invitation to Computer Science, C++ Version, Fourth Edition 15 Figure An SSL Session

Invitation to Computer Science, C++ Version, Fourth Edition 16 Summary (continued) Main parts of information security: Encryption and authentication Types of encryption algorithms  Symmetric encryption algorithms  Asymmetric encryption algorithms (or public key encryption algorithms) Encryption algorithms: Caesar cipher, block cipher, DES, Triple DES, AES, RSA