Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Public Key Infrastructure and Applications
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 22.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 22.
Cryptographic Technologies
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
SECURITY Chapter 7.3 – 7.5 Presentation by Deepthi Reddy.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Encryption.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Lecture 2: Introduction to Cryptography
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Cryptography Gerard Klonarides. What is cryptography? Symmetric Encryption Symmetric Encryption Asymmetric Encryption Asymmetric Encryption Other cryptography.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Network Security Celia Li Computer Science and Engineering York University.
( Ch 73) Internet Security Digital certificate only authorised recipient can decrypt message Encryption - strong - weak Firewall.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Digital Signature, Digital Certificate – Securing E-Transactions Dr. Hussein Al-Bahadili.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Basics of Cryptography
HEY DOUG HOW ARE YOU? NKE JUAM NUC GXK EUA. HEY DOUG HOW ARE YOU? NKE JUAM NUC GXK EUA.
Cryptography and Security Technologies
Cryptography.
Fluency with Information Technology Lawrence Snyder
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of mathematical procedures to scramble data so that it is extremely difficult for anyone other than authorized recipients to recover the original message

 The formula or algorithm converts the intended data (Credit card number, Social security number etc.) into an encoded message using a key to decode or decipher the message. Plaintext:- The message that is being protected. Key:- A series of electronic signals stored on a PC’s hard disk or transmitted as blips of data over transmission lines.

 PKI:- Public Key Infrastructure creates the ability to authenticate users, maintain privacy, ensure data integrity, and process transactions without the risk of repudiation. It satisfies four e-security needs. 1. Authentication 2. Integrity 3. No repudiation- procedure that prevents sender and vendor from credibly denying that they sent or received a specific message, file etc. 4. Privacy

Cryptographic techniques are a means of securely transferring data over Internet applications. It is the science of applying complex mathematics to increase the security of electronic transactions. Basic encryption relies on two components: an algorithm and a key. Encrypting information is simple: A computer program is used that has an encryption algorithm

 For encryption to work, both sender and receiver have to know the rules used to transform the original message or transaction into its coded form.  A set of rules for encoding and decoding messages is called a cipher. The encoded message is called a ciphertext.  A message can be decrypted only if the decryption key matches the encryption key.

 3 cryptographic algorithms: Message-digest algorithms  Map variable-length plaintext to fixed-length ciphertext. Secret-key algorithms  Use one single key to encrypt and decrypt. Public-key algorithms  Use 2 different keys – public key and private key.

 It is a variable value that is used by cryptographic algorithms to produce encrypted text, or decrypt encrypted text.  The length of the key reflects the difficulty to decrypt from the encrypted message. EncryptionDecryption Plaintext Ciphertext Key

 It is the number of bits (bytes) in the key.  A 2-bit key has four values 00, 01, 10, 11 in its key space  A key of length “ n ” has a key space of 2^n distinct values.  E.g. the key is 128 bits … There are 2^128 combinations

CSC1720 – Introduction to Internet 10 Encrypted Text Original Text + Secret key = Encrypted Text Original TextSecret key + = Encryption Decryption

 Use a secret key to encrypt a message into ciphertext.  Use the same key to decrypt the ciphertext to the original message.  Also called “ Symmetric cryptography ”. 11 EncryptionDecryption Plaintext Ciphertext Secret Key

 All keys need to be replaced, if one key is compromised.  Not practical for the Internet environment.  On the other hand, the encryption speed is fast.  Suitable to encrypt your personal data. CSC1720 – Introduction to Internet 12

 Involves 2 distinct keys – public, private.  The private key is kept secret and never be divulged, and it is password protected (Passphase).  The public key is not secret and can be freely distributed, shared with anyone.  It is also called “ asymmetric cryptography ”.  Two keys are mathematically related, it is infeasible to derive the private key from the public key.  100 to 1000 times slower than secret-key algorithms. EncryptionDecryption Plaintext Ciphertext Public KeyPrivate Key

First, create public and private key Public key Private key Private key stored in your personal computer Public Key Directory Public Key Public key stored in the directory

15 Public Key Directory Text User A User B ’ s Public Key Encryption Encrypted Text

User A Encrypted Text Encrypted Text Insecure Channel User B

Encrypted Text User B ’ s Private key Private key stored in your personal computer Decryption Original Text User B

 It maps a variable-length input message to a fixed-length output digest.  It is not feasible to determine the original message based on its digest.  It is impossible to find an arbitrary message that has a desired digest.  It is infeasible to find two messages that have the same digest.

 A hash function is a math equation that create a message digest from message.  A message digest is used to create a unique digital signature from a particular document. Hash Function Original Message (Document, ) Digest

1. RSA Algorithm:- RSA is the most commonly used public –key algorithm, although it is vulnerable to attack.  Named after its inventors, Ron Rivest, Adi Shamir and Len Adleman of the Massachusetts Institute of Technology (MIT). RSA was first published in  It is used for encryption as well as for electronic signatures

2. Data Encryption Standards (DES):- DES was developed by IBM in 1974 in response to a public solicitation form the U.S. Department of Commerce. It was adopted as a U.S. federal standard in 1977 and as a financial industry standard in  DES is the first symmetric system to be widely adopted commercially. Any change to a message encrypted with DES turns the message into a mess of unintelligible characters. As a block cipher with 64 bit size, DES uses a 56-bit key to encrypt a 64- bit plaintext block into a 64-bit ciphertext.

3. 3DES:- A stronger version of DES, called Triple DES(3DES), uses three 56-bit keys to encrypt each block. The first key encrypts the data block, the second key decrypts the data block, and the third key encrypts the same data block again. The 3DES version requires a 168-bit key that makes the process quite secure and much safer than plain DES.

4. RC4 :- RC4 was designed by Ron Rivest Data Securtiy Inc. This variable length cipher is widely used on the Internet as the bulk encryption cipher in the Secure Sockets Layer (SSL) protocol, with key length ranging from 40 to 128 bits. RC4 has a reputation of being fast, although its security is unknown. 5. International Data Encryption Algorithm (IDEA):- IDEA was created in Switzerland in It offers strong encryption using a 128-bit key to encrypt 64-bit blocks.

Cryptoanalysis:- It is the science of deciphering encrypted messages without knowing the right key. 1. Chosen-plaintext attack:- The attacker uses an unknown key to encrypt any text or document. The challenge is to find the key that is known only to the attacker. 2. Known-plaintext attack:- The attacker knows the plaintext for part(s) of the ciphertext. He or she uses this information to decrypt the rest of the ciphertext.

3. Ciphertext-only attack:- The attacker has no idea what the message contains and works primarily from ciphertext, making guesses about the plaintext. Some ciphertext data might contain a common word as a starter. Certain documents begin in a predictable way that often gives away the contents.

4. Third-party attack:- An adversary breaks into the communication line between two parties (e.g. buyer and vendor). He or she uses a separate key with each party. Each party uses a different key that is easily known to the adversary. The adversary, in turn, decrypts the transmitted documents with the right key and encrypts it with the other key before it is sent to the recipient. Neither party has any idea that their communication system has been intercepted.