1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Crytography Chapter 8.
Principles of Information Security, 2nd edition1 Cryptography.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Cryptography Basic (cont)
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptographic Technologies
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Supporting Technologies III: Security 11/16 Lecture Notes.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
CS110: Computers and the Internet Encryption and Certificates.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Encryption Coursepak little bit in chap 10 of reed.
Chapter 8: Scrambling Through Cryptography Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
IT 221: Introduction to Information Security Principles Lecture 4: Public-Key Cryptography For Educational Purposes Only Revised: September 15, 2002.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
ECE Prof. John A. Copeland fax Office: GCATT Bldg.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Basics of Cryptography
Public-key Cryptography
M3: Encryption r By Andrew Stringer.
Public-Key, Digital Signatures, Management, Security
Introduction to Cryptography
Fluency with Information Technology Lawrence Snyder
Presentation transcript:

1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption

2 Encryption And Decryption Encryption Terminology Encryption: Transform representation so it is no longer understandable Cryptosystem: A combination of encryption and decryption methods Cleartext or Plaintext: Information before encryption Cipher text: Information in encrypted form One-way cipher: Encryption system that cannot be easily reversed (used for passwords) Decryption: Reversing encryption process

3 Encryption And Decryption  To ensure the privacy of messages sent over a network between a source and destination, the text can be encrypted. Cryptography - study of methods to encrypt text. Cryptanalysis - study of how to decode an encypted text.  Conventional or single key encryption - a simple algorithm is used to transform the text substitution cipher - each letter of the alphabet is substituted with a different letter or symbol. Ceasar's method - replace every letter in the alphabet with the letter 3 away A - > D B - > E C - > F... X - > A Y - > B Z - > C

4 Encryption And Decryption  Other substitution ciphers assign random substitutions, so they are a bit harder to crack. The sender uses the encryption to encrypt the message The sender transmits the message to the receiver The receiver decodes the message  How does the receiver decode the message? The sender needs to send the key to the receiver. How can this be done securely so that no one else can decode the message? To secure e-commerce transactions on the Web, the buyer’s machine must encrypt the data before it sends it over the Internet to the merchant’s Web server

5 Encryption And Decryption  Most encryption algorithms use mathematical formulas and an encryption key to encode the data The encryption key is a very large number used to encrypt and decrypt the data The length of the key (the number of digits it contains) determines how secure the data will be – the longer the key the more secure the message Most encryption algorithms use key length between 40 and 128 bit or more  Most Web browsers support these length keys

6 Encryption And Decryption Symmetric/ Private Key Encryption Uses a single number key to encode and decode the data. Both the sender and receiver must know the key DES (Data Encryption Standard) is the most widely used standard for symmetric encryption Because each sender and receiver would require a different key, this type of encryption is basically used by government entities It is rarely used for e-commerce transactions over the Internet Requires a secure way to get the key to both parties

7 Encryption And Decryption Asymmetric / Public Key Encryption Uses two numeric keys  The public key is available to anyone wishing to communicate securely with the key’s owner  The private key is available only to the owner Both keys are able to encrypt and decrypt each other’s messages It is computationally infeasible to deduce the private key from the public key. Anyone who has a public key can encrypt information but cannot decrypt it. Only the person who has the corresponding private key can decrypt the information. Example: encode by raising to 5 th power and moding result with 91 Decode by raising to 29 th power mod = 2 (mod 91) and 2 29 =32 (mod 91)

8 Assymetric Encryption  Choose two large prime numbers, p and q and compute N = p * q and x = (p-1)*(q-1)  Choose a number relatively prime to x and call it e. This means that e is not a prime factor of x or a multiple of it.  Find d such that e * d = 1 mod x. To encrypt: Cipher = Plaintext e (mod n) To decrypt: Plaintext = Cipher d (mod n)  Choose p = 7 and q = 13  We then calculate N = 7 ∗ 13 = 91 and x=(p−1)(q−1) = 72  We next select k e relatively prime to 72 and< 72, yielding 5  Finally,we calculate k d such that k e k d mod 72 = 1, yielding 29  public key (k e, N) = (5, 91) and private key (k d,N) = (29, 91) 32 codes in 2: 32 5 = 2 (mod 91) 2 decodes into 32: 2 29 =32 (mod 91)

9 Encryption And Decryption Asymmetric / Public Key Encryption The primary benefit of asymmetric cryptography is that it allows people who have no preexisting security arrangement to exchange messages securely. The need for sender and receiver to share secret keys via some secure channel is eliminated  all communications involve only public keys, and no private key is ever transmitted or shared.  Some examples of public-key cryptosystems are  Elgamal (named for its inventor, Taher Elgamal)  RSA (named for its inventors, Ron Rivest, Adi Shamir, and Leonard Adleman)  Diffie-Hellman (named, you guessed it, for its inventors)  DSA, the Digital Signature Algorithm (invented by David Kravitz).  PGP (Pretty Good Privacy) is fairly popular and inexpensive Because conventional cryptography was once the only available means for relaying secret information, the expense of secure channels and key distribution relegated its use only to those who could afford it, such as governments and large banks Public key encryption is the technological revolution that provides strong cryptography to the public

10 Digital Certificates Use assymetric encryption to create digital signatures Used on the Internet to authenticate both users and vendors A digital certificate is a unique identifier assigned to a user/vendor by a certification authority to verify the identity of the user/vendor  A certification authority (such as VeriSign) is a private company that certifies the user or vendor is who s/he claims to be  Work together with credit card verification companies or other financial institutions in order to verify the identity of the certificate’s requesters Digital signature is an encrypted attachment added to the electronic message to verify the sender’s identity  The digital certificate received by the user includes a copy of its public key  This digital certificate’s owner makes its public key available to anyone wanting to send encryped documents to the certificate’s owner

11 Digital Signatures  Instead of encrypting information using someone else's public key, you encrypt it with your private key. If the information can be decrypted with your public key, then it must have originated with you.

12 VeriSign – certification authority

13 How PGP Works - Encryption  PGP combines some of the best features of both conventional and public key cryptography; it’s a hybrid cryptosystem.  When a user encrypts plaintext with PGP, PGP first compresses the plaintext. Data compression saves transmission time and disk space and, more importantly, strengthens cryptographic security.  Most cryptanalysis techniques exploit patterns found in the plaintext to crack the cipher. Compression reduces these patterns in the plaintext, thereby greatly enhancing resistance to cryptanalysis. PGP then creates a session key, which is a one-time-only secret key.  This key is a random number generated from the random movements of your mouse and the keystrokes you type.  This session key works with a very secure, fast conventional encryption algorithm to encrypt the plaintext; the result is ciphertext.  Once the data is encrypted, the session key is then encrypted to the recipient's public key. This public key-encrypted session key is transmitted along with the ciphertext to the recipient.

14 How PGP Works - Encryption

15 How PGP works - decryption  Decryption works in the reverse. The recipient's copy of PGP the private key to recover the temporary session key, which PGP then uses to decrypt the conventionally-encrypted ciphertext.  The combination of the two encryption methods combines the convenience of public key encryption with the speed of conventional encryption. Conventional encryption is about 1, 000 times faster than public key encryption. Public key encryption in turn provides a solution to key distribution and data transmission issues. Used together, performance and key distribution are improved without any sacrifice in security.