CS110: Computers and the Internet Encryption and Certificates.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Cryptology Making & Breaking Codes & Ciphers. AJ 1152 Cryptology Cryptography –Science of creating codes or ciphers Cryptanalysis –Science of breaking.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Digital Signatures. Anononymity and the Internet.
Cryptography in World War II Jefferson Institute for Lifelong Learning at UVa Spring 2006 David Evans Class 4: Modern Cryptography
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Cryptography and Internet Security How mathematics makes it safe to shop on-line John Lindsay Orr University of Nebraska - Lincoln.
Public Encryption: RSA
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Codes, Ciphers, and Cryptography-RSA Encryption
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
Rachana Y. Patil 1 1.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Cryptography CSPrinciples II February 12, Needs for Privacy What are some specific needs for privacy when using the internet?
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Cryptography Lecture 1: Introduction Piotr Faliszewski.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
RSA By: Abhishek Naik Viswanath Chennuru CPSC 624.
Encryption Coursepak little bit in chap 10 of reed.
Image Representation Privacy/Cryptography CS 104 October 3, 2011.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
David Evans CS200: Computer Science University of Virginia Computer Science Class 36: Public-Key Cryptography If you want.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Tyepmg Pic Gvctxskvetlc April 25, The Caesar Cipher (Suetonius) “If Caesar had anything confidential to say, he wrote it in cipher, that is,
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
© Chinese University, CSE Dept. Distributed Systems / Distributed Systems Topic 3: Security Dr. Michael R. Lyu Computer Science & Engineering Department.
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
Darci Miyashiro Math 480 April 29, 2013
1 Public-Key Cryptography and Message Authentication.
Encryption.
Traditional Symmetric-Key Ciphers
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Encryption CS110: Computer Science and the Internet.
Cryptography Readings Encryption, Decryption, & Digital Certificates.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
INCS 741: Cryptography Overview and Basic Concepts.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
Cryptography – Test Review
CIT 380: Securing Computer Systems
Cryptography & Security
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
CSCI-235 Micro-Computer Applications
PART VII Security.
Fluency with Information Technology Lawrence Snyder
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

CS110: Computers and the Internet Encryption and Certificates

Encryption and security

Ciphers Encryption terminology: – plaintext: message to be sent, in readable form – ciphertext: message in coded form, unreadable without a key – encrypt: turn plaintext into ciphertext – decrypt: turn ciphertext back into plaintext – cryptanalysis: cracking a code without the required special information – cryptography: study of codes and code-breaking

Caesar Codes The idea behind Caesar Codes is letter substitution. One strategy uses rotation.

Substitution codes are easy to break XLI UYMGO FVSAR JSB NYQTW SZIV XLI PEDC HSK TLE UYMGO FVSAR JSB NYQTW SZIV TLE PEDC HSK T=X  R=4 Method: frequency analysis

Implementing Caesar Ciphers using the ASCII table encoded_char = (plaintext_char + rotation_amount) % 128; Plaintext: By sea Ciphertext: F} wie

Vigenere Cipher: multiple Caesar ciphers. A Vigenere Cipher use multiple Caesar ciphers. Using a Vigenere Cipher to encrypt a message: – Select a keyword (e.g. CAT) – Convert the letters of the keyword to a sequence of rotations, each in the range from 0 to 25 (e.g. "CAT" is converted to the rotation sequence ) – Use the sequence of rotations to encode successive letters of the message, repeatedly cycling through the rotations (e.g )

Ecoding using the Vigenere Cipher

Try it yourself Key word: CODECODECODECO Plaintext: ATTACK AT DAWN Ciphertext:CHWEEY EV GEYB Because a Vigenere cipher uses more than one substitution alphabet, it's one of a bunch of ciphers known as polyalphabetic. It was unbreakable for 300 years!

Enigma

Private Key Encryption Key distribution problem: finding a secure way of sending a private key in order to have a secure way for communicating

Public Key Encryption 1976, Diffie-Hellman key exchange: deriving a shared private key over an insecure channel. 1977, RSA method (Ron Rivest, Adi Shamir and Leonard Adleman): the first practical implementation of public key encryption. Main ideas of public key encryption: – Instead of one key, you have two: one to encrypt and a different one to decrypt – The encryption key can be public – Knowing the encryption key doesn't help you figure out the decryption key

Public Key Encryption

Secure Communication

Is your information secure? Someone can hack into the server The server may not be trustworthy Someone can pretend to be you Someone may look over your shoulder when you type

Using public key for digital signatures – Call of the attack, it’s a trap! Signed Alice – Go on with the attack, it’s all clear! Signed Alice Problem: How does Bob know what is the identity of the sender? Solution: Alice will encrypt the message with her private key. – Anyone could decrypt using Alice’s public key but she is the only one that could encrypt.

Spoofing

Spoofing (2)

Certificates and Signing Authorities

Whom do you trust? Verified website: Unknown signer: