CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.

Slides:



Advertisements
Similar presentations
Cryptography Ch-1 prepared by: Diwan.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Making “Good” Encryption Algorithms
Intro 1 Introduction Intro 2 Good Guys and Bad Guys  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”
Cryptography Introduction Last Updated: Aug 20, 2013.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
1 資訊安全 Network Security Instructor: 孫宏民 Room: EECS 6402, Tel: , Fax :
Chapter 5 Cryptography Protecting principals communication in systems.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
GROUP 11 Dhita Puspita Larasati Topan Firmansyah Dimas Kurnia Ayatullah Galih Purwanti Rahma Aprilia Handayani
Cryptography, Authentication and Digital Signatures
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Midterm Review Cryptography & Network Security
Chapter 20 Symmetric Encryption and Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Class 2 Cryptography Refresher CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Information Security Assignment- 01  What do you know about standards for information Security?  Suppose you are working in a Information Security department.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (2) Information Security.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Computer Security (CS4800)
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Chapter Two: Classic Cryptography
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Introduction (Pendahuluan)  Information Security  Criptography.
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Security Protecting information data confidentiality
Computer Security Revision Week
Risk management.
Crypto in information security
Introduction Of System Security
Chapter-2 Classical Encryption Techniques.
Cryptography.
Chapter 3:Cryptography (16M)
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Unit 2: Cryptography & Cryptographic Algorithm
Computer Security Chapter Two
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security

Syllabus Textbook:  “Information Security-Principles and Practice” by Mark Stamp Grading:  Projects: 1. Classic Cipher: 10% 2. Symmetric Cipher: 15% 3. Asymmetric Cipher: 15% 4. New Cipher: 10%  Exams (Open book):  OS Services: 5%  Midterm: 15%  Final: 30%

Definition Information Security is the process of protecting data from unauthorized access, use, disclosure, destruction, modification, or disruption. Other names:  Computer security  Information assurance  Data security  IT security  Computer security

Basic Principles of Information Security Confidentiality  No one can see it Integrity  Remove / Insert some pages Availability  see it anytime

Where to Start? Risk Management We need to start the Risk Management’s process:  To identify the vulnerabilities  To identify the threat Why do we need Risk Management?  a threat may use a vulnerability to cause harm to valuable information The objective of the Risk Management’s :  To reduce risk to an acceptable level

1. DEFINITION 2. PROCESS 3. EXECUTIVE Risk Management

Definition “Risk management is the process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business objectives, and deciding what countermeasures, if any, to take in reducing risk to an acceptable level, based on the value of the information resource to the organization.” CISA Review Manual 2006

Process 1. Identification of assets and estimating their value. 2. Conduct a threat assessment. 3. Conduct a vulnerability assessment. 4. Calculate the impact that each threat would have on each asset. 5. Identify, select and implement appropriate controls. 6. Evaluate the effectiveness of the control measures.

Executive Management Executive Management can choose to:  accept the risk  mitigate the risk  deny the risk

Executive Management 1. “Accept the risk”?  do nothing ! 2. “Mitigate the risk”?  Administrative Control  Logical Control  Physical Control 3. “Deny the risk”?  Confidentiality  Integrity  Authenticity

1. TERMINOLOGY 2. CRYPTOGRAPHY 3. CIPHERS 1. Substitution Ciphers 2. Transposition Ciphers 3. Symmetric Ciphers 4. Asymmetric Ciphers Cryptology

Basic Terminology of Crypto Cryptology: is the art and science of making and breaking “secret codes.” Cryptography: is the making of “secret codes.” Cryptanalysis: is the breaking of “secret codes.” Crypto: is a synonym for any or all of the above (and more).

Cryptography Cipher ( صفر ) is an algorithm for performing encryption and decryption — a series of well-defined steps that can be followed as a procedure. Plaintext Ciphertext Encrypt Decrypt

Cryptography The operation of a cipher usually depends on a piece of auxiliary information, called a key. Key Authentication Problem Plaintext Ciphertext Encrypt Decrypt

Cryptography Ciphers 1. Classic Substitution e.g., Caesar Cipher Transposition e.g., Route Cipher Hybrid 2. Modern Symmetric (Private Key) Stream Cipher e.g., RC4, A5/1 Block Cipher e.g., DES, AES Asymmetric (Public Key) e.g., RSA Hybrid