Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Digital Signatures. Anononymity and the Internet.
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Security Module – Part 1 Spring 2006 V.T. Raja, Ph.D., Oregon State University.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Introduction to Public Key Cryptography
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Cryptography, Authentication and Digital Signatures
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Cryptography and the Web Lincoln Stein Whitehead Institute/MIT Center for Genome Research.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Computer and Network Security - Message Digests, Kerberos, PKI –
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
CIA AAA. C I A Confidentiality I A Confidentiality Integrity A.
Encryption Encryption: Transforms Message so that Interceptor Cannot Read it –Plaintext (original message) Not necessarily text; Can be graphics, etc.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
6.033 Quiz3 Review Spring How can we achieve security? Authenticate agent’s identity Verify the integrity of the request Check the agent’s authorization.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Digital Signatures.
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
Security.
Security.
Presentation transcript:

Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification

Why Cryptography  General Security Goal - Confidentiality - Authentication - Integrity - Availability - Irrefutable (not mention in this book)

Cryptography - general  To send messages over e network, which is unable to understand for a third part  General technique:  Plain text  Encode (algorithm and key)  Cipher text (send over the network)  Decode (algorithm and key)  Plain text

Cryptography - coding  Old days simple letter transformation e.g. c for an a and d for a b and so on  To day  Symmetric key  Public-private keys

Cryptography - Symmetric  Using the same key to encode and decode  Which goal are fulfilled ? -Confidentiality -Authentication -Integrity -Availability -Irrefutable -Confidentiality – yes - Authentication - yes - Integrity - yes - Availability - no - Irrefutable - perhaps

Cryptography - Symmetric  Implementations:  DES (Data Encryption Standard)– most known today modified to triple DES key length 64bit (3*64 bit) (round 10 min)  to day even 128 bit (round 1000 billion year)  Other IDEA, RC5

Cryptography - Symmetric  Key exchange:  Problem to exchange the key - we can not send it with a mail - then it would not be secret any longer  Using a Key Distribution Center (KDC) - I have an agreement with the KDC and with this an secret key. - So have all I communicate with. (see figure 2.10).

Cryptography - Symmetric  Windows use Symmetric key in an implementation called Kerberos:  All like KDC but you get grant (a key) to a resource for a certain time (all called a ticket)

Cryptography Asymmetric  Using the different keys to encode and decode  You always have a pair of keys a public key and a private key  If you encode with a public key – you must decode with a private key  If you encode with a private key – you must decode with a public key

Cryptography Asymmetric Which goal are fulfilled from A to B (B public Key) ? -Confidentiality -Authentication -Integrity -Availability -Irrefutable -Confidentiality – yes -Authentication - no - Integrity - no - Availability - no - Irrefutable - no

Cryptography Asymmetric Which goal are fulfilled from A to B (A private Key) ? -Confidentiality -Authentication -Integrity -Availability -Irrefutable -Confidentiality – no - Authentication - yes - Integrity - yes - Availability - no - Irrefutable - no

Cryptography Asymmetric Can we fulfilled both -Confidentiality and -Authentication / Integrity and -(Irrefutable) YES – encode with A private key and then with B public key

Cryptography Asymmetric  Implementations:  RSA – most known key length recommended 1024bit

Cryptography Asymmetric  Key exchange:  Problem to exchange the key - public key are public to everyone - But do we believe the sender of the key  Using Certification - I believe in some Certification Authorities e.g. VeriSign, Thrust, (in DK TDC) - get the public key from one of those trusted third part companies.

Cryptography Asymmetric  To fulfilled the goal you must encode 2 times (A private and B public)  A more easy way is to create a Message Digest (MD) a sort of a checksum (Digital Signature)  And this ‘checksum’ are encoded with A’s private key. Then the hole message + the MD are encoded with B’s public key

Cryptography Mixed  Using asymmetric keys to exchange a symmetric key for rest of this session. This increase the speed of encryption and decryption.