Information Systems Security

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
BITS Pilani Crypto Make-Up #1 Regular Session #2.
Principles of Information Security, 2nd edition1 Cryptography.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Cryptography Basic (cont)
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Electronic Mail Security
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Cryptography, Authentication and Digital Signatures
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
Midterm Review Cryptography & Network Security
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Bit Cipher 1. Example of bit Cipher 2 Practical Stream Cipher 3.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav
Pretty Good Privacy (PGP) Security for Electronic .
Lecture 2: Introduction to Cryptography
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Introduction to Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
Chapter Two: Classic Cryptography
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography Presented By: Yogita Dey Amardeep Kahali Dipanjan Devnagar Minhaajuddin Ahmad Khan ECE4, NIT Securing the Information Age.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
CS/ECE 578 Cyber-Security Dr. Attila Altay Yavuz
Basics of Cryptography
Cryptography.
PART VII Security.
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Symmetric Encryption or conventional / private-key / single-key
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Information Systems Security Introduction to Cryptography

What is Cryptography It is an applied branch of mathematics It is used to provide Confidentiality Integrity Authentication Authorization Non-repudiation

Why Cryptography Encrypting data against disclosure, modification Signing data against modification, repudiation To provide security for eCommerce

Application area Storing data encrypted Transmitting data securely Even access would not lead to disclosure Transmitting data securely Prevent eavesdropping Identifying your partner Prevent man in the middle attack Proof of identity Avoiding impersonation

Terms used Encryption Decryption Plaintext Cipher text The process of encoding a message so that the meaning is not obvious Decryption The reverse process of encryption Plaintext The original form of the message Cipher text The disguised (encrypted) text

Terms used C = E(P) P = D(C) P = D(E(P)) P – plaintext C – cipher text E – encryption algorithm D – decryption algorithm C = E(P) P = D(C) P = D(E(P))

Terms used C = EK(P) P = DK(C) P = DK(EK(P)) The encryption process involves An algorithm – mostly public A key – must be private C = EK(P) P = DK(C) P = DK(EK(P))

Software components Hash functions: handling the whole document takes too long Encryption/decryption: same algorithm for symmetric but different for asymmetric and signature Signature: combine a document with a private key Key agreement: creating a shared secret Key generation: creating secure keys

Classification of Cryptographic Systems The way the plaintext is processed Block cipher Stream cipher Type of operations performed Substitution Transposition Number of keys used Symmetric Asymmetric

Block encryption Data divided into fixed size blocks and symmetric encryption worked on them one at a time (e.g. 64 bits in 64 bits out) Main method is substitution and permutation by using S-boxes Early block cipher: Playfair Present block cipher: DES, AES

Stream encryption Symmetric encryption done on the bit stream (1 bit in, 1 bit out) The usual method is to use symmetric encryption in chain mode (cipher block chaining) where the previous cipher block is XOR to next plaintext block Early stream cipher: Vigerene Present stream cipher: RC4

Classical techniques - Substitution Substitute a character, digit or symbol for each character in plaintext Examples Mono alphabetic cipher Caesar cipher Atbash cipher Poly alphabetic cipher Playfair cipher

The Caesar cipher - Cryptanalysis Try all 25 possible keys Use the nature of the plain text Single character occurrences Digrams Trigrams

The Caesar cipher – Cryptanalysis Frequency Table of single letters

The Caesar cipher – Cryptanalysis Digrams and Trigrams an, re, er, nt, th, on, in, am, is, to, be, he, we, no, of Trigrams ent, ion, and, the, are, you, she, not

Playfair cipher Use a 5 x 5 matrix Use a keyword Use 2 characters at a time

Playfair cipher - rules Repeating plaintext letters are separated with a filling letter e.g. X Plaintext letters on the same row is replaced by letters right to it Plaintext letters on the same column is replaced by letters beneath it Else, replace plaintext by the corner letters of the rectangle formed by the 2 letters

Playfair example Key: PLAYFAIR EXAMPLE P L A Y F 1 R E X M B C D G H J N O S T U V W Z

Playfair example Plain text Hide the gold in the tree stump Change into capital letters HI DE TH EG OL DI NT HE TR EE ST UM P Check for repeating letters HI DE TH EG OL DI NT HE TR EX ES TU MP Encrypt

Playfair example What is the cipher text? BM ND ZB XD KY BE JV DM UI XM MN UV IF

Transposition Change the location of a character Examples Rail fence cipher Columnar transposition Enigma machine

Rail fence cipher Rail fence cipher of 3 rails Cipher text Plain text we are discovered flee at once Rail fence cipher of 3 rails W..R..I..O..R..F..E..O..E .E..E..S..V..E..L..A..N.. ..A..D..C..E..D..E..T..C. Cipher text WRIORFEOEEESVELANADCEDETC

Symmetric encryption Based on a shared secret by the participants and an algorithm The secret is used for both encryption and decryption key To protect the confidentiality of the data Are usually efficient and fast Main weakness is the need for the shared secret

Symmetric encryption

Asymmetric encryption Designed to overcome issues relating to key distribution Also offers authenticity 2 keys Public key – known by everyone Private key – known only by owner Keys operate as inverse, one key can decrypt message encrypted by the other

Asymmetric encryption

Symmetric vs Asymmetric Number of keys 1 2 Protection Must be secret Public & Private Key distribution Out of band Used to exchange other keys Speed Fast 10,000 times slower Usage Security & integrity of data Key exchange, authentication

Hash A hash is a cryptographic one way function that produces a record smaller than the plaintext The plaintext cannot be recovered from the hash and for a good hash function it is impossible for 2 plaintexts to produce the same hash (collision)

Hash A hash encrypted by the document signer’s private key can be used as a signature for a document Used to produce Message Authentication Codes (MAC) to verify the integrity of a message

Digital signature

Algorithms Symmetric Asymmetric Hash Others DES, 3DES, AES RSA, DSA (only for signature) Hash Sha-1, MD5 Others Diffie-Hellman for key agreement

PGP (Pretty Good Privacy) Designed by Phil Zimmermann for providing cryptographic protection of e-mail and file storage Uses the strong cryptographic algorithm Offers Authentication using digital signatures Confidentiality with use of encryption Bytes conversion to ASCII for e-mail

PGP design philosophy Written for individual technically skilled end users Every user creates and manages their own keys Every user has a freedom to choose whom to trust No administrative organisation or government involved in operation

Sending a PGP message

Receiving a PGP message