Cryptography By, Anthony Lonigro & Valentine Mbah.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

the basics cryptography deals with techniques for secure communication in the presence of third parties (adversaries). modern cryptography uses mathematics,
Conventional Encryption: Algorithms
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.

Security & Encryption Thomas Fenske & Joseph Minter.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Principles of Information Security, 2nd edition1 Cryptography.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
CSE331: Introduction to Networks and Security Lecture 18 Fall 2002.
Cryptography & Complexity An amazing blend of Mathematics, Computer Science, Physics and achieving “the impossible”.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Computer Science Lecture 22, page 1 Security in Distributed Systems Introduction Cryptography Authentication Key exchange Readings: Tannenbaum, chapter.
ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt.
Network Security Chapter
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Chapter 2 – Classical Encryption Techniques
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
Cryptography Week-6.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Computer encryption is… Based on the science of cryptography.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Cryptography, Authentication and Digital Signatures
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Types of Electronic Infection
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
CSCI 5857: Encoding and Encryption
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Lecture 2: Introduction to Cryptography
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Cryptography and Its Algorithms Scott Chappell. What is Cryptography?  Definition: the art of writing or solving codes.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
CSCI-235 Micro-Computers in Science Privacy & Security.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
Computer Security (CS4800)
Privacy and Security Topics From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Known Information Software.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Network Security  introduction  cryptography  authentication  key exchange  required reading: text section 7.1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CS201 Tech-Talk Two: Cryptography Michael Hsu CSULA.
Cracking Encrypted Systems
Public-key Cryptography
CSCI-235 Micro-Computer Applications
M3: Encryption r By Andrew Stringer.
Computer Security Chapter Two
Presentation transcript:

Cryptography By, Anthony Lonigro & Valentine Mbah

Introduction Cryptography is the enciphering and deciphering of messages in secret code. As time moves on cryptography is required to evolve and with the existence of computers, cryptography has become a key feature in the lifeline of all developed countries.

Enigma Machine Electrical pathways Custom Rotors Polyalphabetic substitution and One-time pads It’s breech was a momentous occasion in WWII

Importance of Cryptography Almost all communications of sensitive data are done by software programs with file encryption capabilities. Without it, countries would fall. Used in digital signatures and credit card transactions over the internet.

Importance Continued… Companies could not have online interfaces without it. Imagine if every sensitive piece of information you entered to the internet was easily accessible by hackers.

With Cryptography

Hacker!!

With Cryptography Hacker!!

With Cryptography Hacker!!

With Cryptography Hacker!!

With Cryptography Hacker!!

With Cryptography Hacker!!

With Cryptography Hacker!!

With Cryptography Hacker!!

With Cryptography Hacker!!

With Cryptography Hacker!!

With Cryptography Hacker!!

With Cryptography Hacker!!

With Cryptography Hacker!! Information safe!

Without Cryptography

Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker!

Without Cryptography Hacker! Hello World! Information Compromised!

Example Plaintext = hello Encoded = ifmmp Every letter is transformed into the letter preceding it.

Ciphers The mathematical algorithm used to encrypt a message is called a cipher. Types: Symmetric Key Cipher & Asymmetric Key Cipher.

Symmetric Key Cipher One Key Encryption key = Decryption key

Asymmetric Key Cipher Two Keys Encryption Key != Decryption Key

Modern Cryptography Quantum Cryptography Unlike other cryptography methods which rely on computational security, quantum cryptography uses every single particle of light, which is called a photon, to transmit data.

Modern Cryptography Cont.. In old methods a couple photons could be intercepted and the users would not know. In Quantum Cryptography, if any photon is intercepted the data is transformed and the users are informed.

Parallel Programming With parallel programming a hacker can use multiple key cracking algorithms. This makes it easier to crack keys that have lower encryption bits. With most of the encryptions today, a key can be broken in O(2^n) time.

Hackers Even with a 56 bit encryption key, parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

Questions