Professional Encryption Software FINECRYPT 8.1. Contents Introduction Introduction Features Features Installation Installation Tests Tests Results Results.

Slides:



Advertisements
Similar presentations
11/2/2013 2:02:38 AM 5864_ER_FED 1 Importing Certificates into Lotus Notes R6.
Advertisements

Symmetric Encryption Prof. Ravi Sandhu.
Installation & User Guide
Getting Started To start the process, procure the Digital Signature Certificate Enrollment Kit from Signature World or its Registration Authorities. The.
Digital Certificate Installation & User Guide For Class-2 Certificates.
“Advanced Encryption Standard” & “Modes of Operation”
Encipherment Using Modern Symmetric-Key Ciphers. 8.2 Objectives ❏ To show how modern standard ciphers, such as DES or AES, can be used to encipher long.
Modern Symmetric-Key Ciphers
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Modes of Operation CS 795. Electronic Code Book (ECB) Each block of the message is encrypted with the same secret key Problems: If two identical blocks.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
The Internet. Telnet Telnet means using your computer as a terminal. All commands you type are sent to the host computer you are connected to and executed.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Lecture 23 Symmetric Encryption
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
CS470, A.SelcukModes of Operation1 Encrypting with Block Ciphers CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
WinZip Basics Chris Comito Marybeth MacLean Jameelah Roberts Matt Smith.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Digital Certificate Installation & User Guide For Class - 2 Certificates.
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
Digital Logic and State Machine Design Installing Xilinx WebPACK 12.4 CS 2204 Digital Hardware.
Downloading and Installing PAF Insight PAF Insight can be easily downloaded Or can be installed from a CD A license is needed t0 activate the program.
Chapter 20 Symmetric Encryption and Message Confidentiality.
569 Semantic Web. Dr. J. Lu University of windsor, Project Presentation Encrypted Web service application Encrypted Web Application Presented by:
Cryptography, Authentication and Digital Signatures
BlowFish 2000 Copyright © by Gregory Braun. All rights reserved Installation and Users Guide by Robert Moncrief II.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
A Survey of Authentication Protocol Literature: Version 1.0 Written by John Clark and Jeremy Jacob Presented by Brian Sierawski.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
More About DES Cryptography and Network Security Reference: Sec 3.1 of Stallings Text.
1.1 Chapter 8 Encipherment Using Modern Symmetric-Key Ciphers Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
Modes of Operation INSTRUCTOR: DANIA ALOMAR. Modes of Operation A block cipher can be used in various methods for data encryption and decryption; these.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Lecture 23 Symmetric Encryption
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
@Yuan Xue 285: Network Security CS 285 Network Security Message Authentication Code Data integrity + Source authentication.
Block Cipher Modes Last Updated: Aug 25, ECB Mode Electronic Code Book Divide the plaintext into fixed-size blocks Encrypt/Decrypt each block independently.
How to Create and Use a VericrYPT CONTAINER
CS480 Cryptography and Information Security
Security Using Armstrong Numbers and Authentication using Colors
Outline Desirable characteristics of ciphers Stream and block ciphers
An Installation Guide of PGP on Windows 2000
Block vs Stream Ciphers
Exercise 1: Let’s Communicate - Decrypt The message
Elect. Codebook, Cipher Block Chaining
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Secret-Key Encryption
Presentation transcript:

Professional Encryption Software FINECRYPT 8.1

Contents Introduction Introduction Features Features Installation Installation Tests Tests Results Results Conclusion Conclusion

Cryptography Introduction Study of secret writing Study of secret writing Storing information in a form which allows it to be revealed to those you wish to see it yet hides it from all others Storing information in a form which allows it to be revealed to those you wish to see it yet hides it from all others Effective way to reliably protect confidential data Effective way to reliably protect confidential data

Benefits of Cryptographic Technologies? Data secrecy Data secrecy Data integrity Data integrity Authentication of message originator Authentication of message originator Non-repudiation Non-repudiation

Why FineCrypt? Security software application Security software application Enables to securely store the data using strong encryption Enables to securely store the data using strong encryption Written in Assembly Language Written in Assembly Language 1.5 Times faster the other encryption tools 1.5 Times faster the other encryption tools Uses Symmetric Key Encryption i.e the sender and receiver of a message know and use the same secret key Uses Symmetric Key Encryption i.e the sender and receiver of a message know and use the same secret key

Awards of FineCrypt

Features?  Supports 10 Encryption Algorithms i.e. AES, Blowfish, 3DES etc  Uses 4 Encryption Modes i.e. ECB, CBC, CFB and OFB  Only program which checks the correctness of encryption  FineCrypt Communicator - Exchanging encrypted files and encryption keys with other users

Features (cont)  Key Management using key manager  Encrypt several files either into single encrypted archive or into different encrypted files  Encrypt files both with the password and with the key  Permanent File Deletion using “Wipe” utility

10 Encryption Algorithms

Encryption Modes Used with block cipher to encrypt a message of arbitrary length Electronic Cookbook Mode (ECM) Electronic Cookbook Mode (ECM) Cipher Block Chaining mode (CBC) Cipher Block Chaining mode (CBC) Cipher Feedback mode (CFB) Cipher Feedback mode (CFB) Output Feedback mode (OFB) Output Feedback mode (OFB)

Reference & System Support Download Sources Download Sources System Support System Support Windows 9x Windows 9x Windows 2000 Windows 2000 Windows XP Windows XP Windows 2003 Windows 2003

Once fcinst.exe downloaded on the machine, click the package to start installation Once fcinst.exe downloaded on the machine, click the package to start installation You will come up with the following screen. Click continue to proceed You will come up with the following screen. Click continue to proceed

Click Next Click Next

Read the license Agreement and if you agree the terms and condition then proceed Read the license Agreement and if you agree the terms and condition then proceed

Choose the destination location where you want to install FineCrypt Choose the destination location where you want to install FineCrypt

After giving the destination location, click next to proceed After giving the destination location, click next to proceed

Click Finish to restart the computer Click Finish to restart the computer

ArcViewer Window

Encryption using Password Click with the right mouse button on selected files; from the FineCrypt submenu choose "Encrypt with password" menu item Click with the right mouse button on selected files; from the FineCrypt submenu choose "Encrypt with password" menu item

Enter the passphrase you want to encrypt a file Enter the passphrase you want to encrypt a file

Choose Encryption Algorithm & Encryption Mode. In this example, we selected the algorithm 3DES with CFB mode Choose Encryption Algorithm & Encryption Mode. In this example, we selected the algorithm 3DES with CFB mode

Then click on Encrypt button and save the file with.fca format. You will get the encrypted file, as shown highlighted Then click on Encrypt button and save the file with.fca format. You will get the encrypted file, as shown highlighted

Decryption using Password In order to decrypt a file or folder, click the desired source In order to decrypt a file or folder, click the desired source

Click the file you want to decrypt. FineCrypt will ask you for Password. Enter the Password Click the file you want to decrypt. FineCrypt will ask you for Password. Enter the Password

By pressing the Ok button you will get the decrypted file By pressing the Ok button you will get the decrypted file

Encryption using Key Right Click the file or folder you want to Encrypt. Encrypt the file using “Encrypt with Key…” option Right Click the file or folder you want to Encrypt. Encrypt the file using “Encrypt with Key…” option

Click on Settings and then select the algorithm and mode to encrypt the file Click on Settings and then select the algorithm and mode to encrypt the file

Click on Password Button and generate the key. Then Save the key, specify name and location for encrypted file and then press Encrypt button Click on Password Button and generate the key. Then Save the key, specify name and location for encrypted file and then press Encrypt button

You will get the encrypted file along with the key You will get the encrypted file along with the key

Decryption using Key In order to decrypt a file or folder, open the encrypted file and you will get screen above In order to decrypt a file or folder, open the encrypted file and you will get screen above

Click the “Read…” button and select the saved key which was used to encrypt the file and then press ok Click the “Read…” button and select the saved key which was used to encrypt the file and then press ok

You can see the decrypted file above You can see the decrypted file above

Key Manager Interface

Checking reliability of FineCrypt's Encryption Comparing the original text and resulting ciphertext, known as "test vectors" Comparing the original text and resulting ciphertext, known as "test vectors" Test vectors - widely published and can find them in the Internet Test vectors - widely published and can find them in the Internet Hexadecimal file editor required for testing Hexadecimal file editor required for testing Download a simple hexadecimal editor Download a simple hexadecimal editor

Testing AES Algorithm with Electronic Codebook Mode Testing AES Algorithm with Electronic Codebook Mode Download the test vectors for AES algorithm from National Institute of Standards and Technology (NIST) Download the test vectors for AES algorithm from National Institute of Standards and Technology (NIST) l/rijndael-vals.zip l/rijndael-vals.zip l/rijndael-vals.zip l/rijndael-vals.zip Unzip and open the file "ecb_tbl.txt" Unzip and open the file "ecb_tbl.txt"

Create new file in hexadecimal editor Create new file in hexadecimal editor Enter the plaintext exactly as shown in the test vector Enter the plaintext exactly as shown in the test vector

Save the file as “aesp” at desired location. Our plaintext is created Save the file as “aesp” at desired location. Our plaintext is created Encrypt “aesp” file using key Encrypt “aesp” file using key Enter the encryption key exactly as shown in the test vector Enter the encryption key exactly as shown in the test vector

Select AES with ECB mode Select AES with ECB mode Set “Don’t compress” option on “General” page Set “Don’t compress” option on “General” page Do not change anything in the "initial vector" editor window Do not change anything in the "initial vector" editor window Press the "Encrypt" button and encrypt the file Press the "Encrypt" button and encrypt the file The process is finished The process is finished

Now check the ciphertext in the file “aesp” corresponds with NIST’s ciphertext or not Now check the ciphertext in the file “aesp” corresponds with NIST’s ciphertext or not Open the encrypted file in Hex Editor Open the encrypted file in Hex Editor Compare that green text with test vector and make sure they are identical Compare that green text with test vector and make sure they are identical

Cracking Encryption

Conclusion Information Security is becoming more important after Sept 11, 2001 Information Security is becoming more important after Sept 11, 2001 Encryption products - locks and keys of the Information Age Encryption products - locks and keys of the Information Age FineCrypt - Best freeware Cryptographic tool available on Internet FineCrypt - Best freeware Cryptographic tool available on Internet