Encryption.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

IS 302: Information Security and Trust Week 4: Asymmetric Encryption
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Overview of Cryptography Oct. 29, 2002 Su San Im CS Dept. EWU.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
Csci5233 Computer Security & Integrity 1 Cryptography: Basics (2)
Public Encryption: RSA
RSA Exponentiation cipher
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Cryptography Prof. Seth D. Bergmann Rowan University Computer Science.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Encryption Methods By: Michael A. Scott
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Rachana Y. Patil 1 1.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Cryptography ECT 582 – Winter 2004 Robin Burke. Discussion.
CS110: Computers and the Internet Encryption and Certificates.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Encryption Coursepak little bit in chap 10 of reed.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
COEN 351 E-Commerce Security Essentials of Cryptography.
Cryptography, Authentication and Digital Signatures
Public-Key Cryptography CS110 Fall Conventional Encryption.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Darci Miyashiro Math 480 April 29, 2013
1 Public-Key Cryptography and Message Authentication.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
CompSci Today’s topics l Security ä Demo from RSA Security ( ä Sildes taken from Tammy Bailey ä Slides taken from Kevin Wayne & Robert.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Overview of Cryptography & Its Applications
COEN 351 E-Commerce Security
Encryption CS110: Computer Science and the Internet.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
CompSci Today’s topics l Security ä Demo from RSA Security ( ä Sildes taken from Tammy Bailey ä Slides taken from Kevin Wayne & Robert.
CompSci Today’s topics l Security ä Demo from RSA Security ( ä Sildes taken from Tammy Bailey ä Slides taken from Kevin Wayne & Robert.
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
INCS 741: Cryptography Overview and Basic Concepts.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CompSci Today’s topics l Security ä Demo from RSA Security ( ä Sildes taken from Tammy Bailey ä Slides taken from Kevin Wayne & Robert.
Secure Diffie-Hellman Algorithm
Today’s topics Demo from RSA Security (
Presentation transcript:

Encryption

RSA e-Security Experience http://www.rsasecurity.com/experience/esecurity/

Introduction Computer security is the prevention of or protection against access to information by unauthorized recipients intentional but unauthorized destruction or alteration of that information Authentication verifying the identity of a person or system password protection system (computer program) Encryption systematic transformation of a message into a form that obscures its original meaning

Encryption Goal: information security in presence of malicious adversaries confidentiality integrity authentication authorization non-repudiation Encryption is used to … prevent your kid sister from intercepting, reading, and/or altering your messages and files prevent CIA or FBI from intercepting, reading, and/or altering your messages and files

Cryptology Cryptology science of creating secret communication Cryptography science of creating secret codes Cryptanalysis science of code breaking decryption without the use of a key strength of an encryption algorithm is determined by the infeasibility of cryptanalysis as applied to the resulting code or cipher text

Terminology Encryption process of obscuring or scrambling data to render it incomprehensible to unauthorized viewers. Cipher text encrypted data or "code" Plain text original, readable data prior to encryption Cipher or encryption algorithm particular method for encrypting or scrambling data Key data required by the encryption algorithm to process the plain text and convert it to cipher text Decryption process of converting cipher text back into plain text requires a key and a decryption algorithm

encryption algorithm (cipher) Process Encryption encryption algorithm (cipher) encryption key Plain Text Cipher Text Decryption decryption algorithm decryption key

Participants Sender & Receiver people who want to communicate securely or in private Listener (eavesdropper) present on communication channel between sender and receiver The Problem: Suppose that Bob (the sender) wants to send Alice (the receiver) a message but knows that Eve (the eavesdropper) is trying and may very well intercept it. Bob and Alice need to agree on an encryption algorithm and a key. But Eve could intercept this as well. How do they get around this problem?

Padlock problem Imagine you wanted to send me a diamond in a box. If you sent it to me unlocked, then anyone could steal the diamond. If you send the box with a padlock, and ship a key separately, then whoever can intercept the box could also intercept the key to the padlock and steal the diamond. But, if I sent you the padlock in the unlocked position, and kept the key, then you could lock the box and only I could unlock it. If someone intercepted the lock, it would do him or her no good. I could be assured of being the only one able to unlock the box and receive the diamond.

Encrypted communication

Encryption algorithms Symmetric Key perform encryption and decryption with a single key Examples DES/3DES Blowfish, IDEA Asymmetric Key separate keys used for encryption and decryption public key private key Examples RSA DSA

Symmetric key algorithms Perform encryption and decryption with a single key Advantages algorithms are very fast computationally less intensive Security of system determined by protecting the "secret key" from disclosure Applicable only in situations where the distribution of the key can occur in a secure manner

Asymmetric algorithms (public key) Two separate keys used for encryption and decryption public key used for encryption, not secret, available for widespread dissemination private key used for decryption private to the individual who owns it Plain text encrypted with one key can be decrypted with the other key only similar to a mailbox Computationally infeasible to derive the private key from the known public key

Secure communication?

Public key cryptography Alice and Bob would like to communicate with each other in private Bob already has Alice's public key Bob encrypts his message to Alice with her public key Alice receives the message and decrypts it using her private key If Eve were to capture Bob's message in transit and re-send it to conceal her presence, she will be unable to decrypt it just by owning a copy of Alice's public key Eve can try to obtain the private key from the public key but it will take her a prohibitively long time to do so

RSA encryption Rivest, Shamir, and Adleman, MIT, 1977 Most widely-used cryptosystem Depends on the difficulty of factoring very large integers into prime factors primes are positive integers that are divisible only by 1 and themselves Examples 42 = 7*3*2 10584 = 7*7*3*3*3*2*2*2 437 = 23*19 4453 = 73*61

RSA algorithm Select two large prime numbers p and q Compute n = p*q v = (p-1)*(q-1) Select integer k relatively prime to (not a factor of) to v Compute d such that d*k = k*d = 1 (mod v) Public key is (n, k) Private key is (d, n) Example p = 11 q = 29 n = 319 v = 280 k = 3 d = 187 public key (319,3) private key (187, 319)