Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

Public Key Infrastructure and Applications
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Cryptography Basic (cont)
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Encryption Methods By: Michael A. Scott
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Hands-On Ethical Hacking and Network Defense Chapter 12 Cryptography Last modified
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
Networks Management and Security Lecture 3.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Chapter 21 Public-Key Cryptography and Message Authentication.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.
Welcome to the Introduction of Digital Signature Submitted By: Ankit Saxena.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Elliptic Curve Cryptography
Potential vulnerabilities of IPsec-based VPN
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Hands-On Ethical Hacking and Network Defense 2 nd Edition Chapter 12 Cryptography Last modified
Cryptography Gerard Klonarides. What is cryptography? Symmetric Encryption Symmetric Encryption Asymmetric Encryption Asymmetric Encryption Other cryptography.
Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical.
Network Security Celia Li Computer Science and Engineering York University.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
INCS 741: Cryptography Overview and Basic Concepts.
1 Public Key Cryptography. 2 Public Key Cryptography Agenda: Message authentication – authentication codes and hash functions Public key encryption –
Basics of Cryptography
Public Key Cryptosystem
Public Key Encryption and Digital Signatures
Public-Key Cryptography and RSA
Fluency with Information Technology Lawrence Snyder
Presentation transcript:

Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures

2 Symmetric Cryptography One key encrypts and decrypts data Cleartext with Key makes Ciphertext Ciphertext with Key makes Cleartext Winning Lotto Winning Lotto #s:

3 Symmetric Cryptography Algorithms Symmetric algorithms have one key that encrypts and decrypts data Advantages –Symmetric algorithms are fast –They are difficult to break if a large key size is used –Only one key needed

4 Symmetric Cryptography Algorithms Disadvantages –Symmetric keys must remain secret –Difficult to deliver keys (key distribution) –Symmetric algorithms don’t support authenticity or nonrepudiation You can’t know for sure who sent the message, since two people have the same key

5 Symmetric Algorithms (Private-key) NameKey sizeNotes DES56 bitsInsecure 3DES168 bitsBeing replaced by AES AES128,192, or 256 US Govt classified info IDEA128 bitsUsed in PGP, very secure Blowfish32 to 448 Public domain RC5Up to 2040 Secure for 72-bits or more

6 Asymmetric Cryptography Algorithms Use two keys that are mathematically related –Data encrypted with one key can be decrypted only with the other key Another name for asymmetric key cryptography is public key cryptography –Public key: known by the public –Private key: known only by owner

7 Asymmetric Cryptography Cleartext with Public Key makes Ciphertext Ciphertext with Private Key makes Cleartext Winning Lotto Winning Lotto #s:

8 Asymmetric Cryptography Provides message authenticity and nonrepudiation –Authenticity validates the sender of a message –Nonrepudiation means a user cannot deny sending a message

9 Asymmetric Cryptography Asymmetric algorithms are more scalable but slower than symmetric algorithms –Scalable: can adapt to larger networks –Each person needs only one key pair Everyone can use the same public key to send you data Each person signs messages with their own private key

10 RSA Developed in 1977 by Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman The algorithm is based on the difficulty of factoring large numbers The Secure Socket Layer (SSL) protocol uses the RSA algorithm

11 Diffie-Hellman Developed by Whitfield Diffie and Martin Hellman Does not provide encryption but is used for key exchange –Two parties agree on a key without ever sending it directly over the network –The numbers transmitted can be used to compute the key, but only by the parties holding secret private numbers Prevents sniffing attacks

12 Elliptic Curve Cryptosystems (ECC) It is an efficient algorithm requiring few resources –Memory –Disk space –Bandwidth ECC is used for encryption as well as digital signatures and key distribution

13 Elgamal Public key algorithm used to –Encrypt data –Create digital signature –Exchange secret keys Written by Taher Elgamal in 1985 The algorithm uses discrete logarithm problems –Solving a discrete logarithm problem can take many years and require CPU-intensive operations

14 Digital Signatures A hash value ensures that the message was not altered in transit (integrity) Provide message integrity, authenticity and nonrepudiation

15 From Wikipedia

16 Digital Signature Standard (DSS) Established by the NIST in 1991 –Ensures that digital signatures rather than written signatures can be verified Federal government requirements –RSA and Digital Signature Algorithm (DSA) must be used for all digital signatures –Hashing algorithm must be used to ensure the integrity of the message NIST required that the Secure Hash Algorithm (SHA) be used

17 Hashing Algorithms NameNotes MD2Written for 8-bit machines, no longer secure MD4No longer secure MD5Security is questionable now SHA-1The successor to MD5, Used in: TLS, SSL, PGP, SSH, S/MIME, IPsec No longer completely secure SHA-2Not yet broken, but no longer recommended. NIST is now developing a new algorithm to replace SHA.