Cryptography Fundamentals

Slides:



Advertisements
Similar presentations
Symmetric Message Authentication Codes Prof. Ravi Sandhu.
Advertisements

Public Key Infrastructure and Applications
Conventional Encryption: Algorithms
CIS 193A – Lesson6 CRYPTOGRAPHY RAPELCGRQ. CIS 193A – Lesson6 Focus Question Which cryptographic methods help computer users maintain confidentiality,
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
Using Cryptography to Protect Data in Computer Networks: case study Vsevolod Ievgiienko National Taras Shevchenko University of Kiev Faculty of Cybernetics.
Introduction to PKI, Certificates & Public Key Cryptography Erwan Lemonnier.
An In-Depth Examination of PKI Strengths, Weaknesses and Recommendations.
HASH ALGORITHMS - Chapter 12
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Public Key Infrastructure Ammar Hasayen ….
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Crypto Bro Rigby. History
Introduction to Stream Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
S. Muftic Computer Networks Security 1 Lecture 4: Message Confidentiality and Message Integrity Prof. Sead Muftic.
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Primitive Operations. Communication Operations –Reader to tag Read Write –Tag to Tag Read Write Hash and Encryption Operations –Hash: MD5, Sha-1, Sha-256,
8.4 – 8.5 Securing & Securing TCP connections with SSL By: Amanda Porter.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Network Security David Lazăr.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Password Security & Software Encryption n John Barthmaier n October 21, 2009.
Confidentiality Confidentiality is maintained so long as private keys are secure. Authenticity is possible via public-key encryption by encrypting messages.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.
Chapter 7: Cryptographic Systems
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Lecture 2: Introduction to Cryptography
Class 4 Asymmetric Cryptography and Trusting Internal Components CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Potential vulnerabilities of IPsec-based VPN
Virtual Private Network (VPN)
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
CIA AAA. C I A Confidentiality I A Confidentiality Integrity A.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Biometric Encryption Base RSA Algorithm Supervisor: Ass. Prof. Dr. Dang Tran Khanh Student: Dung Ngo Dinh.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Fundamentals of Network Security Ravi Mukkamala SCI 101 October 6, 2003.
Security Protecting information data confidentiality
Web Applications Security Cryptography 1
Digital Signatures Last Updated: Oct 14, 2017.
BPSEC Updates Edward Birrane
Cryptography Fundamentals
Presentation transcript:

Cryptography Fundamentals Author : Ammar Hasayen Twitter: @ammarhasayen Web: http://ammarhasayen.com About me : http://ammarhasayen.com/me Contact me : me@ammarhasayen.com Presentation: Cryptography Fundamentals Version : 1.0 Duration : 30 minutes Written on Feb 2014 Note: Feel free to use this presentation at your side. Ammar Hasayen

Back in time

SPARTANS MILITARY (GREEKS) kryptos gráphō hidden writing Cryptography

Before and after

How things worked before Corporate walls Badges Face to Face Paper work Confidentiality Authenticity Trust Delivery Historically speaking, all work is done inside corporate walls. Investments were in secure walls, physical security and security cameras. Identity is identified by corporate badges. The badge contains the person’s name, picture and perhaps his role in the corporate. Most interactions were face to face, so authenticity was achieved by identifying people faces and badges. Most of the work was paper work and lot of archives. Confidentiality were archived by stamping papers as confidential and may be secure them in a closed room. Authenticity were archived by manual signatures or stamps. Trust is hard to achieve as you have to trust the signature in the paper or the badge that people are wearing. If you want to move papers around, you have to trust the courier.

Digital Collaboration How things working Now World is the limit Digital ID Virtual Team Digital Collaboration Anywhere BYOD Wireless Nowadays, the world is the limit. You are dealing with people who you do not know or did not meet before. Corporates are big, and within the same corporate, you are exchanging information with people you do not know. Virtual teams are popular know. Teams do not have to be physical located in the same room or floor. Digital Collaboration with Email, IM, Conferencing and Chat rooms are the way to communicate inside corporates. All this push the need to define a solid and secure digital identity that your business can depend on as a platform for all digital collaboration and transactions. Even worst, People are working from home, internet cafes and while traveling. The need to provide secure remote access has never been urgent as nowadays. BYOD (Bring Your Own Device) is another concern. You can see people with more than device, and synching corporate email from different devices, and may be doing VOIP calls from another. Wireless is everywhere, and securing wireless network is a must. You need a way to authenticate the access point to avoid wireless attacks. And finally, everyone is paying online, credit cards information should be transmitted securely and stored securely. E-transactions

C.I.A Confidentiality Integrity Authenticity

Confidentiality Encryption …. Confidentiality Encryption

Encryption – via Key Symmetric Encryption Key (K) Encrypted Message Encryption Algorithm Encrypted Message Message Symmetric Encryption Key (K)

Encryption – Current Standards AES DES 3DES

…. Integrity Hashing

Changing Content Key (K) Encrypted Message Message Encryption Algorithm Hack Encrypted Message Message Key (K) 2 aspirin /day 20 aspirin /day

Integrity via Hash Unique Message Hash Value 001001001 111001110 Hash Algorithm Unique Hash Value Message We are all Moath Hash Algorithm 001001001 Wee are all Moath Hash Algorithm 111001110

Complete Solution Encrypted Message Message Unique Hash Value Encryption Algorithm Encrypted Message Key (K) Message Hash Algorithm Unique Hash Value

Key (K) Message Encrypted Message Unique Hash Value Unique Hash Value Encryption Algorithm Message Encrypted Message Hash Algorithm Key (K) Unique Hash Value Unique Hash Value

Hash – Current Standards MD5 SHA-2 SHA1

…. Thank You