Encryption CS110: Computer Science and the Internet.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Digital Signatures. Anononymity and the Internet.
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
Cryptography in World War II Jefferson Institute for Lifelong Learning at UVa Spring 2006 David Evans Class 4: Modern Cryptography
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
Cryptography 101 How is data actually secured. RSA Public Key Encryption RSA – names after the inventors –Rivest, Shamir, and Adleman Basic Idea: Your.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption Methods By: Michael A. Scott
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Codes, Ciphers, and Cryptography-RSA Encryption
Introduction to Public Key Cryptography
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Rachana Y. Patil 1 1.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Cryptography CSPrinciples II February 12, Needs for Privacy What are some specific needs for privacy when using the internet?
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
CS110: Computers and the Internet Encryption and Certificates.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Encryption Coursepak little bit in chap 10 of reed.
Image Representation Privacy/Cryptography CS 104 October 3, 2011.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
David Evans CS200: Computer Science University of Virginia Computer Science Class 36: Public-Key Cryptography If you want.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Darci Miyashiro Math 480 April 29, 2013
Encryption.
Traditional Symmetric-Key Ciphers
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Multimedia Data Security and Cryptographic Algorithms Dr Sandra I. Woolley Electronic, Electrical.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cryptography – Test Review
CIT 380: Securing Computer Systems
Security Outline Encryption Algorithms Authentication Protocols
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
CSCI-235 Micro-Computer Applications
PART VII Security.
Public-Key, Digital Signatures, Management, Security
Chapter 29 Cryptography and Network Security
Fluency with Information Technology Lawrence Snyder
Presentation transcript:

Encryption CS110: Computer Science and the Internet

Encryption and security

Ciphers Encryption terminology: – plaintext: message to be sent, in readable form – ciphertext: message in coded form, unreadable without a key – encrypt: turn plaintext into ciphertext – decrypt: turn ciphertext back into plaintext – cryptanalysis: cracking a code without the required special information – cryptography: study of codes and code-breaking

Caesar ciphers The idea behind Caesar ciphers is letter substitution One strategy uses rotation Substitution codes are easy to break One strategy uses letter frequencies

How can we implement a Caesar cipher using the ASCII table?

Vigenere cipher: Multiple Caesar ciphers Using a Vigenere cipher to encrypt a message: – Select a keyword (e.g. CAT) – Convert the letters of the keyword to a sequence of rotations, each in the range from 0 to 25 (e.g. "CAT" is converted to the rotation sequence ) – Use the sequence of rotations to encode successive letters of the message, repeatedly cycling through the rotations (e.g ) Unbreakable for 300 years!

Private key encryption Key distribution problem: finding a secure way to send a private key in order to have a secure way to communicate

Public key encryption 1977, RSA method (Rivest, Shamir and Adleman): First practical implementation of public key encryption Main ideas of public key encryption: – Instead of one key, you have two: one to encrypt and a different one to decrypt – The encryption key can be public – Knowing the encryption key doesn't help you figure out the decryption key

Public key encryption

Secure communication

Is your information secure? Someone can hack into the server The server may not be trustworthy Someone can pretend to be you Someone may look over your shoulder when you type

Using public key for digital signatures Call off the attack, it’s a trap! Signed Alice Go on with the attack, it’s all clear! Signed Alice Problem: How does Bob know the identity of the sender? Solution: Alice encrypts the message with her private key Anyone can decrypt using Alice’s public key but she is the only one who can encrypt

Spoofing

Spoofing (2)

Certificates and signing authorities

Whom do you trust? Verified website: Unknown signer: