Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Public Key Infrastructure and Applications
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
Principles of Information Security, 2nd edition1 Cryptography.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Electronic mail security -- Pretty Good Privacy.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption Methods By: Michael A. Scott
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Public Key Model 8. Cryptography part 2.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Linux Networking and Security Chapter 8 Making Data Secure.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Cryptography, Authentication and Digital Signatures
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Wiretapping and Encryption More Week 5 cont.. Early Forms of Wiretapping uParty Lines uHuman Operators.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 14 Network Security: Firewalls and VPNs.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Lecture 2: Introduction to Cryptography
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
By Hani AlQaffas.  Cryptography is a technique used to hide the meaning of a message and is derived from the Greek word kryptos (hidden).  This is different.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Encryption CS110: Computer Science and the Internet.
Mort Anvari Introduction to Encryption Technology To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
Chaos, Communication and Consciousness Module PH19510 Lecture 13 Encryption in the Computer Age.
April 20023CSG11 Electronic Commerce Encryption John Wordsworth Department of Computer Science The University of Reading Room.
Privacy and Security Topics From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Known Information Software.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
ENGR 101 Compression and Encryption. Todays Lecture  Encryption  Symmetric Ciphers  Public Key Cryptography  Hashing.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Wiretapping and Encryption
PART VII Security.
NET 311 Information Security
Fluency with Information Technology Lawrence Snyder
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Encryption Basics Module 7 Section 2

History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all communications between US and other countries and within –Designs codes and breaks codes

History Developed by Diffie & Hellman Two mathematically related keys –to encrypt –to decrypt Knowing the key to encrypt does not help decrypt Each person has their own key pair

History The encrypting key can become public Public key - encrypt Private key - decrypt Senders can ID the recipients public key to encrypt yet only the recipient can decrypt it. No need to transfer secret keys

Cryptography - Making and breaking of secret codes Translation of the original message into a new incomprehensible one by a mathematical algorithm using a specific KEY Plaintext - a message or data Ciphertext - coded text Decryption - decoding back to plaintext

Encryption Includes: Coding scheme or cryptographic algorithm Specific sequence of characters key used by the algorithm

Examples Cereal box codes Substitute cipher Cryptoquip in newspaper

Variations - Symmetric Use the same key to encrypt and decrypt (secret key) Requires a more secure system to send the key than the system itself

Public Key Cryptography Public Keys –Secret key for each pair of parties who wish to communicate privately –key is passed between the parties in a method more secure than the method used for sending the messages

Variations - Asymmetric Use a key (public key) to encrypt a message Another (private key) to decrypt it Requires both keys

Reliability The longer the key has remained unbroken, the stronger it is likely to be The longer the key is in use, the more likely someone will be able to discover it –larger amount of info will be compromised –change key frequently

Available Algorithms DES – Data Encryption Standard RSA algorithm PGP – Pretty Good Privacy IDEA – International Data Encryption Algorithm Digital Signature

DES - Data Encryption Standard Developed by IBM Adopted as a Federal Information Processing Standard Uses a 56 bit key Has been broken To extend life - extend key to 128 bits –or triple DES

RSA algorithm Used in public key cryptography Patented in US Based on multiplication of large prime numbers

PGP - Pretty Good Privacy Based on RSA Used for protecting Free Distributed on Internet Developed by Zimmerman for use with E- Mail

IDEA - International Data Encryption Algorithm 1991 in Switzerland Uses bit key More mathematical theory than DES

Digital Signature Add a statement of acceptance to the electronic document –encrypted with private key –cyphertext is decrypted with public key –providing any other key produced gibberish Others can decrypt and read but only the one with the right key is signed