MM Clements Cryptography. Last Week....... Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Information Security & Cryptographic Principles. Infosec and Cryptography Subjects / Topics : 1. Introduction to computer cryptography 1. Introduction.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Cryptography Basic (cont)
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Linux Networking and Security Chapter 8 Making Data Secure.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
RSA Ramki Thurimella.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Chapter 8: Scrambling Through Cryptography Security+ Guide to Network Security Fundamentals Second Edition.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Cryptography, Authentication and Digital Signatures
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Public Key Encryption.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Lecture 2: Introduction to Cryptography
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Cryptography Gerard Klonarides. What is cryptography? Symmetric Encryption Symmetric Encryption Asymmetric Encryption Asymmetric Encryption Other cryptography.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography – Test Review
Web Applications Security Cryptography 1
Basics of Cryptography
Computer Communication & Networks
Basic Network Encryption
Cryptography.
DISSERTATION ON CRYPTOGRAPHY.
Basic Network Encryption
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

MM Clements Cryptography

Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot configure itself, or prevent the firewall administrator from configuring it badly A firewall should be considered as part of a network security solution, not as the network security solution 2 ENS

This week - Cryptography The purpose of cryptography History of cryptography Types of algorithms in cryptography Security requirements Message digests Digital Signatures & Certificates Authentication, non-repudiation 3 ENS

Why use cryptography? Privacy of information Industrial information – recipes of bakers were once encrypted Military information – strategies etc. Computer records need to be kept safe Banking and other financial information ENS 4

History of cryptography c BC non-standard hieroglyphs used in Egypt Used by Greeks, Romans and many other civilizations to keep military information secret Mathematician Al-Kindi wrote a book on cryptography in 9 th century Rotor machines e.g. Enigma used in WW2 by Germans Computers made complex cryptography possible ENS 5

Security Requirements Authentication: Am I who I say I am? Privacy/confidentiality: Nobody can read the message except the intended receiver Integrity: The received message has not been changed Non-repudiation: Proof that the message has been sent (or received) ENS 6

Algorithms in cryptography Generally three types of cryptographic schemes – Secret key (or symmetric) cryptography – Public-key (or asymmetric) cryptography – Hash functions Start with plaintext, encrypted into ciphertext then decrypted to plaintext at the destination ENS 7

Bob, Alice and Eve Cryptography uses Bob and Alice as examples Helps when describing processes Bob wants to send a message to Alice over an insecure channel, how does he do this? Eve is the eavesdropper ENS 8

9

Secret Key Cryptography Symmetric encryption This is a system where an algorithm is used to convert text into ciphertext and at the receiver, the same algorithm is used in reverse to recover the original message Simple example is substitution cipher where different letters are used to represent letters of the alphabet ENS 10

A Substitution Cipher ENS 11

Breaking Ciphers Done using frequency analysis Letters are used more frequently in any particular language. Letters appear together in pairs and have frequencies too See resources for this week for an example ENS 12

Problems with Symmetric Cryptography Both users need the same key If users are remote, how do we send keys? Analogue methods may need to be used e.g. a courier ENS 13

Symmetric Cryptography Operation Generally either stream ciphers or block ciphers Stream ciphers encrypt a single bit (byte or computer word) at a time and implement some form of feedback mechanism so that the key is constantly changing Block ciphers encrypt one block of data at a time using the same key on each block Work very well and quickly on today’s hardware ENS 14

Symmetric Technologies DES, replaced by 3DES (triple DES) Advanced Encryption Standard (AES) International Data Encryption Algorithm (IDEA) Rivest Ciphers, RC1 – RC6 Blowfish Twofish Etc. ENS 15

Public or Asymmetric Key Cryptography The principles of public key cryptography (PKC) were first invented by James Ellis, Clifford Cocks and Malcolm Williamson at GCHQ in the early 1970s – Classified by British Government until 1997 – See Uses two keys, a public key and a private key Can publish the encryption key Decryption key is kept secret Now there is no need to distribute the decryption key – problem solved ENS 16

ENS 17

Publishing of Public-Key Research Martin Hellman and graduate student Whitfield Diffie published their work in 1976 Public-Key (PK) Relies on one-way functions Multiplication vs. Factorization I have two numbers 5 and 12. Their product is 60 (5 x 12 = 60) If I give you the answer, how long will it take you to discover the initial numbers 5 & 12? ENS 18

PK Cryptography Implementation RSA: The first, and still most common Diffie-Hellman Digital Signature Algorithm (DSA) ElGamal Unfortunately, PKC does not work very quickly so is used to pass the keys for symmetric encryption rather than passing messages ENS 19

PK Cryptography Keys Keys are mathematically related Knowledge of one key does not allow Eve to discover the second key Knowledge of the ciphertext plus one key will not allow Eve to discover the second key It does not matter which key is used first One is public, the other becomes private key ENS 20

Uses of PKC – non-repudiation This method could be also used to prove who sent a message Alice can encrypt some plaintext with her private key Bob decrypts using Alice's public key Bob knows that Alice sent the message and Alice cannot deny having sent the message (non- repudiation). ENS 21

Hash Functions Also called message digests and one-way encryption Uses no key A fixed-length hash value is computed from the plaintext Cannot recover plaintext but provides digital fingerprint to show file has not been altered in any way ENS 22

Uses of Hashing Operating systems often store a hashed version of a password to keep password hidden When a user logs in, the hashed password is compared against the stored hash ENS 23

Hash Implementations MD algorithms – MD2, MD4, MD5 Secure Hash Algorithm (SHA) RIPEMD HAVAL (HAsh of VAriable Length) Etc. ENS 24

ENS 25

Hybrid use of techniques Can now create digital signature and digital envelope Digital envelope comprises an encrypted message and an encrypted session key Alice uses secret key cryptography to encrypt her message using the session key Alice then encrypts the session key using Bob's public key This becomes the digital envelope Bob is able to decrypt firstly the session key and then the encrypted message ENS 26

Digital Signature Alice creates a hash value of her message Alice encrypts the hash value with her private key Bob recovers the hash value with Alice’s public key Bob uses the hash algorithm to check the hash values are the same for the received message and Alice’s hash value ENS 27

Public Key Certificates Allows public keys to be shared Allows revocation in case of compromise Certificate contains a public key, a name, an expiration date, the name of the authority that issued the certificate Typically found in browsers Certificate authorities are the repositories for public-keys and can be any agency that issues certificates ENS 28

ENS 29

Conclusion Three main methods for cryptography Symmetric, asymmetric, hash Used in unique combinations Allow Bob and Alice to communicate without Eve knowing ENS 30

References Kessler, G, 1998, An Overview of Cryptography, Handbook on Local Area Networks, Auerbach ENS 31

Image References accessed 07/02/ :31 accessed 07/02/ : /02/ : /02/ :33 content/uploads/images/Authentication.jpg 07/02/ :35 content/uploads/images/Authentication.jpg 07/02/ :35 AbU/ZMyxfVCSVAo/s1600/symmetric_key.gif 07/02/ :51 AbU/ZMyxfVCSVAo/s1600/symmetric_key.gif 07/02/ : /02/ : /02/ :39 ENS 32