Presentation is loading. Please wait.

Presentation is loading. Please wait.

Secure communication Informatics for economists II Jan Přichystal

Similar presentations


Presentation on theme: "Secure communication Informatics for economists II Jan Přichystal"— Presentation transcript:

1 Secure communication Informatics for economists II Jan Přichystal jprich@pef.mendelu.cz

2 Present-days problems Internet provides connection to whole world. Via interenet people share important and secure information: Internet banking, E-mail, Antivirus protection, Multi user operating systems etc. How to protect our data against unauthorized users?

3 Secure communication Steganography (hidden message) Cryptography (unreadable message) Substitution Transposition Code (word subst.) Cipher (letter subst.)

4 Steganography Steganos — (from greek) means hidden Graphein — means to write The aim is to hide message: Messages under hair on skin Messages on clay tables covered with wax Messages in microdots Messages hidden in pictures, audio, video...

5 Cryptography Cryptos — means secret We don't hide message but sense We need to encrypt and decrypt. Cryptography uses various scientific disciplines (mathematics, linguistic...).

6 Protection against unauthorized reading Cryptography — science of secret communication. Provides safety to sender and recipient of message. Cryptoanalysis — science of how to solve encrypted message without knowing the key.

7 Protection against unauthorized reading Encryption — protect message against unauthorized reading. Change original letters with new letters, thus result seems to be nonsense. Decryption — restoration of origin message. Message Algorithm Key Unreadable message

8 Encryption Encryption key — defines the sort of cipher alphabet. Example of key: Nancy Encryption algorithm — system of replacing each letter of plain text with letter of cipher alphabet.

9 Cryptography Two ways how to encrypt: Transposition — uses the same letters but their position in text is different hallo => laolh Substitution — changes letters to another hallo => ibmmp

10 Skytale Historicall first usage of cryptography Leather ribbon on wooden stick

11 Caesar's cipher a b c d e f g h i j k l m n o p q r s t u v w x y z d e f g h i j k l m n o p q r s t u v w x y z a b c Message: Cypher: veni, vidi, vici yhql, ylgl, ylgl Each letter in the message is shifted three places right (a = d).

12 Decryption − frequence analysis With knowledge of letter frequency in common alphabet and frequency of letters in cipher alphabet is possible to identify original message. Create the frequency table of both alphabets and compare them.

13 Vigener's cipher For each letter is used different cipher alphabet. Cipher alphaber changes according to key word. w h i t e w h i t e w h i t e w h i t e w h i d i v e r t t r o o p s t o e a s t r i d g e Key: Msg: Ciph: z p d x v p a z h s l z b h i w z b k m z n m

14 Enigma Cryptographic machine used by German army in WWII. Sophisticated system with several components: a plug board, a light board, a keyboard, a set of rotors, and a reflector (half rotor). The original machine looked a lot like a typewriter. When a key is pressed, an electrical current is sent through the machine. The current first passes through the plug board, then through the three rotors, through the reflector which reverses the current, back through the three rotors, back through the plug board and then the encrypted letter is lit on the display.

15 Enigma

16 Two types of encryption Symmetric encryption: — easy key creating; — quick; — problem with key distribution; Asymmetric encryption: — difficult key creating; — slow; — known key length;

17 Symmetric encryption All historic encryption methods mentioned above are symmetric. It is easy to use them. Symmetric methods are still usable, but algorithms are more complicated. One key is needed both for encryption and decryption. Modern methods provides secure passwords, web authorization etc. DES, 3DES, AES

18 Asymmetric encryption Two parts of key — public and private Usage 1 — for encryption use recipient public key, for decryption use recipient private key: Message can read ONLY authorized recipient Usage 2 — for encryption use sender private key, for decryption use sender public key: Recipient is sure about sender identity

19 Key distribution Certification authority — proves that certain private key is owned by certain person. Can prove sender identity Main functions of CA: — key generating; — key giving, evidence, resuming; — proving of key ownership.

20 Protection against unauthorized modification Fingerprint — binary sequence generated by special algorithm; it is unique for each message. Fingerprint check — after message transfer, new fingerprint is calculated and compared to transfered Electronic signature — sender private key encrypted fingerprint.

21 Sending safe and signed message Message Sym. key cc c Calculation Recipient public key Sender private key Safe key Safe message Electronic signature Fingerprint

22 Recieving of safe and signed message Safe key Safe message Electronic signature d Recipient private key d Message d Sender public key Fingerprint 1 Fingerprint Calculation = ?


Download ppt "Secure communication Informatics for economists II Jan Přichystal"

Similar presentations


Ads by Google