Presentation is loading. Please wait.

Presentation is loading. Please wait.

CSCI-235 Micro-Computer Applications

Similar presentations


Presentation on theme: "CSCI-235 Micro-Computer Applications"— Presentation transcript:

1 CSCI-235 Micro-Computer Applications
Privacy & Security II

2 The Encryption Debate Encryption is the coding and scrambling process by which a message is made unreadable except by the intended recipient Encryption is needed for electronic commerce

3 Simplified Communications Model - Diagram

4 Simplified Data Communications Model

5 Encryption Basics A readable message is called plaintext
An encryption algorithm is a formula used to make plaintext unreadable The coded message is called ciphertext I LOVE YOU V YBIR LBH

6 Encryption Basics Symmetric key encryption are encryption techniques that use the same key to encrypt and decrypt a message Strong encryption refers to encryption methods that are used by banks and military agencies and are nearly impossible to break

7 Symmetric Encryption or conventional / private-key / single-key
sender and recipient share a common key all classical encryption algorithms are private-key was only type prior to invention of public-key in 1970’s

8 Basic Terminology plaintext - the original message
ciphertext - the coded message cipher - algorithm for transforming plaintext to ciphertext key - info used in cipher known only to sender/receiver encipher (encrypt) - converting plaintext to ciphertext decipher (decrypt) - recovering ciphertext from plaintext cryptography - study of encryption principles/methods cryptanalysis (codebreaking) - the study of principles/ methods of deciphering ciphertext without knowing key cryptology - the field of both cryptography and cryptanalysis

9 Symmetric Cipher Model

10 Requirements two requirements for secure use of symmetric encryption:
a strong encryption algorithm a secret key known only to sender / receiver Y = EK(X) X = DK(Y) assume encryption algorithm is known implies a secure channel to distribute key

11 Classical Substitution Ciphers
where letters of plaintext are replaced by other letters or by numbers or symbols

12 Caesar Cipher earliest known substitution cipher by Julius Caesar
first attested use in military affairs replaces each letter by k-th letter on Example ( what is k ? ): meet me after the toga party PHHW PH DIWHU WKH WRJD SDUWB

13 Caesar Cipher can define transformation (with k = 3) as:
a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C mathematically give each letter a number a b c d e f g h i j k l m n o p q r s t u v w x y Z then have Caesar cipher as: Y = EK(X) = (X + k) mod 26 X = DK(Y) = (Y – k) mod 26 EXAMPLE: Encrypt “howdy” using key k = 5

14 Cryptanalysis of Caesar Cipher
only have 26 possible ciphers A maps to A,B,..Z could simply try each in turn a brute force search given ciphertext, just try all shifts of letters

15 © Prentice-Hall, Inc

16 Private-Key Cryptography
traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications are compromised also is symmetric, parties are equal

17 Public-Key Cryptography
probably most significant advance in the 3000 year history of cryptography uses two keys – a public & a private key asymmetric since parties are not equal uses clever application of number theoretic concepts to function complements rather than replaces private key cryptography

18 Public-Key Cryptography
public-key/two-key/asymmetric cryptography involves the use of two keys: a public-key, which may be known by anybody, and can be used to encrypt messages, and verify signatures a private-key, known only to the recipient, used to decrypt messages, and sign (create) signatures is asymmetric because those who encrypt messages or verify signatures cannot decrypt messages or create signatures

19 Public-Key Cryptography

20 Public-Key Characteristics
Public-Key algorithms rely on two keys with the characteristics that it is: computationally infeasible to find decryption key knowing only algorithm & encryption key computationally easy to en/decrypt messages when the relevant (en/decrypt) key is known

21 Digital Signatures and Certificates
Digital signatures are a technique used to guarantee that a message has not been tampered with Digital certificates are a technique used to validate one’s identity


Download ppt "CSCI-235 Micro-Computer Applications"

Similar presentations


Ads by Google