SlideShare a Scribd company logo
1 of 21
Download to read offline
CYBER SECURITY
INTRODUCTION TO CRYPTOGRAPHY
VERSION: 1.3
DATE: 25/09/2019
AUTHOR: SYLVAIN MARTINEZ
REFERENCE: ES-CSIC
CLASSIFICATION: PUBLIC
2
• Presentation goal;
• Definition;
• History;
• Main types;
• Logical Operations;
• Concept;
• Main Algorithms;
• Concept;
• Type of algorithms;
• ECB;
• CBC;
• Stream Cipher
concept;
• Keystream;
• Main Algorithms;
• Overall Concept;
• Main Algorithms;
CONTENTS
PUBLIC
CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT
• Take Away;
PRESENTATION GOAL
3
LEARN ABOUT ITS MAIN USAGE
3
LEARN ITS MAIN ALGORITHMS
2
LEARN ABOUT CRYPTOGRAPHY
CORE CONCEPTS
1
TO LEARN ABOUT CRYPTOGRAPHY
CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT
Icons: from The Noun Project unless stated otherwisePUBLIC
DEFINITION
4PUBLIC
CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT
CRYPTOGRAPHY is the science related to hiding
information. With the aim to provide a combination
or all of the following: Confidentiality, Integrity,
Authentication and Non-repudiation. This can be
achieved through the design of cipher algorithms.
HISTORY
5PUBLIC
CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT
KRYPTOS (Greek) meaning HIDDEN, SECRET
1900 BC
NON STANDARD
HIEROGLYPHS
1500 BC
MESOPOTAMIA
CLAY TABLETS
700 BC
SCYTALE
SPARTAN
KAMA SUTRA
300 BC 50 BC
CAESAR SHIFT CIPHER
VIGENÈRE CIPHER
1553 1586
STEGANOGRAPHY
QUEENS OF SCOTS
1940
WWII - ENIGMA
QUANTUM COMPUTER
2000s
MAIN TYPES
6PUBLIC
CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT
HIDE DATAENCRYPTION
REVEAL ORIGINAL DATADECRYPTION
CREATES A UNIQUE SIGNATURE FROM DATAHASH
HIDE DATA WITHIN OTHER DATASTEGANOGRAPHY
LOGICAL OPERATIONS
7PUBLIC
CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT
1
1
OR
=
1
0
0
OR
=
0
1
0
OR
=
1
1
1
AND
=
1
0
0
AND
=
0
1
0
AND
=
0
1
1
XOR
=
0
0
0
XOR
=
0
1
0
XOR
=
1
OR AND XOR
NOR NAND XNORMORE LOGICAL OPERATIONS: NOT
CONCEPT
8PUBLIC
CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT
To be, or
not to be:
That is the
question
INPUT
HASH FUNCTION
4565 DEFG
2C4G FG67
DIGEST
COMPLETELY DIFFERENT HASH
DIFFERENT HASH
CANNOT REVERT HASH
SAME HASH
AVALANCHE EFFECT
UNIQUE
ONE WAY
FAST
DETERMINISTIC
SMALL SOURCE CHANGE
DIFFERENT SOURCE
"CLEAR TEXT" SOURCE
SAME SOURCE
IDEAL HASH FUNCTION
MAIN ALGORITHMS
9PUBLIC
CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT
ALGORITHM ORIGIN SPECIFICITY MAIN USAGE
MD5
RONALD RIVEST
1991
128-BIT HASH VALUE
4 ROUNDS OF 16
OPERATIONS (XOR, AND,
OR, NOT)
DATA INTEGRITY &
CHECKSUM
SSL DIGITAL CERT
PASSWORDS
COLLISION ATTACK
NO LONGER SUITABLE
STILL WIDELY IN USE
SHA-1
NSA
1995
160-BIT HASH VALUE
HEXADECIMAL
40 DIGITS LONG
80 ROUNDS
CHECKSUM, PWD,
SSL/TLS CERT (NOT NOW)
U.S GOV APPROVED
COLLISION ATTACK
SHATTERED
CHOSEN-PREFIX
NO EASY/CHEAP ATTACKS
SHA-2
NSA
2001
224, 256, 384, 512-BIT
HASH VALUE
64 OR 80 ROUNDS
CHECKSUM, PWD,
BITCOIN, TLS, SSL, PGP,
SSH, S/MIME, DKIM,
DNSSEC, IPSEC
PARTIAL COLLISION
ATTACK ONLY
SHA-3
NSA
2015
KECCACK FAMILY
SPONGE CONSTRUCTION
ABSORBED/SQUEEZED
PADDING, PERMUTATION
CHECKSUM, PWD,
ETHEREUM, TLS, SSL,
DNSSEC, IPSEC
NONE KNOWN YET
RISKS
OVERALL CONCEPT
10PUBLIC
CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT
PASSWORD/ KEY
ENCRYPTION
DECRYPTION
To be, or
not to be:
That is the
question
PLAIN TEXT
fDrTrg1er
65Hjt2s,R.
Lks.,3!dAc
dvijn4sv
CIPHER TEXT
INPUT IS BROKEN INTO BLOCK OF DATA
EACH BLOCK OF DATA IS ENCRYPTED/DECRYPTED
INPUT IS BROKEN INTO A STREAM OF DATA
EACH BITS OF DATA IS ENCRYPTED/DECRYPTED
TYPE OF CIPHER ALGORITHMS
11PUBLIC
CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT
BLOCK CIPHER
STREAM CIPHER
BLOCK CIPHER CONCEPT - ECB
12PUBLIC
CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT
Source: https://elysiumsecurity.com/crypto/page_crypto.html
ELECTRONIC CODEBOOK MODE (ECB)
BLOCK CIPHER CONCEPT - CBC
13PUBLIC
CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT
Source: https://elysiumsecurity.com/crypto/page_crypto.html
CHAIN BLOCK CHAINING MODE (CBC)
STREAM CIPHER CONCEPT
14PUBLIC
CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT
To be, or
not to be:
That is the
question
PLAIN TEXT
fDrTrg1er
65Hjt2s,R.
Lks.,3!dAc
dvijn4sv
CIPHER TEXT
…010010010101… …001011011100…
…110100010110…
PASSWORD/ KEY
XOR
KEYSTREAM GENERATOR
LINEAR FEEDBACK SHIFT REGISTER (LFSR)
STREAM CIPHER CONCEPT – KEYSTREAM LFSR
15PUBLIC
CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT
MAIN ALGORITHMS
16PUBLIC
CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT
ALGORITHM ORIGIN SPECIFICITY MAIN USAGE
RC4
RONALD RIVEST
1987
40-2018 BITS
1 ROUND
PERMUTATION "S"
KEY-SCHEDULING IV
WEP, WPA, BITTORRENT,
MS REMOTE DESKTOP,
KERBEROS, SKYPE, SSH
MULTI SESSION ATTACK
ROYAL HOLLOWAY
NO LONGER IN TLS
[DES]
TRIPLE DES
IBM
[1975], 1998
KEY: 168, 112, [56] BITS
BLOCK: 64 BITS
[16], 48-DES ROUNDS
STANDARD USED
GLOBALLY (CREDIT CARD,
PGP, ETC).
[S-BOX RESISTANT 20
YEARS EARLY]
NO LONGER SECURED
TWOFISH
BRUCE SCHNEIER
1998
KEY: 128, 192, 256 BITS
BLOCK: 128 BITS
16 ROUNDS
AES FINALIST
OPENPGP
DIFFERENTIAL ATTACK
AES
(RIJNDAEL)
VINCENT RIJMEN
JOAN DAEMEN
1998
KEY: 128, 192, 256 BITS
BLOCK: 128 BITS
10, 12 or 14 ROUNDS
NEW STANDARD
DES/TDES REPLACEMENT
SINCE 2002
XSL ATTACK
RELATED KEY ATTACK
NO PRACTICAL ATTACKS
RISKS
OVERALL CONCEPT – RECEIVING DATA
17PUBLIC
CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT
PUBLIC KEY
ENCRYPTION
DECRYPTION
To be, or
not to be:
That is the
question
PLAIN TEXT
fDrTrg1er
65Hjt2s,R.
Lks.,3!dAc
dvijn4sv
CIPHER TEXT
PRIVATE KEY
OVERALL CONCEPT - AUTHENTICATION
18PUBLIC
CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT
PUBLIC KEY
ENCRYPTION
DECRYPTION
To be, or
not to be:
That is the
question
PLAIN TEXT
fDrTrg1er
65Hjt2s,R.
Lks.,3!dAc
dvijn4sv
CIPHER TEXT
PRIVATE KEY
MAIN ALGORITHMS
19PUBLIC
CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT
ALGORITHM ORIGIN SPECIFICITY MAIN USAGE
RSA
RIVEST
SHAMIR
ADLEMAN
1977
FACTORISATION
KEY: 1,024 – 4,096 BITS
1 ROUND
TLS, SSH, ETC.
FACTORING PROBLEM
NO LONGER A PROBLEM
ECDSA
NIST
2005
ELLIPTIC CURVE
𝑦"
= 𝑥%
+ 𝑎𝑥 + 𝑏
SIGNATURE,
KEY AGREEMENT, PRG
SONY/FAILOVERFLOW
JAVA FLAWS
DSA
NIST
1991
ELLIPTIC CURVE
KEY GENERATION
KEY DISTRIBUTION
SIGNING
SIGNATURE VERIF
SECRECY AND
RANDOMNESS OF K
DIFFE-HELMAN
WHITFIELD DIFFIE
MARTIN HELLMAN
1976
MULTIPLICATIVE GROUP
OF INTEGERS MODULO P
KEY AGREEMENT
PROTOCOL
MAN IN THE MIDDLE
LOGJAM ATTACK
RISKS
TAKE AWAY
20PUBLIC
CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT
ONLY USE STANDARD ALGORITHMS1
BEWARE OF THE IMPLEMENTATION2
KEEP YOUR PRIVATE KEYS SAFE3
BEWARE OF EXTERNAL FACTORS4
CHECK FIPS CERTIFICATION DETAILS5
© 2015-2019 ELYSIUMSECURITY LTD
ALL RIGHTS RESERVED
HTTPS://WWW.ELYSIUMSECURITY.COM
CONSULTING@ELYSIUMSECURITY.COM
ABOUT ELYSIUMSECURITY LTD.
ELYSIUMSECURITY PROVIDES PRACTICAL EXPERTISE TO IDENTIFY
VULNERABILITIES, ASSESS THEIR RISKS AND IMPACT, REMEDIATE THOSE
RISKS, PREPARE AND RESPOND TO INCIDENTS AS WELL AS RAISE
SECURITY AWARENESS THROUGH AN ORGANIZATION.
ELYSIUMSECURITY PROVIDES HIGH LEVEL EXPERTISE GATHERED
THROUGH YEARS OF BEST PRACTICES EXPERIENCE IN LARGE
INTERNATIONAL COMPANIES ALLOWING US TO PROVIDE ADVICE BEST
SUITED TO YOUR BUSINESS OPERATIONAL MODEL AND PRIORITIES.
ELYSIUMSECURITY PROVIDES A PORTFOLIO OF STRATEGIC AND TACTICAL
SERVICES TO HELP COMPANIES PROTECT AND RESPOND AGAINST CYBER
SECURITY THREATS. WE DIFFERENTIATE OURSELVES BY OFFERING
DISCREET, TAILORED AND SPECIALIZED ENGAGEMENTS.
ELYSIUMSECURITY OPERATES IN MAURITIUS AND IN EUROPE,
A BOUTIQUE STYLE APPROACH MEANS WE CAN EASILY ADAPT TO YOUR
BUSINESS OPERATIONAL MODEL AND REQUIREMENTS TO PROVIDE A
PERSONALIZED SERVICE THAT FITS YOUR WORKING ENVIRONMENT.

More Related Content

What's hot

Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyRahulprasad Yadav
 
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...IRJET Journal
 
Fighting Malware with Graph Analytics: An End-to-End Case Study
Fighting Malware with Graph Analytics: An End-to-End Case StudyFighting Malware with Graph Analytics: An End-to-End Case Study
Fighting Malware with Graph Analytics: An End-to-End Case StudyPriyanka Aash
 
Taking the Attacker Eviction Red Pill (v2.0)
Taking the Attacker Eviction Red Pill (v2.0)Taking the Attacker Eviction Red Pill (v2.0)
Taking the Attacker Eviction Red Pill (v2.0)Frode Hommedal
 
MITRE ATT&CKcon 2018: Detection Philosophy, Evolution & ATT&CK, Fred Stankows...
MITRE ATT&CKcon 2018: Detection Philosophy, Evolution & ATT&CK, Fred Stankows...MITRE ATT&CKcon 2018: Detection Philosophy, Evolution & ATT&CK, Fred Stankows...
MITRE ATT&CKcon 2018: Detection Philosophy, Evolution & ATT&CK, Fred Stankows...MITRE - ATT&CKcon
 
The Duqu 2.0: Technical Details
The Duqu 2.0: Technical DetailsThe Duqu 2.0: Technical Details
The Duqu 2.0: Technical DetailsKaspersky
 
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...jzadeh
 
Hacking Closed Networks
Hacking Closed NetworksHacking Closed Networks
Hacking Closed NetworksPriyanka Aash
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3 WE-IT TUTORIALS
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationAlex Punnen
 
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloudkrprashant94
 
Cryptography and encryption
Cryptography and  encryptionCryptography and  encryption
Cryptography and encryptionAncy Mariam Babu
 
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan brugginkATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan brugginkGert-Jan Bruggink
 
Cryptology - Antônio Lacerda
Cryptology - Antônio LacerdaCryptology - Antônio Lacerda
Cryptology - Antônio LacerdaRodrigo Almeida
 
Public Key Cryptosystems and RSA
Public Key Cryptosystems and RSAPublic Key Cryptosystems and RSA
Public Key Cryptosystems and RSAChris Theisen
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-JM code group
 

What's hot (20)

Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
 
Fighting Malware with Graph Analytics: An End-to-End Case Study
Fighting Malware with Graph Analytics: An End-to-End Case StudyFighting Malware with Graph Analytics: An End-to-End Case Study
Fighting Malware with Graph Analytics: An End-to-End Case Study
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
Taking the Attacker Eviction Red Pill (v2.0)
Taking the Attacker Eviction Red Pill (v2.0)Taking the Attacker Eviction Red Pill (v2.0)
Taking the Attacker Eviction Red Pill (v2.0)
 
MITRE ATT&CKcon 2018: Detection Philosophy, Evolution & ATT&CK, Fred Stankows...
MITRE ATT&CKcon 2018: Detection Philosophy, Evolution & ATT&CK, Fred Stankows...MITRE ATT&CKcon 2018: Detection Philosophy, Evolution & ATT&CK, Fred Stankows...
MITRE ATT&CKcon 2018: Detection Philosophy, Evolution & ATT&CK, Fred Stankows...
 
How to assign a CVE to yourself?
How to assign a CVE to yourself?How to assign a CVE to yourself?
How to assign a CVE to yourself?
 
The Duqu 2.0: Technical Details
The Duqu 2.0: Technical DetailsThe Duqu 2.0: Technical Details
The Duqu 2.0: Technical Details
 
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
 
Hacking Closed Networks
Hacking Closed NetworksHacking Closed Networks
Hacking Closed Networks
 
Paper1
Paper1Paper1
Paper1
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 
Purple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcuttPurple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcutt
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentation
 
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
 
Cryptography and encryption
Cryptography and  encryptionCryptography and  encryption
Cryptography and encryption
 
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan brugginkATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
 
Cryptology - Antônio Lacerda
Cryptology - Antônio LacerdaCryptology - Antônio Lacerda
Cryptology - Antônio Lacerda
 
Public Key Cryptosystems and RSA
Public Key Cryptosystems and RSAPublic Key Cryptosystems and RSA
Public Key Cryptosystems and RSA
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
 

Similar to INTRODUCTION TO CRYPTOGRAPHY

Classical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureClassical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureAdri Jovin
 
Chapter 9 cryptography- symetric encryption
Chapter 9   cryptography- symetric encryptionChapter 9   cryptography- symetric encryption
Chapter 9 cryptography- symetric encryptionSyaiful Ahdan
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief Historyprasenjeetd
 
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and BitcoinCrypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and BitcoinPriyanka Aash
 
Detailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocolsDetailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocolsChristian Spolaore
 
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...ams1ams11
 
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSJournal For Research
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherAashirwad Kashyap
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherAashirwad Kashyap
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityNagendra Um
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
The CDO Agenda - Data Security and Encryption
The CDO Agenda - Data Security and EncryptionThe CDO Agenda - Data Security and Encryption
The CDO Agenda - Data Security and EncryptionDATAVERSITY
 
Network security jeni corrected 1
Network security jeni corrected 1Network security jeni corrected 1
Network security jeni corrected 1NIVEDHINIMANIVANNAN
 
Cryptography Overview
Cryptography OverviewCryptography Overview
Cryptography OverviewColinShaw
 
IS Unit 3_Public Key Cryptography
IS Unit 3_Public Key CryptographyIS Unit 3_Public Key Cryptography
IS Unit 3_Public Key CryptographySarthak Patel
 
Ch03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standardCh03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standardtarekiceiuk
 
DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYTuhin_Das
 

Similar to INTRODUCTION TO CRYPTOGRAPHY (20)

Classical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureClassical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structure
 
Chapter 9 cryptography- symetric encryption
Chapter 9   cryptography- symetric encryptionChapter 9   cryptography- symetric encryption
Chapter 9 cryptography- symetric encryption
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Cryptography
CryptographyCryptography
Cryptography
 
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and BitcoinCrypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
 
Detailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocolsDetailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocols
 
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
 
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
The CDO Agenda - Data Security and Encryption
The CDO Agenda - Data Security and EncryptionThe CDO Agenda - Data Security and Encryption
The CDO Agenda - Data Security and Encryption
 
Network security jeni corrected 1
Network security jeni corrected 1Network security jeni corrected 1
Network security jeni corrected 1
 
Cryptography Overview
Cryptography OverviewCryptography Overview
Cryptography Overview
 
IS Unit 3_Public Key Cryptography
IS Unit 3_Public Key CryptographyIS Unit 3_Public Key Cryptography
IS Unit 3_Public Key Cryptography
 
Ch03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standardCh03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standard
 
Iss lecture 2
Iss lecture 2Iss lecture 2
Iss lecture 2
 
DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITY
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 

More from Sylvain Martinez

More from Sylvain Martinez (20)

PROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITYPROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITY
 
DATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEW
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
 
INCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTS
 
PHISHING PROTECTION
PHISHING PROTECTIONPHISHING PROTECTION
PHISHING PROTECTION
 
VIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLESVIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLES
 
OFFENSIVE IDS
OFFENSIVE IDSOFFENSIVE IDS
OFFENSIVE IDS
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
ARE YOU RED TEAM READY?
ARE YOU RED TEAM READY?ARE YOU RED TEAM READY?
ARE YOU RED TEAM READY?
 
GDPR SECURITY ISSUES
GDPR SECURITY ISSUESGDPR SECURITY ISSUES
GDPR SECURITY ISSUES
 
Mobile Security Assessment
Mobile Security AssessmentMobile Security Assessment
Mobile Security Assessment
 
The Art of CTF
The Art of CTFThe Art of CTF
The Art of CTF
 
OFFICE 365 SECURITY
OFFICE 365 SECURITYOFFICE 365 SECURITY
OFFICE 365 SECURITY
 
Risk on Crypto Currencies
Risk on Crypto CurrenciesRisk on Crypto Currencies
Risk on Crypto Currencies
 
INTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSINTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICS
 
Talk1 esc7 muscl-gdpr_debate_v1_2
Talk1 esc7 muscl-gdpr_debate_v1_2Talk1 esc7 muscl-gdpr_debate_v1_2
Talk1 esc7 muscl-gdpr_debate_v1_2
 
Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
INCIDENT HANDLING IN ORGANISATIONS
INCIDENT HANDLING IN ORGANISATIONSINCIDENT HANDLING IN ORGANISATIONS
INCIDENT HANDLING IN ORGANISATIONS
 
SOCIAL MEDIA AS A CYBER WEAPON
SOCIAL MEDIA AS A CYBER WEAPONSOCIAL MEDIA AS A CYBER WEAPON
SOCIAL MEDIA AS A CYBER WEAPON
 

Recently uploaded

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

INTRODUCTION TO CRYPTOGRAPHY

  • 1. CYBER SECURITY INTRODUCTION TO CRYPTOGRAPHY VERSION: 1.3 DATE: 25/09/2019 AUTHOR: SYLVAIN MARTINEZ REFERENCE: ES-CSIC CLASSIFICATION: PUBLIC
  • 2. 2 • Presentation goal; • Definition; • History; • Main types; • Logical Operations; • Concept; • Main Algorithms; • Concept; • Type of algorithms; • ECB; • CBC; • Stream Cipher concept; • Keystream; • Main Algorithms; • Overall Concept; • Main Algorithms; CONTENTS PUBLIC CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT • Take Away;
  • 3. PRESENTATION GOAL 3 LEARN ABOUT ITS MAIN USAGE 3 LEARN ITS MAIN ALGORITHMS 2 LEARN ABOUT CRYPTOGRAPHY CORE CONCEPTS 1 TO LEARN ABOUT CRYPTOGRAPHY CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT Icons: from The Noun Project unless stated otherwisePUBLIC
  • 4. DEFINITION 4PUBLIC CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT CRYPTOGRAPHY is the science related to hiding information. With the aim to provide a combination or all of the following: Confidentiality, Integrity, Authentication and Non-repudiation. This can be achieved through the design of cipher algorithms.
  • 5. HISTORY 5PUBLIC CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT KRYPTOS (Greek) meaning HIDDEN, SECRET 1900 BC NON STANDARD HIEROGLYPHS 1500 BC MESOPOTAMIA CLAY TABLETS 700 BC SCYTALE SPARTAN KAMA SUTRA 300 BC 50 BC CAESAR SHIFT CIPHER VIGENÈRE CIPHER 1553 1586 STEGANOGRAPHY QUEENS OF SCOTS 1940 WWII - ENIGMA QUANTUM COMPUTER 2000s
  • 6. MAIN TYPES 6PUBLIC CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT HIDE DATAENCRYPTION REVEAL ORIGINAL DATADECRYPTION CREATES A UNIQUE SIGNATURE FROM DATAHASH HIDE DATA WITHIN OTHER DATASTEGANOGRAPHY
  • 8. CONCEPT 8PUBLIC CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT To be, or not to be: That is the question INPUT HASH FUNCTION 4565 DEFG 2C4G FG67 DIGEST COMPLETELY DIFFERENT HASH DIFFERENT HASH CANNOT REVERT HASH SAME HASH AVALANCHE EFFECT UNIQUE ONE WAY FAST DETERMINISTIC SMALL SOURCE CHANGE DIFFERENT SOURCE "CLEAR TEXT" SOURCE SAME SOURCE IDEAL HASH FUNCTION
  • 9. MAIN ALGORITHMS 9PUBLIC CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT ALGORITHM ORIGIN SPECIFICITY MAIN USAGE MD5 RONALD RIVEST 1991 128-BIT HASH VALUE 4 ROUNDS OF 16 OPERATIONS (XOR, AND, OR, NOT) DATA INTEGRITY & CHECKSUM SSL DIGITAL CERT PASSWORDS COLLISION ATTACK NO LONGER SUITABLE STILL WIDELY IN USE SHA-1 NSA 1995 160-BIT HASH VALUE HEXADECIMAL 40 DIGITS LONG 80 ROUNDS CHECKSUM, PWD, SSL/TLS CERT (NOT NOW) U.S GOV APPROVED COLLISION ATTACK SHATTERED CHOSEN-PREFIX NO EASY/CHEAP ATTACKS SHA-2 NSA 2001 224, 256, 384, 512-BIT HASH VALUE 64 OR 80 ROUNDS CHECKSUM, PWD, BITCOIN, TLS, SSL, PGP, SSH, S/MIME, DKIM, DNSSEC, IPSEC PARTIAL COLLISION ATTACK ONLY SHA-3 NSA 2015 KECCACK FAMILY SPONGE CONSTRUCTION ABSORBED/SQUEEZED PADDING, PERMUTATION CHECKSUM, PWD, ETHEREUM, TLS, SSL, DNSSEC, IPSEC NONE KNOWN YET RISKS
  • 10. OVERALL CONCEPT 10PUBLIC CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT PASSWORD/ KEY ENCRYPTION DECRYPTION To be, or not to be: That is the question PLAIN TEXT fDrTrg1er 65Hjt2s,R. Lks.,3!dAc dvijn4sv CIPHER TEXT
  • 11. INPUT IS BROKEN INTO BLOCK OF DATA EACH BLOCK OF DATA IS ENCRYPTED/DECRYPTED INPUT IS BROKEN INTO A STREAM OF DATA EACH BITS OF DATA IS ENCRYPTED/DECRYPTED TYPE OF CIPHER ALGORITHMS 11PUBLIC CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT BLOCK CIPHER STREAM CIPHER
  • 12. BLOCK CIPHER CONCEPT - ECB 12PUBLIC CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT Source: https://elysiumsecurity.com/crypto/page_crypto.html ELECTRONIC CODEBOOK MODE (ECB)
  • 13. BLOCK CIPHER CONCEPT - CBC 13PUBLIC CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT Source: https://elysiumsecurity.com/crypto/page_crypto.html CHAIN BLOCK CHAINING MODE (CBC)
  • 14. STREAM CIPHER CONCEPT 14PUBLIC CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT To be, or not to be: That is the question PLAIN TEXT fDrTrg1er 65Hjt2s,R. Lks.,3!dAc dvijn4sv CIPHER TEXT …010010010101… …001011011100… …110100010110… PASSWORD/ KEY XOR KEYSTREAM GENERATOR
  • 15. LINEAR FEEDBACK SHIFT REGISTER (LFSR) STREAM CIPHER CONCEPT – KEYSTREAM LFSR 15PUBLIC CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT
  • 16. MAIN ALGORITHMS 16PUBLIC CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT ALGORITHM ORIGIN SPECIFICITY MAIN USAGE RC4 RONALD RIVEST 1987 40-2018 BITS 1 ROUND PERMUTATION "S" KEY-SCHEDULING IV WEP, WPA, BITTORRENT, MS REMOTE DESKTOP, KERBEROS, SKYPE, SSH MULTI SESSION ATTACK ROYAL HOLLOWAY NO LONGER IN TLS [DES] TRIPLE DES IBM [1975], 1998 KEY: 168, 112, [56] BITS BLOCK: 64 BITS [16], 48-DES ROUNDS STANDARD USED GLOBALLY (CREDIT CARD, PGP, ETC). [S-BOX RESISTANT 20 YEARS EARLY] NO LONGER SECURED TWOFISH BRUCE SCHNEIER 1998 KEY: 128, 192, 256 BITS BLOCK: 128 BITS 16 ROUNDS AES FINALIST OPENPGP DIFFERENTIAL ATTACK AES (RIJNDAEL) VINCENT RIJMEN JOAN DAEMEN 1998 KEY: 128, 192, 256 BITS BLOCK: 128 BITS 10, 12 or 14 ROUNDS NEW STANDARD DES/TDES REPLACEMENT SINCE 2002 XSL ATTACK RELATED KEY ATTACK NO PRACTICAL ATTACKS RISKS
  • 17. OVERALL CONCEPT – RECEIVING DATA 17PUBLIC CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT PUBLIC KEY ENCRYPTION DECRYPTION To be, or not to be: That is the question PLAIN TEXT fDrTrg1er 65Hjt2s,R. Lks.,3!dAc dvijn4sv CIPHER TEXT PRIVATE KEY
  • 18. OVERALL CONCEPT - AUTHENTICATION 18PUBLIC CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT PUBLIC KEY ENCRYPTION DECRYPTION To be, or not to be: That is the question PLAIN TEXT fDrTrg1er 65Hjt2s,R. Lks.,3!dAc dvijn4sv CIPHER TEXT PRIVATE KEY
  • 19. MAIN ALGORITHMS 19PUBLIC CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT ALGORITHM ORIGIN SPECIFICITY MAIN USAGE RSA RIVEST SHAMIR ADLEMAN 1977 FACTORISATION KEY: 1,024 – 4,096 BITS 1 ROUND TLS, SSH, ETC. FACTORING PROBLEM NO LONGER A PROBLEM ECDSA NIST 2005 ELLIPTIC CURVE 𝑦" = 𝑥% + 𝑎𝑥 + 𝑏 SIGNATURE, KEY AGREEMENT, PRG SONY/FAILOVERFLOW JAVA FLAWS DSA NIST 1991 ELLIPTIC CURVE KEY GENERATION KEY DISTRIBUTION SIGNING SIGNATURE VERIF SECRECY AND RANDOMNESS OF K DIFFE-HELMAN WHITFIELD DIFFIE MARTIN HELLMAN 1976 MULTIPLICATIVE GROUP OF INTEGERS MODULO P KEY AGREEMENT PROTOCOL MAN IN THE MIDDLE LOGJAM ATTACK RISKS
  • 20. TAKE AWAY 20PUBLIC CONCLUSIONASYMMETRICSYMMETRICHASHESCONTEXT ONLY USE STANDARD ALGORITHMS1 BEWARE OF THE IMPLEMENTATION2 KEEP YOUR PRIVATE KEYS SAFE3 BEWARE OF EXTERNAL FACTORS4 CHECK FIPS CERTIFICATION DETAILS5
  • 21. © 2015-2019 ELYSIUMSECURITY LTD ALL RIGHTS RESERVED HTTPS://WWW.ELYSIUMSECURITY.COM CONSULTING@ELYSIUMSECURITY.COM ABOUT ELYSIUMSECURITY LTD. ELYSIUMSECURITY PROVIDES PRACTICAL EXPERTISE TO IDENTIFY VULNERABILITIES, ASSESS THEIR RISKS AND IMPACT, REMEDIATE THOSE RISKS, PREPARE AND RESPOND TO INCIDENTS AS WELL AS RAISE SECURITY AWARENESS THROUGH AN ORGANIZATION. ELYSIUMSECURITY PROVIDES HIGH LEVEL EXPERTISE GATHERED THROUGH YEARS OF BEST PRACTICES EXPERIENCE IN LARGE INTERNATIONAL COMPANIES ALLOWING US TO PROVIDE ADVICE BEST SUITED TO YOUR BUSINESS OPERATIONAL MODEL AND PRIORITIES. ELYSIUMSECURITY PROVIDES A PORTFOLIO OF STRATEGIC AND TACTICAL SERVICES TO HELP COMPANIES PROTECT AND RESPOND AGAINST CYBER SECURITY THREATS. WE DIFFERENTIATE OURSELVES BY OFFERING DISCREET, TAILORED AND SPECIALIZED ENGAGEMENTS. ELYSIUMSECURITY OPERATES IN MAURITIUS AND IN EUROPE, A BOUTIQUE STYLE APPROACH MEANS WE CAN EASILY ADAPT TO YOUR BUSINESS OPERATIONAL MODEL AND REQUIREMENTS TO PROVIDE A PERSONALIZED SERVICE THAT FITS YOUR WORKING ENVIRONMENT.