SlideShare a Scribd company logo
Cryptography
For
Everyone
Serkan Yıldırım
SONY
Agenda
• What is Cryptography?
• What is Encryption & Decryption?
• Symmetric and Asymmetric Encryption
• Cryptographic Hashes
• Protocols
Cryptology
Cryptography
Securing,
Control,
and Identification
of actual DATA
Cryptanalysis
Attempts to
undermine,
circumvent,
break
Cryptography in Daily Life
• Securing Communications
• Securing files on disk
• Control access
• Identification of data
• …
Encryption and Decryption
• Plain Text = Message = M
• Cipher Text = Encrypted Message = C
• Cipher = Encryption/Decryption Function = E / D
• Encryption
• C = E(M)
• Decryption
• M = D(C)
• M = D(E(M))
Encryption and Decryption
KEY?
• Not interested with standalone Encryption and
Decryption Functions
• Interested with Function indexed by a key.
• C = E(M, k)
• M = D(C, k)
• M = D(E(M, k), k)
Stream Ciphers
vs
Block Ciphers
• Stream Ciphers,
• take plain text input one bit (or one byte) at a time, and
output a corresponding cipher text bit (byte)
• Best for immediate responses
• Block Ciphers,
• require an entire block of plain text input before they will
perform any encryption
• typically blocks are 64-bits or more
Symmetric Encryption
M Encryption
K
Decryption
C
M
Same
M = D(E(M, k), k)
Symmetric Algorithms
• DES (56 bits key), 1976
• 3DES (56, 112, 168 bits key), 1998
• AES (128, 192, 256 bits key), 2001
Asymmetric Encryption
• In symmetric algorithms, KEY distribution is a problem !!!
• In 1975, Whitfield Diffie and Martin Hellman proposed
using related keys
• Encryption and Decryption keys are different
• Encryption is made with public key
• Decryption is made with private key
• Deriving keys from each other is infeasible.
Asymmetric Encryption
M Encryption
PublicKey
C
M
C = E(M, PublicKey)
M = D(C, PrivateKey)
Decryption
PrivateKey
Asymmetric Algorithms
• Diffie-Hellman Key Exchange
• RSA
• Elliptic Curve
Cryptographic Hashes
• One-way function
• Irreversible
• Takes any message, produce fixed-length digest
data
• Be careful for collisions
• SHA-1 (160 bits), SHA-2, SHA-3, MD5 (128bits)
Cryptographic Hashes
M Hash C
C = H(M)
Key Points
• KEY has to be strong, should not be predictable.
• Symmetric ciphers are fast, asymmetric ciphers are
generally slow.
• Stream vs Block ciphers
• Encryption of a large message takes longer time in
asymmetric cryptography.
• Key exchange in symmetric ciphers is a problem.
• Use asymmetric cryptography for key exchange.
Protocols and Algorithms
• Not Same
• Protocol is a specification of the complete set of steps
involved in carrying out a cryptographic activity.
• Algorithm is transforming some digital data into some
other digital data.
• Algorithm may be is one of the steps of a protocol.
• Algorithm can be strong, but protocol may be weak
because of other steps
Digital Signature
• A document can also be encrypted with private key
and opened with the public key.
• Encrypted data with private key can only be
opened with public key.
Protocol for Digital Signature
and Verification
Important Terms
• Authentication: Prove that a message actually
originates with its claimed originator.
• Integrity: Prove that a message has not been
altered in unauthorized ways.
• Non-repudiation: Prevent an originator from
denying credit (or blame) for creating or sending a
message
GK Agent Authentication
SQE Manager GWT
Private Key
https://ibiss.crse.com/gkb/login
Enter username & password
Authenticate
PAYLOAD = userName + accessLevel + expiration
Signature = RSA(SHA256(Base64(header) + Base64(PAYLOAD)), private-key)
JWT= Base64(header).Base64(payload).Base64(Signature)
Akamai
WAF
IP	restriction
REDIRECT TO www.sony.co.uk/permalink/support/search?token=JWT&appid=eu-clarity&locale=en_GB,ru_RU,tr_TR,xz_CN
Validate
Download & Cache Public Key
REDIRECT	sony.ru/electronics/support

Add	cookie	gwtsession=AL:accessLevel

Add	cookie	gwt-support-user=userName
Thanks
???

More Related Content

What's hot

Encryption
EncryptionEncryption
Encryption
vasanthimuniasamy
 
Criptography
CriptographyCriptography
Criptography
Sajan Sahu
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
Pratik Poddar
 
Cryptography
CryptographyCryptography
My cryptography
My cryptographyMy cryptography
My cryptography
NAVYA RAO
 
Crytography
CrytographyCrytography
Crytography
Subesh Kumar Yadav
 
Cryptography
CryptographyCryptography
Cryptography
Vicky Kamboj
 
Itt project
Itt projectItt project
Itt project
Harish Kumar
 
Cryptography
CryptographyCryptography
Cryptography
CryptographyCryptography
Cryptography
Kural Amudhan
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
Roshan Chaudhary
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun
 
cryptography
cryptographycryptography
cryptography
Abhijeet Singh
 
Cryptanalysis 101
Cryptanalysis 101Cryptanalysis 101
Cryptanalysis 101
rahat ali
 
Cryptography
CryptographyCryptography
Cryptography
EmaSushan
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
Hiep Luong
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
Anas Rock
 
Cryptography
CryptographyCryptography
Cryptography
Sagar Janagonda
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 
Cryptography
CryptographyCryptography
Cryptography
Darshini Parikh
 

What's hot (20)

Encryption
EncryptionEncryption
Encryption
 
Criptography
CriptographyCriptography
Criptography
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Cryptography
CryptographyCryptography
Cryptography
 
My cryptography
My cryptographyMy cryptography
My cryptography
 
Crytography
CrytographyCrytography
Crytography
 
Cryptography
CryptographyCryptography
Cryptography
 
Itt project
Itt projectItt project
Itt project
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
cryptography
cryptographycryptography
cryptography
 
Cryptanalysis 101
Cryptanalysis 101Cryptanalysis 101
Cryptanalysis 101
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
 
Cryptography
CryptographyCryptography
Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Cryptography for Everyone

Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
Animesh Shaw
 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)
Sam Bowne
 
Chapter# 3 modified.pptx
Chapter# 3 modified.pptxChapter# 3 modified.pptx
Chapter# 3 modified.pptx
Maryam522887
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
Sumit Satam
 
Cryptography
CryptographyCryptography
Cryptography
Pratiksha Patil
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptx
RobertCarreonBula
 
CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)
Sam Bowne
 
Network security
Network securityNetwork security
Network security
ABHISHEK KUMAR
 
Cryptography
CryptographyCryptography
Cryptography
suresh0506
 
Cryptography
CryptographyCryptography
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
Amit Pathak
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
Setiya Nugroho
 
groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
KennedyKiplangat1
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
Taymoor Nazmy
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
trilokchandra prakash
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
Karthikeyan Dhayalan
 
Cryptography
CryptographyCryptography
Cryptography
PPT4U
 
Cryptography
CryptographyCryptography
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
MohitManna
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
Hossain Md Shakhawat
 

Similar to Cryptography for Everyone (20)

Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)
 
Chapter# 3 modified.pptx
Chapter# 3 modified.pptxChapter# 3 modified.pptx
Chapter# 3 modified.pptx
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptx
 
CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)
 
Network security
Network securityNetwork security
Network security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
 

Recently uploaded

Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
aymanquadri279
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
Remote DBA Services
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Envertis Software Solutions
 

Recently uploaded (20)

Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
 

Cryptography for Everyone

  • 2. Agenda • What is Cryptography? • What is Encryption & Decryption? • Symmetric and Asymmetric Encryption • Cryptographic Hashes • Protocols
  • 3. Cryptology Cryptography Securing, Control, and Identification of actual DATA Cryptanalysis Attempts to undermine, circumvent, break
  • 4. Cryptography in Daily Life • Securing Communications • Securing files on disk • Control access • Identification of data • …
  • 5. Encryption and Decryption • Plain Text = Message = M • Cipher Text = Encrypted Message = C • Cipher = Encryption/Decryption Function = E / D • Encryption • C = E(M) • Decryption • M = D(C) • M = D(E(M))
  • 6. Encryption and Decryption KEY? • Not interested with standalone Encryption and Decryption Functions • Interested with Function indexed by a key. • C = E(M, k) • M = D(C, k) • M = D(E(M, k), k)
  • 7. Stream Ciphers vs Block Ciphers • Stream Ciphers, • take plain text input one bit (or one byte) at a time, and output a corresponding cipher text bit (byte) • Best for immediate responses • Block Ciphers, • require an entire block of plain text input before they will perform any encryption • typically blocks are 64-bits or more
  • 9. Symmetric Algorithms • DES (56 bits key), 1976 • 3DES (56, 112, 168 bits key), 1998 • AES (128, 192, 256 bits key), 2001
  • 10. Asymmetric Encryption • In symmetric algorithms, KEY distribution is a problem !!! • In 1975, Whitfield Diffie and Martin Hellman proposed using related keys • Encryption and Decryption keys are different • Encryption is made with public key • Decryption is made with private key • Deriving keys from each other is infeasible.
  • 11. Asymmetric Encryption M Encryption PublicKey C M C = E(M, PublicKey) M = D(C, PrivateKey) Decryption PrivateKey
  • 12. Asymmetric Algorithms • Diffie-Hellman Key Exchange • RSA • Elliptic Curve
  • 13. Cryptographic Hashes • One-way function • Irreversible • Takes any message, produce fixed-length digest data • Be careful for collisions • SHA-1 (160 bits), SHA-2, SHA-3, MD5 (128bits)
  • 15. Key Points • KEY has to be strong, should not be predictable. • Symmetric ciphers are fast, asymmetric ciphers are generally slow. • Stream vs Block ciphers • Encryption of a large message takes longer time in asymmetric cryptography. • Key exchange in symmetric ciphers is a problem. • Use asymmetric cryptography for key exchange.
  • 16. Protocols and Algorithms • Not Same • Protocol is a specification of the complete set of steps involved in carrying out a cryptographic activity. • Algorithm is transforming some digital data into some other digital data. • Algorithm may be is one of the steps of a protocol. • Algorithm can be strong, but protocol may be weak because of other steps
  • 17. Digital Signature • A document can also be encrypted with private key and opened with the public key. • Encrypted data with private key can only be opened with public key.
  • 18. Protocol for Digital Signature and Verification
  • 19. Important Terms • Authentication: Prove that a message actually originates with its claimed originator. • Integrity: Prove that a message has not been altered in unauthorized ways. • Non-repudiation: Prevent an originator from denying credit (or blame) for creating or sending a message
  • 20. GK Agent Authentication SQE Manager GWT Private Key https://ibiss.crse.com/gkb/login Enter username & password Authenticate PAYLOAD = userName + accessLevel + expiration Signature = RSA(SHA256(Base64(header) + Base64(PAYLOAD)), private-key) JWT= Base64(header).Base64(payload).Base64(Signature) Akamai WAF IP restriction REDIRECT TO www.sony.co.uk/permalink/support/search?token=JWT&appid=eu-clarity&locale=en_GB,ru_RU,tr_TR,xz_CN Validate Download & Cache Public Key REDIRECT sony.ru/electronics/support
 Add cookie gwtsession=AL:accessLevel
 Add cookie gwt-support-user=userName