SlideShare a Scribd company logo
What is Encryption?
What is Encryption ?
 Encryption (enciphering) transforms original information
(plaintext) into cipher text (cipher)
 The transformed information is called cryptogram
 The technique or rules used for encryption are called
encryption algorithm
 Encryption provides:
the Confidentiality (keep the information confidential)
the Integrity (keep the accuracy of the information)
the Authenticity (information comes from an authentic
source) of a message
Two Basic Types of Encryption
 Transposition Ciphers
rearrange the order of the bits or the characters
NUCLEAR → LUCNARE
 Substitution Ciphers
replace the actual bits or the characters with
substitutes (next letter in the alphabet)
NUCLEAR → OVDMFBS
A Bible Cipher
a substitution cipher
)
Julius Caesar Encryption
A substitution cipher
Susceptible to frequency analysis and brute force attacks
The Vigenère Cipher
 French diplomat of the 16th century who invented a substitution cipher using a keyword

Yet easy to crack using the frequency analysis technique
The Enigma Machine
A substitution cipher using a set of rotating wheels
Used in WW II by the Germans (U-Boote) and the Japanese
Code was cracked by the Allies in 1941
(Alan Turing & Polish mathematicians)
Poor assumption: letters in plain text should not be substituted for the same letter in cipher text
The Protagonists
 Alice (wants to talk securely with Bob)
 Bob (Alice’s friend)
 Eve (eavesdropping the conversation)
 Mallory (a malicious person)
Plain text: Bob → Alice “I love you”
Cipher text: Nkn → Mgsbc “S gktc wky”
In “Real” Life: Who Are Alice & Bob ?
 Web browser/server for electronic
transactions (credit cards etc.)
 On-line banking applications
 Routers exchanging tables updates
 Corporate VPN (virtual private network)
 E-mails B2B or B2U
 Wireless connections to the network
There are bad guys out there
 What can they (Eve and Mallory) do ?
Eavesdropping (intercept the message)
Spoof the message (faking source or content)
Hijack the communication (insert himself)
Denial of Service (overloading resources)
Sniffing (Packet Analyzing)
Sniffers can capture the packets across the
network and analyze their content
Spoofing
Receiver “A” can’t tell if source is spoofed
Modern Ciphers
Four cryptographic primitives:
1. Random number generation
used to generate keys
2. Symmetric encryption (private keys)
same secret key is used to encrypt and decrypt information
3. Asymmetric encryption (private/public keys)
two keys are used: a public key and a private key,
each user has both a public key (published) and a private key (secret),
public and private key are mathematically related:
encrypt with sender’s private key, decrypt with sender’s public key
encrypt with recipient’s public key, decrypt with recipient’s private key
4. Hash functions
takes a message of any size and computes a smaller fixed-size message
called a digest (used to store passwords and signatures)
Symmetric Key Algorithms
2 types of algorithms used
 Stream Cipher: plain text is processed as a
stream of data
 Block Cipher: plain text is processed through
blocks with additional measures to avoid
repeating blocks
Diffie-Hellman Shared Symmetric Key
 Before 1975, all encryption forced the sender and receiver to have the same key
 If a thousand users had to share secrets with each other, using a secret-key system,
they needed half a million shared-keys (1000 x 1000) / 2 = 500’000 keys
 Diffie-Hellman proposed in 1975 a way to exchange secret keys across an unsecured
communication channel
 How does it work ? First assume that everybody has a three-liter bucket of yellow paint
(the shared public encryption key)
 If Alice and Bob want to agree on a secret key, each of them adds one liter of their
secret color to their own bucket (Alice: pink, Bob: red)
 Finally, Alice takes Bob’s mixture and add her secret color and Bob takes Alice’s
mixture and adds his own secret color
 Alice ends up with yellow + pink + red and Bob with yellow + red + pink in his bucket
(the shared secret encryption key)
 We have confidentiality but not authentication (everybody has a yellow color bucket)
Asymmetric Keys (public & private)
 Encrypting with private key, decrypting with public key provides
authenticity without confidentiality (anyone can access the public key)
 Encrypting with public key, decrypting with private key provides
confidentiality without authenticity (anyone can access the public key)
 Solution: use a mixture of both (double encryption) for the digital signature
and the public key for the message (confidentiality)
Public Key Cryptography
RSA Algorithm For Key Generation
 Based on large prime numbers:
1. Choose two large prime numbers p, q
2. Compute n = pq and z = (p - 1)(q - 1)
3. Choose e (e < n) that has no common factors with z
(e and z are relatively prime)
4. Choose d such that ed – 1 is exactly divisible by z
i.e. ed (mod z) = 1
5. Public key KB
+
is (n,e) ; private key KB
-
is (n,d)
6. Encrypt m with c = me
(mod n)
7. Decrypt c as m = cd
(mod n)
 This works because:
m = [me
(mod n)]d
(mod n)
Example of RSA Key Generation
 Bob chooses p = 5 and q = 7
1. then n = 5 * 7 = 35 and z = (5-1)*(7-1) = 24
2. e = 5 (relatively prime to z)
3. d = 29 (ed-1 = 144 exactly divisible by z)
4. encrypt the letter l (m = 12):
me
= 125
= 248’832
c = me
(mod n) = 248’832 (mod 35) = 17
5. decrypt (c =17):
m = cd
(mod n)=1729
(mod 35) = 4.819686 *1035
(mod 35) = 12
Receiver’s public key
Sender’s public key
`
`
Sender’s private key
Receiver’s private key
InternetSender
Alice
Receiver
Bob
Get the
receiver’s
public
key
Getthesender’spublickey
Encrypt the entire message using the receiver’s public key
Encrypt the signature with the sender’s private key and the receiver’s public key
Signature is double encrypted to ensure confidentiality & authentication
Some Useful Acronyms
 DES: Data Encryption Standard (60’s – 70’s), improved with triple DES (IBM 1978)
 Diffie & Hellman: algorithm for key exchange (1976)
 Kerberos: authentication mechanism using authentication and ticket granting server
 RSA: Rivest, Shamir & Adleman algorithm, using large prime numbers for the generation
of the keys (1982)
 X509: International Standard for Certificates (1988)
 FIPS140-2: Federal Information Processing Standard (2001)
 AES-256: Advanced Encryption Standard (2002), a sophisticated block cipher algorithm
 PKI: Public Key Infrastructure
 TLS: Transport Layer Security, used for secure Web connections
 IPsec: Protocol suite based on IP and encryption standards for use in VPN
 IBE: Identity Based Encryption, a simplified method for B2U E-mail encryption
 S/MIME: (Secure Multipurpose Internet Mail extensions), for B2B E-mail encryption
 PGP: (Pretty Good Privacy), for B2B and B2U E-mail encryption
Some Israeli Cryptographers
 Prof. Adi Shamir (Weizmann Institute)
 Prof. Dan Boneh (Stanford University)
SSL (Secure Sockets Layer) & TLS (Transport Layer Security)
 TLS provides connection security
ensuring that the connection is both
encrypted and authenticated
 Counterparty’s identity is authenticated
using asymmetric keys
 Exchange of the secret symmetric session
key is secure
 No attacker can modify the negotiated
communication without being detected
The SSL Handshake
Certificate Authority (CA)
 Repository of public keys used for encrypted
connections
Certificate Sample
E-Learning uses TLS
Aventail uses TLS (access the VPN)
Yet another way to access the VPN:
Two-Factor Authentication (PIN + Token)
VPN uses IPsec, TLS and RSA
E-mail & Web Security Appliance
 Enables to send encrypted E-mails to
a particular destination using TLS
ePO server - agent communication uses digital signature
(self-signed certificates)
ePO Agent
HostComp
Anti-Virus
Anti-Spyware
DesktopFW
HostIPS
NAC
HostDLP
Remediation
ePO
Management
Console
Network
VM
Secure
Gateway
Network IPS
Data Loss
Prevention
Total Protection
…future
technologies
Compliance
Reporting
Host
Compliance
Remediation
Endpoint Device Encryption
 Device encryption for PC/Laptop
 Device encryption for PDA’s
 Device encryption for Tablet PC
Uses FIPS 140 certified AES-256 algorithm
Encrypted USB Manager
 Uses FIPS140-2 certified AES-256 encryption
Wireless 802.11b (Wi-Fi)
 Uses radio frequencies (2.4 GHz)
 Transmission speed 5.5 Mbps (new 54 Mbps)
 WEP (Wired Equivalent Privacy) uses a
shared key between the mobile station
and the base, but has security loopholes
 IEEE 802.11i addresses the WEP
weaknesses, uses AES and block cipher
to encrypt the wireless communication
IronMail from Secure Computing
Policy-Based Protection for Outbound Messages
 Business-to-Business (B2B) Encryption
– SSL/TLS: Secure Sockets Layer
– S/MIME: Secure Multipurpose Internet Mail Extensions
– OpenPGP: Pretty Good Privacy for businesses
 Business-to-Users (B2U) Encryption
– Secure Mail Encryption / Push : attachment with password
– Secure Mail Encryption / Pull : mail is in a secure Web site
– Voltage IBE Server: Identity Based Encryption
– PGP Universal: Pretty Good Privacy for private users
IronMail Compliance Server
World War III via Encrypted E-mail

More Related Content

What's hot

Ch9
Ch9Ch9
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentation
Alex Punnen
 
Cryptography - 101
Cryptography - 101Cryptography - 101
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
Rutvik Mehta
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
Dr. Rupa Ch
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptographysubhradeep mitra
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Cryptography
CryptographyCryptography
Cryptography
Deepak Kumar
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptographydrewz lin
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
daxesh chauhan
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security Encryption
Joel Briza
 
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
Gyanmanjari Institute Of Technology
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareProf. Swapnil V. Kaware
 
public-key cryptography Shamir
public-key cryptography Shamirpublic-key cryptography Shamir
public-key cryptography Shamir
Information Security Awareness Group
 
Cryptography
CryptographyCryptography
Cryptography
Suhepi Saputri
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
Prabhat Goel
 
Moein
MoeinMoein
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptographydrewz lin
 
Cryptography
CryptographyCryptography
Cryptography
Smruti Ranjan Sahoo
 

What's hot (20)

Ch9
Ch9Ch9
Ch9
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentation
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryptography
CryptographyCryptography
Cryptography
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security Encryption
 
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil Kaware
 
public-key cryptography Shamir
public-key cryptography Shamirpublic-key cryptography Shamir
public-key cryptography Shamir
 
Cryptography
CryptographyCryptography
Cryptography
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Moein
MoeinMoein
Moein
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 

Viewers also liked

Data Base Fundamentals
Data Base FundamentalsData Base Fundamentals
Data Base FundamentalsIsrael Marcus
 
Edpsolidaria barragens
Edpsolidaria barragensEdpsolidaria barragens
Edpsolidaria barragensFUNDAÇÃO EDP
 
Using the Iridium Satellite Network to Protect Wildland Firefighters
Using the Iridium Satellite Network to Protect Wildland FirefightersUsing the Iridium Satellite Network to Protect Wildland Firefighters
Using the Iridium Satellite Network to Protect Wildland Firefighters
Bill King
 
Teeneger
TeenegerTeeneger
Teeneger
gonzapereira
 
South East Asia One Health University Network(SEAOHUN) Agenda for Future and ...
South East Asia One Health University Network(SEAOHUN) Agenda for Future and ...South East Asia One Health University Network(SEAOHUN) Agenda for Future and ...
South East Asia One Health University Network(SEAOHUN) Agenda for Future and ...
Global Risk Forum GRFDavos
 
Web design and structure with new trends in web design and ways to make your ...
Web design and structure with new trends in web design and ways to make your ...Web design and structure with new trends in web design and ways to make your ...
Web design and structure with new trends in web design and ways to make your ...
Seema Gupta
 
АТС «Беспилотник» Перспективы развития
АТС «Беспилотник» Перспективы развитияАТС «Беспилотник» Перспективы развития
АТС «Беспилотник» Перспективы развития
Школьная лига РОСНАНО
 
Revolução francesa
Revolução francesaRevolução francesa
Revolução francesa
Stephany Dayana Pereira Mencato
 
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
Ahmar Hashmi
 

Viewers also liked (14)

Data Base Fundamentals
Data Base FundamentalsData Base Fundamentals
Data Base Fundamentals
 
Práctica V
Práctica VPráctica V
Práctica V
 
final
finalfinal
final
 
Edpsolidaria barragens
Edpsolidaria barragensEdpsolidaria barragens
Edpsolidaria barragens
 
Using the Iridium Satellite Network to Protect Wildland Firefighters
Using the Iridium Satellite Network to Protect Wildland FirefightersUsing the Iridium Satellite Network to Protect Wildland Firefighters
Using the Iridium Satellite Network to Protect Wildland Firefighters
 
Preksha Shinde CV new
Preksha Shinde CV newPreksha Shinde CV new
Preksha Shinde CV new
 
Gmpc profile 2015
Gmpc profile 2015Gmpc profile 2015
Gmpc profile 2015
 
Report of YouLead 2015
Report of YouLead 2015Report of YouLead 2015
Report of YouLead 2015
 
Teeneger
TeenegerTeeneger
Teeneger
 
South East Asia One Health University Network(SEAOHUN) Agenda for Future and ...
South East Asia One Health University Network(SEAOHUN) Agenda for Future and ...South East Asia One Health University Network(SEAOHUN) Agenda for Future and ...
South East Asia One Health University Network(SEAOHUN) Agenda for Future and ...
 
Web design and structure with new trends in web design and ways to make your ...
Web design and structure with new trends in web design and ways to make your ...Web design and structure with new trends in web design and ways to make your ...
Web design and structure with new trends in web design and ways to make your ...
 
АТС «Беспилотник» Перспективы развития
АТС «Беспилотник» Перспективы развитияАТС «Беспилотник» Перспективы развития
АТС «Беспилотник» Перспективы развития
 
Revolução francesa
Revolução francesaRevolução francesa
Revolução francesa
 
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
 

Similar to What is Encryption

Cns 1
Cns 1Cns 1
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.ppt
Prabhat Kumar
 
Cupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829aCupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829a
jsk1950
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
Durlove Kumbhakar
 
Cryptography by gaurav singh
Cryptography by gaurav singhCryptography by gaurav singh
Cryptography by gaurav singh
Gaurav Singh
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryptionphanleson
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
Sylvain Maret
 
Encryption
EncryptionEncryption
Encryption
Naiyan Noor
 
Network Security
Network SecurityNetwork Security
Network Security
Ramasubbu .P
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptx
SurendraBasnet6
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
ImXaib
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
Tata Consultancy Services
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Cryptography
CryptographyCryptography
Cryptography
Sandip kumar
 
Day5
Day5Day5
Day5
Jai4uk
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
Nagendra Um
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
Durgesh Malviya
 
Cryptography
CryptographyCryptography
Cryptography
LaibaRehman3
 

Similar to What is Encryption (20)

Crypt
CryptCrypt
Crypt
 
Cns 1
Cns 1Cns 1
Cns 1
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.ppt
 
Cupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829aCupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829a
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Cryptography by gaurav singh
Cryptography by gaurav singhCryptography by gaurav singh
Cryptography by gaurav singh
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Encryption
EncryptionEncryption
Encryption
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptx
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Day5
Day5Day5
Day5
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 

More from Israel Marcus

2013 Glossary of Financial Terms
2013 Glossary of Financial Terms2013 Glossary of Financial Terms
2013 Glossary of Financial TermsIsrael Marcus
 
Climate and the built environment
Climate and the built environmentClimate and the built environment
Climate and the built environmentIsrael Marcus
 
ארבע ידיעות
ארבע ידיעותארבע ידיעות
ארבע ידיעותIsrael Marcus
 
Value at Risk Mapping
Value at Risk MappingValue at Risk Mapping
Value at Risk MappingIsrael Marcus
 
cours_machines_fluide_compressible
cours_machines_fluide_compressiblecours_machines_fluide_compressible
cours_machines_fluide_compressibleIsrael Marcus
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is VirtualizationIsrael Marcus
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of NetworkingIsrael Marcus
 
The AJDC and North African Jewry (2)
The AJDC and North African Jewry (2)The AJDC and North African Jewry (2)
The AJDC and North African Jewry (2)Israel Marcus
 

More from Israel Marcus (20)

BIM
BIMBIM
BIM
 
2013 Glossary of Financial Terms
2013 Glossary of Financial Terms2013 Glossary of Financial Terms
2013 Glossary of Financial Terms
 
security
securitysecurity
security
 
What is NAC
What is NACWhat is NAC
What is NAC
 
Firewalls
FirewallsFirewalls
Firewalls
 
Climate and the built environment
Climate and the built environmentClimate and the built environment
Climate and the built environment
 
EnergyPlus
EnergyPlusEnergyPlus
EnergyPlus
 
sod ha-ibur
sod ha-ibursod ha-ibur
sod ha-ibur
 
ארבע ידיעות
ארבע ידיעותארבע ידיעות
ארבע ידיעות
 
Talmud
TalmudTalmud
Talmud
 
Flight Basics
Flight BasicsFlight Basics
Flight Basics
 
VAROPS
VAROPSVAROPS
VAROPS
 
Value at Risk Mapping
Value at Risk MappingValue at Risk Mapping
Value at Risk Mapping
 
cours_machines_fluide_compressible
cours_machines_fluide_compressiblecours_machines_fluide_compressible
cours_machines_fluide_compressible
 
Capital_adequacy_6
Capital_adequacy_6Capital_adequacy_6
Capital_adequacy_6
 
DeltaPlus
DeltaPlusDeltaPlus
DeltaPlus
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
 
The AJDC and North African Jewry (2)
The AJDC and North African Jewry (2)The AJDC and North African Jewry (2)
The AJDC and North African Jewry (2)
 
Cyprus Camps
Cyprus CampsCyprus Camps
Cyprus Camps
 

What is Encryption

  • 2. What is Encryption ?  Encryption (enciphering) transforms original information (plaintext) into cipher text (cipher)  The transformed information is called cryptogram  The technique or rules used for encryption are called encryption algorithm  Encryption provides: the Confidentiality (keep the information confidential) the Integrity (keep the accuracy of the information) the Authenticity (information comes from an authentic source) of a message
  • 3. Two Basic Types of Encryption  Transposition Ciphers rearrange the order of the bits or the characters NUCLEAR → LUCNARE  Substitution Ciphers replace the actual bits or the characters with substitutes (next letter in the alphabet) NUCLEAR → OVDMFBS
  • 4. A Bible Cipher a substitution cipher )
  • 5. Julius Caesar Encryption A substitution cipher Susceptible to frequency analysis and brute force attacks
  • 6. The Vigenère Cipher  French diplomat of the 16th century who invented a substitution cipher using a keyword  Yet easy to crack using the frequency analysis technique
  • 7. The Enigma Machine A substitution cipher using a set of rotating wheels Used in WW II by the Germans (U-Boote) and the Japanese Code was cracked by the Allies in 1941 (Alan Turing & Polish mathematicians) Poor assumption: letters in plain text should not be substituted for the same letter in cipher text
  • 8. The Protagonists  Alice (wants to talk securely with Bob)  Bob (Alice’s friend)  Eve (eavesdropping the conversation)  Mallory (a malicious person) Plain text: Bob → Alice “I love you” Cipher text: Nkn → Mgsbc “S gktc wky”
  • 9. In “Real” Life: Who Are Alice & Bob ?  Web browser/server for electronic transactions (credit cards etc.)  On-line banking applications  Routers exchanging tables updates  Corporate VPN (virtual private network)  E-mails B2B or B2U  Wireless connections to the network
  • 10. There are bad guys out there  What can they (Eve and Mallory) do ? Eavesdropping (intercept the message) Spoof the message (faking source or content) Hijack the communication (insert himself) Denial of Service (overloading resources)
  • 11. Sniffing (Packet Analyzing) Sniffers can capture the packets across the network and analyze their content
  • 12. Spoofing Receiver “A” can’t tell if source is spoofed
  • 13. Modern Ciphers Four cryptographic primitives: 1. Random number generation used to generate keys 2. Symmetric encryption (private keys) same secret key is used to encrypt and decrypt information 3. Asymmetric encryption (private/public keys) two keys are used: a public key and a private key, each user has both a public key (published) and a private key (secret), public and private key are mathematically related: encrypt with sender’s private key, decrypt with sender’s public key encrypt with recipient’s public key, decrypt with recipient’s private key 4. Hash functions takes a message of any size and computes a smaller fixed-size message called a digest (used to store passwords and signatures)
  • 14. Symmetric Key Algorithms 2 types of algorithms used  Stream Cipher: plain text is processed as a stream of data  Block Cipher: plain text is processed through blocks with additional measures to avoid repeating blocks
  • 15. Diffie-Hellman Shared Symmetric Key  Before 1975, all encryption forced the sender and receiver to have the same key  If a thousand users had to share secrets with each other, using a secret-key system, they needed half a million shared-keys (1000 x 1000) / 2 = 500’000 keys  Diffie-Hellman proposed in 1975 a way to exchange secret keys across an unsecured communication channel  How does it work ? First assume that everybody has a three-liter bucket of yellow paint (the shared public encryption key)  If Alice and Bob want to agree on a secret key, each of them adds one liter of their secret color to their own bucket (Alice: pink, Bob: red)  Finally, Alice takes Bob’s mixture and add her secret color and Bob takes Alice’s mixture and adds his own secret color  Alice ends up with yellow + pink + red and Bob with yellow + red + pink in his bucket (the shared secret encryption key)  We have confidentiality but not authentication (everybody has a yellow color bucket)
  • 16. Asymmetric Keys (public & private)  Encrypting with private key, decrypting with public key provides authenticity without confidentiality (anyone can access the public key)  Encrypting with public key, decrypting with private key provides confidentiality without authenticity (anyone can access the public key)  Solution: use a mixture of both (double encryption) for the digital signature and the public key for the message (confidentiality)
  • 18. RSA Algorithm For Key Generation  Based on large prime numbers: 1. Choose two large prime numbers p, q 2. Compute n = pq and z = (p - 1)(q - 1) 3. Choose e (e < n) that has no common factors with z (e and z are relatively prime) 4. Choose d such that ed – 1 is exactly divisible by z i.e. ed (mod z) = 1 5. Public key KB + is (n,e) ; private key KB - is (n,d) 6. Encrypt m with c = me (mod n) 7. Decrypt c as m = cd (mod n)  This works because: m = [me (mod n)]d (mod n)
  • 19. Example of RSA Key Generation  Bob chooses p = 5 and q = 7 1. then n = 5 * 7 = 35 and z = (5-1)*(7-1) = 24 2. e = 5 (relatively prime to z) 3. d = 29 (ed-1 = 144 exactly divisible by z) 4. encrypt the letter l (m = 12): me = 125 = 248’832 c = me (mod n) = 248’832 (mod 35) = 17 5. decrypt (c =17): m = cd (mod n)=1729 (mod 35) = 4.819686 *1035 (mod 35) = 12
  • 20. Receiver’s public key Sender’s public key ` ` Sender’s private key Receiver’s private key InternetSender Alice Receiver Bob Get the receiver’s public key Getthesender’spublickey Encrypt the entire message using the receiver’s public key Encrypt the signature with the sender’s private key and the receiver’s public key Signature is double encrypted to ensure confidentiality & authentication
  • 21. Some Useful Acronyms  DES: Data Encryption Standard (60’s – 70’s), improved with triple DES (IBM 1978)  Diffie & Hellman: algorithm for key exchange (1976)  Kerberos: authentication mechanism using authentication and ticket granting server  RSA: Rivest, Shamir & Adleman algorithm, using large prime numbers for the generation of the keys (1982)  X509: International Standard for Certificates (1988)  FIPS140-2: Federal Information Processing Standard (2001)  AES-256: Advanced Encryption Standard (2002), a sophisticated block cipher algorithm  PKI: Public Key Infrastructure  TLS: Transport Layer Security, used for secure Web connections  IPsec: Protocol suite based on IP and encryption standards for use in VPN  IBE: Identity Based Encryption, a simplified method for B2U E-mail encryption  S/MIME: (Secure Multipurpose Internet Mail extensions), for B2B E-mail encryption  PGP: (Pretty Good Privacy), for B2B and B2U E-mail encryption
  • 22. Some Israeli Cryptographers  Prof. Adi Shamir (Weizmann Institute)  Prof. Dan Boneh (Stanford University)
  • 23. SSL (Secure Sockets Layer) & TLS (Transport Layer Security)  TLS provides connection security ensuring that the connection is both encrypted and authenticated  Counterparty’s identity is authenticated using asymmetric keys  Exchange of the secret symmetric session key is secure  No attacker can modify the negotiated communication without being detected
  • 25. Certificate Authority (CA)  Repository of public keys used for encrypted connections
  • 28. Aventail uses TLS (access the VPN)
  • 29. Yet another way to access the VPN: Two-Factor Authentication (PIN + Token)
  • 30. VPN uses IPsec, TLS and RSA
  • 31. E-mail & Web Security Appliance  Enables to send encrypted E-mails to a particular destination using TLS
  • 32. ePO server - agent communication uses digital signature (self-signed certificates) ePO Agent HostComp Anti-Virus Anti-Spyware DesktopFW HostIPS NAC HostDLP Remediation ePO Management Console Network VM Secure Gateway Network IPS Data Loss Prevention Total Protection …future technologies Compliance Reporting Host Compliance Remediation
  • 33. Endpoint Device Encryption  Device encryption for PC/Laptop  Device encryption for PDA’s  Device encryption for Tablet PC Uses FIPS 140 certified AES-256 algorithm
  • 34. Encrypted USB Manager  Uses FIPS140-2 certified AES-256 encryption
  • 35. Wireless 802.11b (Wi-Fi)  Uses radio frequencies (2.4 GHz)  Transmission speed 5.5 Mbps (new 54 Mbps)  WEP (Wired Equivalent Privacy) uses a shared key between the mobile station and the base, but has security loopholes  IEEE 802.11i addresses the WEP weaknesses, uses AES and block cipher to encrypt the wireless communication
  • 36. IronMail from Secure Computing Policy-Based Protection for Outbound Messages  Business-to-Business (B2B) Encryption – SSL/TLS: Secure Sockets Layer – S/MIME: Secure Multipurpose Internet Mail Extensions – OpenPGP: Pretty Good Privacy for businesses  Business-to-Users (B2U) Encryption – Secure Mail Encryption / Push : attachment with password – Secure Mail Encryption / Pull : mail is in a secure Web site – Voltage IBE Server: Identity Based Encryption – PGP Universal: Pretty Good Privacy for private users
  • 38. World War III via Encrypted E-mail