Encryption transforms plain text into cipher text using encryption algorithms and keys to provide confidentiality, integrity, and authenticity of messages. Modern encryption uses both symmetric encryption with private keys and asymmetric encryption with public/private key pairs. Transport Layer Security (TLS) and Secure Sockets Layer (SSL) provide encrypted communication over the internet using technologies like digital certificates, the Diffie-Hellman key exchange, and algorithms like RSA and AES.
A short introduction to cryptography. What is public and private key cryptography? What is a Caesar Cipher and how do we decrypt it? How does RSA work?
A short introduction to cryptography. What is public and private key cryptography? What is a Caesar Cipher and how do we decrypt it? How does RSA work?
Overview on Cryptography and Network SecurityDr. Rupa Ch
These slides give some overview on the the concepts which were in Crytography and network security. I have prepared these slides by the experiece after refer the text bbok as well as resources from the net. Added figures directly from the references. I would like to acknowledge all the authors by originally.
This PPT explains about the term "Cryptography - Encryption & Decryption".
This PPT is for beginners and for intermediate developers who want to learn about Cryptography.
I have also explained some famous ciphers like AES, DES and RSA.
Do not forget to like.
Public Key Cryptosystems with Applications, Requirements and
Cryptanalysis, RSA algorithm, its computational aspects and security, Diffie-Hillman Key Exchange algorithm, Man-in-Middle attack
Overview on Cryptography and Network SecurityDr. Rupa Ch
These slides give some overview on the the concepts which were in Crytography and network security. I have prepared these slides by the experiece after refer the text bbok as well as resources from the net. Added figures directly from the references. I would like to acknowledge all the authors by originally.
This PPT explains about the term "Cryptography - Encryption & Decryption".
This PPT is for beginners and for intermediate developers who want to learn about Cryptography.
I have also explained some famous ciphers like AES, DES and RSA.
Do not forget to like.
Public Key Cryptosystems with Applications, Requirements and
Cryptanalysis, RSA algorithm, its computational aspects and security, Diffie-Hillman Key Exchange algorithm, Man-in-Middle attack
Using the Iridium Satellite Network to Protect Wildland FirefightersBill King
A comprehensive, web-based wildland fire incident management program that includes a real-time GPS tracking system and complete online fillable ICS forms for NIMS reporting.
Topics listed below are explained in the PPT:
Introduction
CIA Triad
Mechanisms of Cryptography
OSI Security Architecture
Security Attacks
Security Mechanisms
Security Services
Cryptography vs Steganography
Network Security Model
Cryptographic techniques
Stream Cipher vs Block cipher
In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot. Encryption does not itself prevent interference, but denies the intelligible content to a would-be interceptor.
This presentation introduces the Basics of Cryptography and Network Security concepts. Heavily derived from content from William Stalling's book with the same title.
Cryptography in digital world offers three core area that protect you and your data from attempt theft, theft or an unauthorise use of your data and possible fraud. Cryptography cover these essential area; authentication, integrity, and confidentiality
Authentication; Authentication is a process in Cryptography that offers certificates as a solution, which are called “digital IDs,” coz they can be used to verify the identity of someone you don’t know. Hence it is upto you to decide whether someone is authentic or not.
Integrity; Integrity is about how you protect your data, corresponding to that certificates it can be used in another technique that’s “digital signatures”, to ensure that nobody can impersonate you. One can easily forge email, but its very hard to forge a digitally signed email message and so on it’s hard for someone to modify or manipulate a message that you have digitally signed.
Confidentiality; By using Cipher you can keep your information secret especially when you send sensitive data over a network. How can you be sure that nobody finds out about your financial transactions, or your personal records, or your other secret information? It can give you solution through “cipher”. A cipher is intelligent system that know how to encrypt and decrypt data. Before you send sensitive data over a network, or store it on a disk, you can encrypt it, which turns it unreadable. If you need the data again, you can use the cipher to decrypt the data. Now you are the only person that can be able to decrypt the data. If you’re sending data to someone, you can ensure that only that person is able to decrypt the message. Also It is important to learn about key data management, public and private key encryption, and how to includes a secure talk application that encrypts all data sent over the network.
2. What is Encryption ?
Encryption (enciphering) transforms original information
(plaintext) into cipher text (cipher)
The transformed information is called cryptogram
The technique or rules used for encryption are called
encryption algorithm
Encryption provides:
the Confidentiality (keep the information confidential)
the Integrity (keep the accuracy of the information)
the Authenticity (information comes from an authentic
source) of a message
3. Two Basic Types of Encryption
Transposition Ciphers
rearrange the order of the bits or the characters
NUCLEAR → LUCNARE
Substitution Ciphers
replace the actual bits or the characters with
substitutes (next letter in the alphabet)
NUCLEAR → OVDMFBS
6. The Vigenère Cipher
French diplomat of the 16th century who invented a substitution cipher using a keyword
Yet easy to crack using the frequency analysis technique
7. The Enigma Machine
A substitution cipher using a set of rotating wheels
Used in WW II by the Germans (U-Boote) and the Japanese
Code was cracked by the Allies in 1941
(Alan Turing & Polish mathematicians)
Poor assumption: letters in plain text should not be substituted for the same letter in cipher text
8. The Protagonists
Alice (wants to talk securely with Bob)
Bob (Alice’s friend)
Eve (eavesdropping the conversation)
Mallory (a malicious person)
Plain text: Bob → Alice “I love you”
Cipher text: Nkn → Mgsbc “S gktc wky”
9. In “Real” Life: Who Are Alice & Bob ?
Web browser/server for electronic
transactions (credit cards etc.)
On-line banking applications
Routers exchanging tables updates
Corporate VPN (virtual private network)
E-mails B2B or B2U
Wireless connections to the network
10. There are bad guys out there
What can they (Eve and Mallory) do ?
Eavesdropping (intercept the message)
Spoof the message (faking source or content)
Hijack the communication (insert himself)
Denial of Service (overloading resources)
13. Modern Ciphers
Four cryptographic primitives:
1. Random number generation
used to generate keys
2. Symmetric encryption (private keys)
same secret key is used to encrypt and decrypt information
3. Asymmetric encryption (private/public keys)
two keys are used: a public key and a private key,
each user has both a public key (published) and a private key (secret),
public and private key are mathematically related:
encrypt with sender’s private key, decrypt with sender’s public key
encrypt with recipient’s public key, decrypt with recipient’s private key
4. Hash functions
takes a message of any size and computes a smaller fixed-size message
called a digest (used to store passwords and signatures)
14. Symmetric Key Algorithms
2 types of algorithms used
Stream Cipher: plain text is processed as a
stream of data
Block Cipher: plain text is processed through
blocks with additional measures to avoid
repeating blocks
15. Diffie-Hellman Shared Symmetric Key
Before 1975, all encryption forced the sender and receiver to have the same key
If a thousand users had to share secrets with each other, using a secret-key system,
they needed half a million shared-keys (1000 x 1000) / 2 = 500’000 keys
Diffie-Hellman proposed in 1975 a way to exchange secret keys across an unsecured
communication channel
How does it work ? First assume that everybody has a three-liter bucket of yellow paint
(the shared public encryption key)
If Alice and Bob want to agree on a secret key, each of them adds one liter of their
secret color to their own bucket (Alice: pink, Bob: red)
Finally, Alice takes Bob’s mixture and add her secret color and Bob takes Alice’s
mixture and adds his own secret color
Alice ends up with yellow + pink + red and Bob with yellow + red + pink in his bucket
(the shared secret encryption key)
We have confidentiality but not authentication (everybody has a yellow color bucket)
16. Asymmetric Keys (public & private)
Encrypting with private key, decrypting with public key provides
authenticity without confidentiality (anyone can access the public key)
Encrypting with public key, decrypting with private key provides
confidentiality without authenticity (anyone can access the public key)
Solution: use a mixture of both (double encryption) for the digital signature
and the public key for the message (confidentiality)
18. RSA Algorithm For Key Generation
Based on large prime numbers:
1. Choose two large prime numbers p, q
2. Compute n = pq and z = (p - 1)(q - 1)
3. Choose e (e < n) that has no common factors with z
(e and z are relatively prime)
4. Choose d such that ed – 1 is exactly divisible by z
i.e. ed (mod z) = 1
5. Public key KB
+
is (n,e) ; private key KB
-
is (n,d)
6. Encrypt m with c = me
(mod n)
7. Decrypt c as m = cd
(mod n)
This works because:
m = [me
(mod n)]d
(mod n)
19. Example of RSA Key Generation
Bob chooses p = 5 and q = 7
1. then n = 5 * 7 = 35 and z = (5-1)*(7-1) = 24
2. e = 5 (relatively prime to z)
3. d = 29 (ed-1 = 144 exactly divisible by z)
4. encrypt the letter l (m = 12):
me
= 125
= 248’832
c = me
(mod n) = 248’832 (mod 35) = 17
5. decrypt (c =17):
m = cd
(mod n)=1729
(mod 35) = 4.819686 *1035
(mod 35) = 12
20. Receiver’s public key
Sender’s public key
`
`
Sender’s private key
Receiver’s private key
InternetSender
Alice
Receiver
Bob
Get the
receiver’s
public
key
Getthesender’spublickey
Encrypt the entire message using the receiver’s public key
Encrypt the signature with the sender’s private key and the receiver’s public key
Signature is double encrypted to ensure confidentiality & authentication
21. Some Useful Acronyms
DES: Data Encryption Standard (60’s – 70’s), improved with triple DES (IBM 1978)
Diffie & Hellman: algorithm for key exchange (1976)
Kerberos: authentication mechanism using authentication and ticket granting server
RSA: Rivest, Shamir & Adleman algorithm, using large prime numbers for the generation
of the keys (1982)
X509: International Standard for Certificates (1988)
FIPS140-2: Federal Information Processing Standard (2001)
AES-256: Advanced Encryption Standard (2002), a sophisticated block cipher algorithm
PKI: Public Key Infrastructure
TLS: Transport Layer Security, used for secure Web connections
IPsec: Protocol suite based on IP and encryption standards for use in VPN
IBE: Identity Based Encryption, a simplified method for B2U E-mail encryption
S/MIME: (Secure Multipurpose Internet Mail extensions), for B2B E-mail encryption
PGP: (Pretty Good Privacy), for B2B and B2U E-mail encryption
23. SSL (Secure Sockets Layer) & TLS (Transport Layer Security)
TLS provides connection security
ensuring that the connection is both
encrypted and authenticated
Counterparty’s identity is authenticated
using asymmetric keys
Exchange of the secret symmetric session
key is secure
No attacker can modify the negotiated
communication without being detected
35. Wireless 802.11b (Wi-Fi)
Uses radio frequencies (2.4 GHz)
Transmission speed 5.5 Mbps (new 54 Mbps)
WEP (Wired Equivalent Privacy) uses a
shared key between the mobile station
and the base, but has security loopholes
IEEE 802.11i addresses the WEP
weaknesses, uses AES and block cipher
to encrypt the wireless communication
36. IronMail from Secure Computing
Policy-Based Protection for Outbound Messages
Business-to-Business (B2B) Encryption
– SSL/TLS: Secure Sockets Layer
– S/MIME: Secure Multipurpose Internet Mail Extensions
– OpenPGP: Pretty Good Privacy for businesses
Business-to-Users (B2U) Encryption
– Secure Mail Encryption / Push : attachment with password
– Secure Mail Encryption / Pull : mail is in a secure Web site
– Voltage IBE Server: Identity Based Encryption
– PGP Universal: Pretty Good Privacy for private users