BS801E-BSCS. Cryptography

Similar documents
NETWORK SECURITY & CRYPTOGRAPHY

Network Security Issues and Cryptography

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Introduction to Cryptography in Blockchain Technology. December 23, 2018

PROTECTING CONVERSATIONS

Viability of Cryptography FINAL PROJECT

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Encryption I. An Introduction

Uses of Cryptography

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Cryptographic Concepts

S. Erfani, ECE Dept., University of Windsor Network Security

A Proposed Method for Cryptography using Random Key and Rotation of Text

Security. Communication security. System Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

(2½ hours) Total Marks: 75

HOST Authentication Overview ECE 525

Cryptography Introduction

Pretty Good Privacy (PGP

Pretty Good Privacy (PGP)

Overview. SSL Cryptography Overview CHAPTER 1

Cryptography and Network Security. Saint Leo University. COM 450- Network Defense and Security. Instructor: Dr. Omar.

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security

ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification

IEEE Std and IEEE Std 1363a Ashley Butterworth Apple Inc.

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Introduction to Software Security Hash Functions (Chapter 5)

CYBER SECURITY MADE SIMPLE

First Semester Examinations 2013/14 (Model Solution) INTERNET PRINCIPLES

APNIC elearning: Cryptography Basics

SMart esolutions Information Security

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic.

Authentication CHAPTER 17

Secure Multiparty Computation

Module: Cryptographic Protocols. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security

Kurose & Ross, Chapters (5 th ed.)

Cryptographic Systems

1.264 Lecture 28. Cryptography: Asymmetric keys

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

CMPT 300: Operating Systems I Assignment 4

CRYPTOGRAPHY AND NETWORK SECURITY. K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 INTRODUCTION: ABSTRACT:

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

Cryptography (Overview)

CSC 474/574 Information Systems Security

Cryptography Math/CprE/InfAs 533

Security and Anonymity

Encryption. INST 346, Section 0201 April 3, 2018

CS61A Lecture #39: Cryptography

CRYPTOGRAPHY. BY, Ayesha Farhin

Topics. Number Theory Review. Public Key Cryptography

Practical Aspects of Modern Cryptography

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

SSL/TLS. How to send your credit card number securely over the internet

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II

Nature Sunday Academy Lesson Plan

Security Requirements

Linux Network Administration

Crypto for Hackers. Eijah. v1.00 August 7 th, 2015

Chapter 10 : Private-Key Management and the Public-Key Revolution

Cryptography CS 555. Topic 16: Key Management and The Need for Public Key Cryptography. CS555 Spring 2012/Topic 16 1

COMP4109 : Applied Cryptography

CS Protocol Design. Prof. Clarkson Spring 2017

The Diffie-Hellman/Karn Encryption App

Cryptographic Checksums

Cryptography. Intercepting Information Scenario 1. Tuesday, December 9, December 9, Wireless broadcasts information using radio signals

Public-key Cryptography: Theory and Practice

Chapter 9. Public Key Cryptography, RSA And Key Management

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

Authentication. Chapter 2

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Introduction to Cryptography

Security: Cryptography

CNT4406/5412 Network Security

UNIT - IV Cryptographic Hash Function 31.1

CS 425 / ECE 428 Distributed Systems Fall 2017

ECEN 5022 Cryptography

Lesson 13 Securing Web Services (WS-Security, SAML)

A simple approach of Peer-to-Peer E-Cash system

LECTURE 4: Cryptography

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

The Design of an Anonymous and a Fair Novel E-cash System

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Security Handshake Pitfalls

Lecture 6 - Cryptography

e-commerce Study Guide Test 2. Security Chapter 10

Assignment 9 / Cryptography

Classical Cryptography. Thierry Sans

Protocols II. Computer Security Lecture 12. David Aspinall. 17th February School of Informatics University of Edinburgh

HY-457 Information Systems Security

Message Authentication Codes and Cryptographic Hash Functions

David Wetherall, with some slides from Radia Perlman s security lectures.

CS Computer Networks 1: Authentication

Encryption Providing Perfect Secrecy COPYRIGHT 2001 NON-ELEPHANT ENCRYPTION SYSTEMS INC.

Introduction Classical Confidentiality Modern Confidentiality Integrity Authentication

Architectural Support for Copy and Tamper Resistant Software

Number Theory and RSA Public-Key Encryption

Transcription:

Jay-Ar Baliguat BS801E-BSCS Ms.Myrlen Maria Antoni Cryptography Cryptography can be defined as the conversion of data into a scrambled code that can be deciphered and sent across a public or private network. Cryptography uses two main styles or forms of encrypting data; symmetrical and asymmetrical. Symmetric encryptions, or algorithms, use the same key for encryption as they do for decryption. Other names for this type of encryption are secret-key, shared-key, and private-key. The encryption key can be loosely related to the decryption key; it does not necessarily need to be an exact copy. o Cipher Text It is the result of encryption performed on plaintext using an algorithm, called a cipher. Cipher text is also known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it. o Encryption Encryption refers to algorithmic schemes that encode plain text into non-readable form or cipher text, providing privacy. The receiver of the encrypted text uses a "key" to decrypt the message, returning it to its original plain text form. The key is the trigger mechanism to the algorithm.

o Decryption The process of decoding data that has been encrypted into a secret format. Decryption requires a secret key or password. Gibberish Is a generic term in English for talking that sounds like speech, but carries no actual meaning? This meaning has also been extended to meaningless text or gobbledygook. The common theme in gibberish statements is a lack of literal sense, which can be described as a presence of nonsense. One etymology asserts it is derived from the root of the Irish word gob or gab (mouth), which the same source asserts is the root of jabber, gibber and gobble. Eaves Dropping Eavesdropping is the act of secretly listening to the private conversation of others without their consent. This is commonly thought to be unethical and there is an old adage that eavesdroppers seldom hear anything good of themselves...eavesdroppers always try to listen to matters that concern them. Hashing and Digital Signatures

Hashing is simply a process whereby you calculate a hash code from some data. The generated hash code is mathematically derived and is unique and specific for the data it was derived from. If any byte changes in the data then a completely different hash code is generated. This is what makes hashing extremely useful in checking if data has been modified or damaged since it was either last saved or sent over the network. If, for example, you re sending data to someone then by sending a hash code of the data along with the data itself the receiver can check the data's integrity by generating their own hash from the data and comparing it with the hash code that was sent. If the data has been modified, even by one byte, then the two hash codes won t match and that means the data has been altered. Digital signatures are an adaptation of MAC that provide the same advantages but with the added ability to verify the data s source/sender. MACs only verify that the data never changed but they cannot be used to check that the data actually came from the person who claims to have sent it. The only real difference in MAC and digital signatures is the key used to encrypt the hash. In MACs the key is a shared symmetric session key. In digital signature the keys used are public/private asymmetric keys. Authentication Model There is no single mechanism that is applicable for all authentication events throughout a typical deployment. Instead, each deployment uses some combination of authentication processes, trust relationships, and single sign-on technologies. This helps to balance a range of goals such as these: preserve individual identity minimize security exposures

provide a unified user experience minimize set up and maintenance efforts provide access to disparate systems within an environment integrate into a wide variety of general computing environments o Checksum A checksum or hash sum is a fixed-size data computed from an arbitrary block of digital data for the purpose of detecting accidental errors that may have been introduced during its transmission or storage. The integrity of the data can be checked at any later time by recomputing the checksum and comparing it with the stored one. If the checksums match, the data was almost certainly not altered. The procedure that yields the checksum from the data is called a checksum function or checksum algorithm. A good checksum algorithm will yield a different result with high probability when the data is accidentally corrupted; if the checksums match, the data is very likely to be free of accidental errors. Checksum functions are related to hash functions, fingerprints, randomization functions, and cryptographic hash functions. However, each of those concepts has different applications and therefore different design goals. Check digits and parity bits are special cases of checksums, appropriate for small blocks of data. o CRC ( Cyclic Redundancy Checks ) A cyclic redundancy check (CRC) or polynomial code checksum is a hash function designed to detect accidental

changes to raw computer data, and is commonly used in digital networks and storage devices such as hard disk drives. A CRC-enabled device calculates a short, fixed-length binary sequence, known as the CRC code or just CRC, for each block of data and sends or stores them both together. When a block is read or received the device repeats the calculation; if the new CRC does not match the one calculated earlier, then the block contains a data error and the device may take corrective action such as rereading or requesting the block be sent again, otherwise the data is assumed to be error free. o One Way Hashing An algorithm that turns messages or text into a fixed string of digits, usually for security or data management purposes. The "one way" means that it's nearly impossible to derive the original text from the string. A one-way hash function is used to create digital signatures, which in turn identify and authenticate the sender and message of a digitally distributed message.