235034 Security in Computer Systems and Networks Cryptography
- Slides: 78
235034 Security in Computer Systems and Networks Cryptography & Steganography Lec. Sanchai Yeewiyom School of Information and Communication Technology University of Phayao
Cryptography http: //www. pgpi. org/doc/pgpintro/#p 9
ตวอยาง • Caesar Cipher Cryptography ในอดต • Ciphertext : WKH TXLFN EURZQ IRA MXPSV RYHU WKH ODCB GRJ • Plaintext : the quick brown fox jumps over the lazy dog https: //commons. wikimedia. org/wiki/File: Caesar 3. svg
ตวอยาง Cryptography ในอดต • Monoalphabetic Cipher • Polyalphabetic Cipher กำหนดระยะหางแตละชวงใหไมเทากน https: //en. wikipedia. org/wiki/Substitution_cipher#/media/File: ROT 13. png
Pad http: //modes. io/hacktivism-codes/
ตวอยาง Cryptography ในอดต • Encrypt • Decrypt https: //en. wikipedia. org/wiki/One-time_pad
ตวอยาง Cryptography
Cryptography ปจจบนสามารถแบงการเขารหสขอมลเปน 3 ประเภท • Symmetric Key Cryptography )Secret Key Cryptography( • Asymmetric Key Cryptography )Public Key Cryptography( • Hash Function
Symmetric Key Cryptography http: //www. pgpi. org/doc/pgpintro/#p 9
Symmetric Key Cryptography แบงเปน 2 ประเภท คอ • Stream Cipher • Block Cipher
Stream Cipher https: //image. slidesharecdn. com/cryptographyv 1 -1 -121024044551 phpapp 01/95/cryptography-fundamentals-14 -638. jpg? cb=1351054028
Electronic Codebook (ECB) https: //en. wikipedia. org/wiki/Block_cipher_mode_of_operation
Cipher Block Chaining (CBC) https: //en. wikipedia. org/wiki/Block_cipher_mode_of_operation
A pixel-map version of the image on the left was encrypted with ECB mode to create the center image: Original Encrypted using ECB mode Encrypted using a more secure mode, e. g. CBC https: //en. wikipedia. org/wiki/Block_cipher_mode_of_operation
Symmetric Key Cryptography Example • • • Data Encryption Standard (DES) Triple-DES Advanced Encryption Standard (AES) Rivest Ciphers (RC) Blowfish
Data Encryption Standard (DES) http: //manansingh. github. io/Cryptolab-Offline/c 13 -des-block. html/
https: //commons. wikimedia. org/wiki/File: 3 des-overall-view. png
AES http: //www. quadibloc. com/crypto/co 040401. htm
Advanced Encryption Standard (AES) 3. Final Round (No Mix. Columns) • Sub. Bytes • Shift. Rows • Add. Round. Key
http: //itbase. trip. sk/cs/data/krypto/algoritmy_index. htm
Blowfish http: //www. sm. luth. se/csee/courses/smd/102/lek 4/lek 3. html
Asymmetric Key Cryptography http: //www. pgpi. org/doc/pgpintro/#p 9 /
Asymmetric Key Cryptography http: //www. pgpi. org/doc/pgpintro/#p 9
Asymmetric Key Cryptography http: //www. pgpi. org/doc/pgpintro/#p 9
Asymmetric Key Cryptography Example • RSA • Digital Signature • Digital Certificate
http: //www. its. bth. se/staff/hjo/
http: //www. its. bth. se/staff/hjo/
Digital Signature (Authentication) http: //www. infosec. gov. hk/english/itpro/public_main. html
Digital Signature (Data Integrity) http: //www. securityparagon. com/blog/? p=556
Digital Certificate https: //www. ida. gov. sg/Policies-and-Regulations/Acts-and-Regulations/Electronic. Transactions-Act-and-Regulations/Controller-of-Certification-Authorities/Key-Concepts
Digital Certificate
https: //en. wikipedia. org/wiki/Cryptographic_hash_function
Hash Function Example • Message Digest (MD( • Secure Hash Algorithm (SHA(
Message Digest (MD( • MD 2 • MD 4 • MD 5
MD 5 https: //en. wikipedia. org/wiki/MD 5
Secure Hash Algorithm (SHA( • SHA-1 • SHA-256, SHA-384 และ SHA-512
SHA-1 https: //en. wikipedia. org/wiki/SHA-1
SHA-256 http: //j-7 system. blog. so-net. ne. jp/2014 -01 -14
Encryption Software • Best encryption software tools of 2020: Keep your data secure and private (Tech. Radar) • The Best Encryption Software for 2020 (PC Magazine)
Steganography http: //studentweb. niu. edu/9/~Z 172699/Description. html
Steganography • การซอนขอมลมกใชการซอนในสวนของ LSB )Least Significant Bit ( ซงผใชงานมกมองไมเหนความแตกตางขอ งขอมลทเปลยนไป (Picture, Sound, etc. ) http: //www. forensicmag. com/articles/2009/06/find-incriminating-contraband-images
Steganography
Steganography • http: //www. mobilefish. com/services/steganography. php
• Exp. Steganography • Open. Puff 4. 00 (http: //embeddedsw. net/Open. Puff_Steganography_Home. html) • Quick. Stego (http: //quickcrypto. com/free-steganographysoftware. html( • MP 3 Stego (http//: www. petitcolas. net/fabien/steganography/mp 3 stego/index html) • Xiao Steganography (https: //download. cnet. com/Xiao. Steganography/3000 -2092_4 -10541494. html)
Steganography • การตรวจจบการซอนขอมล ใชเครองมอ เชน • Steg. Alyzer (https: //stegalyzeras. software. informer. com/3. 9/) • Steg. Detect (https: //stegdetect. apponic. com/) • XSteg. Secret (http: //en. pudn. com/Download/item/id/965028. html)
- Wireless security in cryptography
- Cryptography in computer networks
- Difference between datagram and virtual circuit operation
- Backbone networks in computer networks
- Distributed system in computer network
- Security security security
- Modulo table
- криптографический модуль
- Number theory in cyber security
- Firewall in cryptography and network security
- Authentication in cryptography and network security
- Intruders in cryptography
- Security services and mechanisms in cryptography
- What is primitive root in cryptography
- Cryptography and network security 6th edition pdf
- Cryptography and network security pearson
- Source
- Cryptography and network security 4th edition
- Euler's theorem in cryptography
- Finite fields in cryptography and network security
- Dsa in network security
- Modular arithmetic in cryptography and network security
- Pgp in cryptography and network security
- Euler's theorem in cryptography and network security
- Malicious software in cryptography and network security
- Introduction to cryptography and network security
- Rsa algorithm in cryptography and network security
- Introduction to cryptography and network security
- Cryptography security services
- Cryptography security goals
- Cryptography computer science
- Iec 61850 communication networks and systems in substations
- Auditing networks perimeters and systems
- Intserv vs diffserv
- Checksum in computer networks with example
- Bit and byte stuffing
- Difference between bit and byte stuffing
- What is the reverse request protocol?
- Analogue and digital transmission in computer networks
- Http computer networks
- Computer networks and internets with internet applications
- Error correction in computer networks
- Protocols and standards in computer networks
- Error detection in computer networks
- Computer networks and internets
- Palo alto networks next generation security platform
- Palo alto networks certified network security engineer
- Palo alto networks next generation security platform
- Next generation security platform
- Overlay networks in distributed systems
- Interconnection networks in multiprocessor systems
- E commerce security policy
- Crc in computer networks
- Crc in computer networks
- Traffic management in computer networks
- Speed of a computer
- What is optimality principle in computer networks
- In band management definition
- What is optimality principle in computer networks
- Business applications in computer networks
- Classify computer networks based of transmission technology
- Dns in computer networks
- Icmp in computer networks
- Character stuffing in computer networks
- Dns in computer networks
- Computer networks assignment 1
- Algorithms in computer networks
- Internet transport protocol in computer networks
- Error control in computer networks
- Subnet
- Data link layer switching in computer networks
- 2 network models
- Hdlc byte stuffing
- Berkely sockets
- In ftp protocol client contacts server using
- Principles of network applications in computer networks
- Https://speakerdeck.com/
- Cmu 15-441
- Utopian simplex protocol in computer networks