Cryptography Gerard Klonarides What is cryptography Symmetric Encryption

  • Slides: 21
Download presentation
Cryptography Gerard Klonarides

Cryptography Gerard Klonarides

What is cryptography? Symmetric Encryption n Asymmetric Encryption n Other cryptography n Digital signatures

What is cryptography? Symmetric Encryption n Asymmetric Encryption n Other cryptography n Digital signatures n PKI n

What is Cryptography? n Transforming plaintext to ciphertext Hello I love you won’t you

What is Cryptography? n Transforming plaintext to ciphertext Hello I love you won’t you tell me your name? Hello I love you me your name? won’t you tell

Cryptography n Transforming plaintext into ciphertext Substitution l Transposition l

Cryptography n Transforming plaintext into ciphertext Substitution l Transposition l

Substitution 12345345231 n This = 1234 n Try and crack this one n

Substitution 12345345231 n This = 1234 n Try and crack this one n

This is hit n 12345345231 n

This is hit n 12345345231 n

Transposition Plaintext elements rearranged n This is hit n ih. T sis sih tih

Transposition Plaintext elements rearranged n This is hit n ih. T sis sih tih n

Plaintext is processed n Block cipher l n A block at a time Stream

Plaintext is processed n Block cipher l n A block at a time Stream cipher l Processed continuously

The Cipher Process Keys n Single Key n Two-key encryption n

The Cipher Process Keys n Single Key n Two-key encryption n

About Keys Bigger does not mean better n For example IDEA 128 is better

About Keys Bigger does not mean better n For example IDEA 128 is better than RSA 521 n One has to protect the integrity of the keys n

What does 128 bit encryption mean? A 128 -bit number has 2128 possible values.

What does 128 bit encryption mean? A 128 -bit number has 2128 possible values. n How big is that? n 218 is how many IPv 6 addresses we have n 2170 is the # of atoms in the earth n 2190 is the # of atoms in the sun n

Encryption types n Single key Encryption Conventional l Symmetric l n Two-key Encryption Asymmetric

Encryption types n Single key Encryption Conventional l Symmetric l n Two-key Encryption Asymmetric l Public-key l

Symmetric Encryption A type of encryption where the same key is used to encrypt

Symmetric Encryption A type of encryption where the same key is used to encrypt and decrypt the message. This differs from asymmetric (or public-key) encryption, which uses one key to encrypt a message and another to decrypt the message.

Asymmetric Encryption n n cryptographic system that uses two keys -- a public key

Asymmetric Encryption n n cryptographic system that uses two keys -- a public key known to everyone and a private or secret key known only to the recipient of the message. When John wants to send a secure message to Jane, he uses Jane's public key to encrypt the message. Jane then uses her private key to decrypt it. An important element to the public key system is that the public and private keys are related in such a way that only the public key can be used to encrypt messages and only the corresponding private key can be used to decrypt them. Moreover, it is virtually impossible to deduce the private key if you know the public key. Public-key systems, such as Pretty Good Privacy (PGP), are becoming popular for transmitting information via the Internet. They are extremely secure and relatively simple to use. The only difficulty with public-key systems is that you need to know the recipient's public key to encrypt a message for him or her. What's needed, therefore, is a global registry of public keys, which is one of the promises of the new LDAP technology. Public key cryptography was invented in 1976 by Whitfield Diffie and Martin Hellman. For this reason, it is sometime called Diffie-Hellman encryption. It is also called asymmetric encryption because it uses two keys instead of one key (symmetric encryption).

Algorithms A formula or set of steps for solving a particular problem. To be

Algorithms A formula or set of steps for solving a particular problem. To be an algorithm, a set of rules must be unambiguous and have a clear stopping point. Algorithms can be expressed in any language, from natural languages like English or French to programming languages like FORTRAN. n We use algorithms every day. For example, a recipe for baking a cake is an algorithm. Most programs, with the exception of some artificial intelligence applications, consist of algorithms. Inventing elegant algorithms -- algorithms that are simple and require the fewest steps possible -- is one of the principal challenges in programming.

The RSA Algorithm Developed by Ron Rivest, Adi Shamir, and Len Adlerman from MIT

The RSA Algorithm Developed by Ron Rivest, Adi Shamir, and Len Adlerman from MIT in 1977 n The only widely accepted publickey algorithm n A block cipher algorithm n 98% n

Authentication The ability to verify that the contents of a message have not been

Authentication The ability to verify that the contents of a message have not been altered n The ability to identify the owner of that message n

The Authentication Process To create an authenticator n To check for authenticity n

The Authentication Process To create an authenticator n To check for authenticity n

Hash Algorithms MD 5 -Message Digest Algorithm n SHA - Secure Hash Algorithm n

Hash Algorithms MD 5 -Message Digest Algorithm n SHA - Secure Hash Algorithm n DSS – Digital Signature Standard n

DSS FIPS 186 -2 n n SUMMARY: The Secretary of Commerce approved Federal Information

DSS FIPS 186 -2 n n SUMMARY: The Secretary of Commerce approved Federal Information Processing Standard (FIPS) 186 -2, Digital Signature Standard (DSS), which supersedes Federal Information Processing Standard (FIPS) 186 -1, Digital Signature Standard (DSS). FIPS 186 -2 expands FIPS 186 -1 by specifying an additional voluntary industry standard for generating and verifying digital signatures. This action will enable Federal agencies to use the Digital Signature Algorithm (DSA), which was originally the single approved technique for digital signatures, as well as two new ANSI Standards that were developed for the financial community. These new standards are ANSI X 9. 31, Digital Signature Using Reversible Public Key Cryptography, and ANSI X 9. 62, Elliptic Curve Digital Signature Algorithm (ECDSA). EFFECTIVE DATE: This standard is effective June 27, 2000.

Diffie-Hellman key agreement n The Diffie-Hellman key agreement protocol (also called exponential key agreement)

Diffie-Hellman key agreement n The Diffie-Hellman key agreement protocol (also called exponential key agreement) was developed by Diffie and Hellman [DH 76] in 1976 and published in the ground-breaking paper ``New Directions in Cryptography. '' The protocol allows two users to exchange a secret key over an insecure medium without any prior secrets.