SIA 400 The Cryptography Chronicles Explaining the Unexplained
- Slides: 76
SIA 400 The Cryptography Chronicles Explaining the Unexplained: Part One Andy Malone CEO & Founder The Cybercrime Security Forum Andrew. malone@quality-training. co. uk
Note: Although this is a level 400 session. It is designed to be a training session providing history, development and practical uses of Cryptography and as such if you already consider yourself an expert in cryptography then this session will be 300 Level.
Cryptography Let’s Start at the Beginning!
Cryptography is the Means of Transforming Data into a Way that Renders it Unreadable by Anyone Except the Intended Recipient. Secret Writing Cryptography Steganography Substitution Transposition Code Cipher
Military Use Defence Against External/Internal Hackers Defence against Industrial Espionage Securing E-commerce Securing Bank Accounts/Electronic Payment Technologies Securing Intellectual Property Avoiding Liability
Cryptography How it all Began…
A B C D E F G H I J K L MN O P Q R S T U V WX Y Z D E F G HI J K L MN O P Q R S T U V WX Y Z A B C MICROSOFT TECHED PLFURVRIW WHFKHG
A B C D E F G H I J 0 1 2 3 4 5 6 7 K L M N O P Q R S T U V W X Y Z 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z D K V Q F I B J W P E S C X H T M Y A U O L R G Z N I H O P E Y O U E N J O Y T WJ I H Z U F H T Z H O F X P E C H E D V J Q F
Z Z Z Z ZW Z Z Z
Z ZW Z Z Z
Z ZW Z Z Z
Z ZW Z Z Z
Z ZW Z Z Z
Z ZW Z Z Z
P 13. 33 Z 11. 67 S 8. 33 U 8. 33 O 7. 50 M 6. 67 H D E V X 5. 83 5. 00 4. 17 F W Q T A 3. 33 2. 50 1. 67 B G Y I J 1. 67 0. 83 C K L N R 0. 00
Z ZW Z Z Z
Giovanni Battista Bellaso 1535
Cryptography The Modern Age Begins…
1871 1942 1837 1975 – Present Day 1903 1946 – Present Day
Try The Enigma Simulator For Yourself: http: //users. telenet. be/d. rijmenants/en/enigmasim. htm
The Enigma Rotor Settings
Symmetric / Secret Key Cryptography • Use a Single Key for Both Encryption and Decryption Asymmetric / Public Key Cryptography • Uses One Key for Encryption and Another for Decryption Hash Functions • Uses a Mathematical Transformation to Irreversibly “Encrypt" Information
Digital Signatures Encryption Authentication / Non Repudiation Message Integrity (Privacy & Confidentiality) Symmetric Key Algorithm Stream Cipher RC 4 SEAL WAKE A 5 PKZIP Block Cipher AES, DES, 3 DES RC 2, RC 5, RC 6 Blowfish, Twofish, Serpent Mars, Cast, Idea Public Key Asymmetric Algorithm Discrete Log DSA ECC Diffe-Helman El. Gamal Factoring RSA LUC Message Digest Hash Algorithm MD 2 MD 5 SHA-1 SHA-2 SHA-3 (Pending) Ripe-MD 160 Key Management ISA/KMP IKE SKIP Photuris Diffe-Helman El. Gamal Public Key Infrastructure (PKI) PXIX SPKI SDS PGP DNSEC
Winners of the NIST 2001 AES Design Competition Joan Daemen and Vincent Rijmen
Decimal Hex 1 1 11 B 21 15 2 2 12 C 22 16 3 3 13 D 23 17 4 4 14 E 24 18 5 5 15 F 25 19 6 6 16 10 26 1 A 7 7 17 11 27 1 B 8 8 18 12 28 1 C 9 9 19 13 29 1 D 10 A 20 14 30 1 E
Animation Symmetric Encryption: AES The AES Inspector Click Me
Animation Symmetric Encryption: AES With Special Thanks to Enrique Zabala Click Me
Encryption/Decryption Digital Signatures Key Exchange Secure Communications
Considered to be The Fathers of Public Key Cryptography Whitfield Diffie and Martin Hellman
Bob’s Network Alice’s Network Formulae 3 Formulae 1 Prime Number Alice’s Secret Integer Base Number A Prime Number Bob’s Secret Integer Base Number B Bob’s Public Value Y Alice's Public Value X Formulae 2 Formulae 4 Shared Secret Z Alice’s Value X Alice's Secret Integer Prime Number Bob’s Value Y Alice's Secret Integer Prime Number Same Value Secret Key
F(x)+ Y X X
Once selected Alice Raises RA No Matter how large the number is A Will Eventually Map into a Range Between 0 & N -1 = X Tools Exist to Calculate X From A to Raise RA(A) and find X is easy. Very.
RB
RAx. B RA B B B A A
Fox The Red Fox runs Across the ice. The Red Fox walks Across the ice. Hash Function DFCD 35454 BBEA 788 A 751 A 696 C 24 D 97009 CA 992 D 17 Hash Function 52 ED 879 E 70 F 71 D 92 6 EB 69570 08 E 03 CE 4 CA 6945 D 3 Hash Function 46042842 935 C 7 FB 0 91585854 A B 94 AE 214 26 EB 3 CEA Note the significant change in the hash sum for minor changes in the input. Note that the hash sum is the same length for varying input sizes. This is extremely useful.
http: //en. wikipedia. org/wiki/SHA
Animation Useful Crypto Tools Free & Available
Open Web Application Security Project
SIA 400: The Cryptography Chronicles: Explaining the Unexplained Part 1 SIA 401: The Cryptography Chronicles: Explaining the Unexplained Part 2 SIA 301 Lock, Stock & Two Smoking Smart Devices! SIA 203 Cyber Threats Security Panel Find Me Later At…Ask The Experts
www. microsoft. com/twc www. microsoft. com/security www. microsoft. com/privacy www. microsoft. com/reliability
Complete an evaluation on Comm. Net and enter to win!
Scan the Tag to evaluate this session now on my. Tech. Ed Mobile
Thanks For Attending : -) Andy Malone CEO & Founder The Cybercrime Security Forum Follow me @Andy. Malone Andrew. malone@quality-training. co. uk
- 800+200+400
- Quando si mette la virgola
- Prediction interval formula
- (11111011101101)2 ( ? )16
- Quotation sentence starters
- Explaining hydroponics systems
- A pamphlet explaining how an unborn child
- Behaviourist approach to explaining phobias
- Explaining voltage
- Biological explanation of deviance
- Explaining patterns hots
- How something works
- They say i say moves that matter in academic writing
- Behavioural approach to explaining phobias
- Male reproductive system
- Trends on graphs
- 2 chronicles 26 niv
- 2 chronicles 31 niv
- 1 chronicles 12 32
- Prayer points from 1 chronicles 4:9-10
- 2 chronicles 16
- Zane's sex chronicles
- 2 chronicles 14 11
- 2 chronicles 24 niv
- 1 chronicles 28 niv
- 2 chronicles 6 19
- Computer chronicles
- 2 chronicles 36:22-23
- Mab mouldheel
- Evolution series - chronicles miyabi
- 2 chronicles 34 children's lesson
- 2 chronicles 7:11-22
- 19 gnt
- 2 chronicles 32 niv
- 1 kings 18 niv
- 2 chronicles 16:12-13
- 1 timothy 5:8 nkjv
- 2 chronicles 7:1
- 1 kings 20 niv
- Spiderwick
- 2 chronicles 11 niv
- 1 chronicles 29 11
- Jabez was more honorable
- Mountains sia
- Penjelasan diagram konteks siklus pendapatan
- Three main aims of the sia
- Moc jednostka
- Non fare ad altri ciò che non vorresti fosse fatto a te
- Coreducacion sia
- Siklus sistem informasi akuntansi
- Hipertrofia lipomatosa del septo interauricular
- Geor sia
- Welmm
- Sia 318
- Pace sia pace a voi testo
- Dokumentasi sistem
- Benedetto sia dio padre del signore nostro
- Konsep sia
- Maledetto sia copernico
- Se uno vuole essere il primo sia il servitore di tutti
- Che ci sia luna sul sentiero notturno di chi porta i fiori
- Teknik penipuan dan penyalahgunaan komputer
- Dlla sia
- Three main aims of the sia
- Sia iainptk
- Dimmi il padre nostro
- Sia
- Strategi pengembangan sia
- Sia 205
- Apakah sia
- Semiconductor roadmap
- Sia cp-01
- Sia.caedufjf.net/seama
- Siklus pengembangan sia
- A sagittis hungarorum libera nos domine
- Wolf fell
- Dr michelle sia