Summary of Encryption What is encryption In encryption
![Summary of Encryption Summary of Encryption](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-1.jpg)
![What is encryption ● ● In encryption, we use a key or key to What is encryption ● ● In encryption, we use a key or key to](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-2.jpg)
![Types of keys ● Symetrical Keys – The same key decrypts and encrypts the Types of keys ● Symetrical Keys – The same key decrypts and encrypts the](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-3.jpg)
![Types of Keys ● Public Key – In public key cryptography there are two Types of Keys ● Public Key – In public key cryptography there are two](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-4.jpg)
![Public Key Cryptography ● With public key cryptography we get – Privacy – We Public Key Cryptography ● With public key cryptography we get – Privacy – We](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-5.jpg)
![Practical Cryptography ● ● In practice, we need to obtain public keys in a Practical Cryptography ● ● In practice, we need to obtain public keys in a](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-6.jpg)
![Practical Cryptography ● ● To avoid this, we incorporate public keys into digital certificates Practical Cryptography ● ● To avoid this, we incorporate public keys into digital certificates](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-7.jpg)
![Certificate Authorities ● Versign – Major player – Web site for email certificates ● Certificate Authorities ● Versign – Major player – Web site for email certificates ●](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-8.jpg)
![Using the certificate ● Note: – Certificate allows you to receive encrypted email – Using the certificate ● Note: – Certificate allows you to receive encrypted email –](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-9.jpg)
![Outlook tutorial ● Tutorial Website – support. gateway. com/s/tutorials/Tu_842008. shtml – Gives the basics Outlook tutorial ● Tutorial Website – support. gateway. com/s/tutorials/Tu_842008. shtml – Gives the basics](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-10.jpg)
![Mac OS X tutorial ● Long tutorial, including obtaining the key on – http: Mac OS X tutorial ● Long tutorial, including obtaining the key on – http:](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-11.jpg)
![Onion Routing ● A way to mask your surfing from your ip – Website Onion Routing ● A way to mask your surfing from your ip – Website](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-12.jpg)
![Tor. Park ● Secure browsing from public locations – www. xerobank. com – Originally Tor. Park ● Secure browsing from public locations – www. xerobank. com – Originally](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-13.jpg)
- Slides: 13
![Summary of Encryption Summary of Encryption](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-1.jpg)
Summary of Encryption
![What is encryption In encryption we use a key or key to What is encryption ● ● In encryption, we use a key or key to](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-2.jpg)
What is encryption ● ● In encryption, we use a key or key to control an algorithim with changes a plain text file to a cypertext file that, hopefully can only be decrypted by the intended recipient. We do this to gain – Privacy – our message is only read by the intended recepient – Authenticity – the recepient knows who sent the message
![Types of keys Symetrical Keys The same key decrypts and encrypts the Types of keys ● Symetrical Keys – The same key decrypts and encrypts the](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-3.jpg)
Types of keys ● Symetrical Keys – The same key decrypts and encrypts the message – Gives us ● ● – Privacy Authenticity The problem is how to get the key to the recipient. This problem is as large as sending the encrypted message
![Types of Keys Public Key In public key cryptography there are two Types of Keys ● Public Key – In public key cryptography there are two](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-4.jpg)
Types of Keys ● Public Key – In public key cryptography there are two keys. ● ● – A public key, used to encrypt the message. This is publicly available A private key, used to decrypt the message. This is know only to the intended recipient. There is no key exchange problem. The public key is publicly available. (how we will discuss)
![Public Key Cryptography With public key cryptography we get Privacy We Public Key Cryptography ● With public key cryptography we get – Privacy – We](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-5.jpg)
Public Key Cryptography ● With public key cryptography we get – Privacy – We do not get authenticity. ● The recipient can not prove who the message is from – ● To regain this, we use digital signatures as described in the last lecture. Public Key Cryptography is the only form used in most internet and email communication.
![Practical Cryptography In practice we need to obtain public keys in a Practical Cryptography ● ● In practice, we need to obtain public keys in a](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-6.jpg)
Practical Cryptography ● ● In practice, we need to obtain public keys in a manner we can trust to avoid a, Man in the Middle, attack. In a man in the middle attack, a malicious individual places him/herself in between two parties trying to communicate, and impersonates both.
![Practical Cryptography To avoid this we incorporate public keys into digital certificates Practical Cryptography ● ● To avoid this, we incorporate public keys into digital certificates](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-7.jpg)
Practical Cryptography ● ● To avoid this, we incorporate public keys into digital certificates issued by Certificate Authorities To use Cryptography, we generally need to obtain a digital certificate, from an authority. To do this, we first need a certificate, for the Certificate Authority. Lets look at those.
![Certificate Authorities Versign Major player Web site for email certificates Certificate Authorities ● Versign – Major player – Web site for email certificates ●](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-8.jpg)
Certificate Authorities ● Versign – Major player – Web site for email certificates ● ● www. verisign. com/authentication/individualauthentication/ digital_id. index. html Thawte – a “Trust” Network – Originally independent – Absorbed by Verisign in 2000 – www. thawte. com
![Using the certificate Note Certificate allows you to receive encrypted email Using the certificate ● Note: – Certificate allows you to receive encrypted email –](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-9.jpg)
Using the certificate ● Note: – Certificate allows you to receive encrypted email – To send encrypted email to someone, they must have a digital certificate. – To begin you must send your certificate to them, and they must send their certificate to you.
![Outlook tutorial Tutorial Website support gateway comstutorialsTu842008 shtml Gives the basics Outlook tutorial ● Tutorial Website – support. gateway. com/s/tutorials/Tu_842008. shtml – Gives the basics](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-10.jpg)
Outlook tutorial ● Tutorial Website – support. gateway. com/s/tutorials/Tu_842008. shtml – Gives the basics for setting up encrypted email
![Mac OS X tutorial Long tutorial including obtaining the key on http Mac OS X tutorial ● Long tutorial, including obtaining the key on – http:](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-11.jpg)
Mac OS X tutorial ● Long tutorial, including obtaining the key on – http: //www. macdevcenter. com/pub/a/mac/2003/01/20 /mail. html – In short, once the key is obtained, it needs to be installed in keychain. – From that point on, encryption is transparent. You click on an icon to encrypt outgoing mail. The Certificates are attached to entries in your address book. – Certificates are automatically captured when attached to incoming mail.
![Onion Routing A way to mask your surfing from your ip Website Onion Routing ● A way to mask your surfing from your ip – Website](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-12.jpg)
Onion Routing ● A way to mask your surfing from your ip – Website ● www. torproject. org
![Tor Park Secure browsing from public locations www xerobank com Originally Tor. Park ● Secure browsing from public locations – www. xerobank. com – Originally](https://slidetodoc.com/presentation_image/2c7d7a256b88be57f3bbf65537476246/image-13.jpg)
Tor. Park ● Secure browsing from public locations – www. xerobank. com – Originally called Torpark ● Released by our old friends, the Cult of the Dead Cow – ● ● Hacktivismo branch Now commercial. (sigh) ; -( Featured, I am told on the series, “Smallville”
Verra crypt
Homomorphic encryption standard
Disadvantages of asymmetric encryption
Explain about the placement of encryption function.
Set-omeconfiguration
Making good encryption algorithms
Lest we remember: cold boot attacks on encryption keys
Rsa el
Public key encryption
Java rsa implementation
Encoding encryption and hashing
Encryption decrypti
Crc encryption
Encryption