SlideShare uma empresa Scribd logo
1 de 52
Baixar para ler offline
Cryptology
The practice and study of hiding information.
michael.dance@gmail.com
@mikedance
Presentation Goals
• Provide a high level overview of cryptography
• Clarify the objectives of cryptography
• Define the terminology
• Explain the basic concepts to build an
understanding of how digital security systems,
like Bitcoin, are built
Branches
• Cryptography
• Symmetric Algorithms
• Asymmetric (Public Key) Algorithms
• Cryptography Protocols
• Cryptanalysis
Cryptography
Objectives
There are four things we are trying to achieve with
cryptography.
Confidentiality
Information is kept secret from all but the authorised
parties.
Message
Authentication
The sender of a message is authentic.
Message Integrity
The message has not been tampered with during
transmission.
Non Repudiation
The sender of a message cannot deny that they created
or sent the message.
Terminology
There are around 21 terms you have to know.
Cryptography
The science of secret writing with the goal of hiding the
meaning of a message.
Cryptanalysis
The science and art of breaking crypto systems.
Cipher/Cypher
An algorithm for performing encryption and decryption.
Encryption
The process of hiding the meaning of a message so only
authorised parties can read it.
Decryption
The process of restoring a cipher text to the original
message.
Channel
A communication medium, for example, the internet,
mobile/wireless networks, radio waves, etc.
Secure Channel
A secure communication medium which can be trusted, used to exchange
secret key information, for example, face to face communication.
Insecure Channel
An insecure channel is an untrusted communication
medium, for example, the internet.
Message
The plaintext (readable) message you would like to keep
secret.
Cipher Text
The encrypted message.
Symmetric Algorithms
When encryption and decryption is performed using the
same secret key.
Secret Key
The data used to encrypt and decrypt in a symmetric algorithm. For example, a password.
This must be communicated over a secure channel and kept secret.
Asymmetric/Public
Key Algorithms
When encryption and decryption is performed using
different keys.
Private Key
The key used to decrypt a cipher text in a public key
algorithm. This must be kept secret.
Public Key
The key used to encrypt a message in a public key
algorithm. This can be made public.
Key Pair
The related public and private keys.
Key Space
The set of all possible keys.
Key Size/Length
The size measured in bits of the key, this determines the
key space required to brute force attack the key.
RNG
Random number generator.
PRNG
Pseudo Random Number Generator is a RNG that is not truly random,
used when security is not a concern, for example with video games.
CSPRNG
A cryptographically secure pseudo-random number generator. Used for
cryptography applications, for example generating a bitcoin private key.
THE END.
Of the terminology.
Real World Crypto
Systems
Kerckhoffs’ Principle
A crypto system should be secure even if the attacker knows all
the details about the system, with the exception of the secret key.
Symmetric Crypto
Systems
Uses one secret key for encryption and decryption
Analogy
A safe with one lock where each person with access has
a copy of the same key
DES
• Data Encryption Standard
• The most popular and best studied block cipher of the last 30
years
• Proposed in 1974 in response to a NIST (National Institute of
Standards and Technology) request for a standardised cipher
to secure government and national security communications
• Proposed by IBM cryptographers, with input from the NSA
with no public discourse
• Insecure due to small key space
3DES
• Triple DES
• Performs DES encryption 3 times, which yields a
more secure cipher
• Still widely used primarily due to legacy
implementations and hardware
• Software implementations are not very efficient
AES
• Advanced Encryption Standard
• The most widely used symmetric cipher today
• In 1997, an open worldwide competition was held where cryptography algorithms
were submitted and reviewed by the international scientific community
• In 2001, the Rinjdael cipher, created by two young Belgian cryptographers was
selected for AES over submissions from IBM, RSA, and several famous
cryptographers
• In 2003, the NSA announced it will allow AES encryption to be used for classified
top secret documents
• Used in Blockchain.info wallets, Mac FileVault, Skype, WIFI encryption, IPSec, TLS,
SSH, etc.
• No known attacks have been found
Symmetric Pitfalls
• Key Distribution Problem
• A copy of the key must be exchanged over a
secure channel, problematic to do over the
internet!
• The number of keys required can get very large
• Non repudiation is not possible because several
people may use the same key
Asymmetric/Public
Key Crypto Systems
Uses a public key for encryption and a private key for
decryption.
Analogy
A mailbox on the street, everyone can put a letter in (encrypt), but only
a person with a private (secret) key can retrieve the letters (decrypt).
Background
• Symmetric cryptography has been around for as
long as written language, public key
cryptography is very new
• Public key cryptography was publicly introduced
in 1976 by Whitfield Diffie, Martin Hellman, and
Ralph Merkle
Overview
• Solves the key exchange problem because the encryption key
can be public (hence the name, public key)
• Can be used to prove the authenticity and integrity of a message
using digital signatures, and a digital signature algorithm (non
repudiation)
• Can be used to identify entities using challenge and response
protocols together with digital signatures, for example, electronic
car keys, passports, or bank cards
• Relies on one way functions, which is easy to compute in one
direction, but the inverse computation is computationally
infeasible
RSA
• Published in 1977 by Ron Rivest, Adi Shamir and
Leonard Adleman
• Security is provided by the integer factorisation
problem
• Given two large primes, it is easy to compute the
product, but difficult to factor the resulting product
• Requires large key sizes to be secure with modern
day computers, which is problematic for smaller
devices like mobile phones, smart cards, etc.
Elliptic Curve Cryptography
• Introduced in 1985 by Neal Koblitz and Victor S. Miller,
algorithms entered wide use in 2004, and 2005
• Uses elliptic curve over finite field mathematics to generate
public and private keys
• Security is provided by the elliptic curve discrete logarithm
problem
• Provides roughly the same security of RSA with large key sizes,
with much smaller key sizes, which is leading to adoption in
mobile phones, and smart cards
• Bitcoin uses private and public key pairs based on ECC
Asymmetric Pitfalls
• Encryption is significantly more computationally
expensive than symmetric algorithms
In reality
A hybrid approach is used by using a public key algorithm (which is slower) to
encrypt and exchange a symmetric key (which is small), a symmetric algorithm
(which is fast) can then be used to encrypt the message (which is big).
The End
Of part 1
What’s Next?
• Digital Signatures and Hash Functions
• Elliptic Curve Cryptography
• Bitcoin Cryptography
Questions?
michael.dance@gmail.com
@mikedance
Further Reading
• Understanding Cryptography by Christof Paar and
Jan Pelzl (http://www.crypto-textbook.com/)
• Cryptography Lectures
• https://www.youtube.com/playlist?
list=PLoJC20gNfC2gAB-eg7oaUTheB_JgQY4-q
• Public Key Cryptography: Diffie-Hellman Key
Exchange
• https://www.youtube.com/watch?v=3QnD2c4Xovk
Cryptology - The practice and study of hiding information

Mais conteúdo relacionado

Mais procurados

COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...Neelabja Manna
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Cryptography
CryptographyCryptography
Cryptographyherrberk
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementationAkash Jadhav
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-CommerceHiep Luong
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography FundamentalsDuy Do Phan
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?Pratik Poddar
 
Cryptanalysis 101
Cryptanalysis 101Cryptanalysis 101
Cryptanalysis 101rahat ali
 
Cryptography
CryptographyCryptography
CryptographyAnandKaGe
 
Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack amiteshg
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
 

Mais procurados (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptography
CryptographyCryptography
Cryptography
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Crytography
CrytographyCrytography
Crytography
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptanalysis 101
Cryptanalysis 101Cryptanalysis 101
Cryptanalysis 101
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 

Destaque (9)

Ucaya power point1
Ucaya power point1Ucaya power point1
Ucaya power point1
 
Angles pawer point 2 (1) real real 2
Angles pawer point 2 (1) real real 2Angles pawer point 2 (1) real real 2
Angles pawer point 2 (1) real real 2
 
Mat 10 u1
Mat 10 u1Mat 10 u1
Mat 10 u1
 
TWO EXTRAORDINARY TIME KEEPERS
TWO EXTRAORDINARY TIME KEEPERSTWO EXTRAORDINARY TIME KEEPERS
TWO EXTRAORDINARY TIME KEEPERS
 
Bradycakes
BradycakesBradycakes
Bradycakes
 
Adil zabroug resume
Adil zabroug resumeAdil zabroug resume
Adil zabroug resume
 
Healthy Travel
Healthy TravelHealthy Travel
Healthy Travel
 
DfSC
DfSCDfSC
DfSC
 
Careers_Trainee
Careers_TraineeCareers_Trainee
Careers_Trainee
 

Semelhante a Cryptology - The practice and study of hiding information

UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptxssuserd5e356
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniquesMohitManna
 
Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxLecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxmustafaenayat
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesMurali Krishna
 
Ch 12: Cryptography
Ch 12: CryptographyCh 12: Cryptography
Ch 12: CryptographySam Bowne
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdfSetiya Nugroho
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingSumit Satam
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxLec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxskknowledge
 
How to do Cryptography right in Android Part One
How to do Cryptography right in Android Part OneHow to do Cryptography right in Android Part One
How to do Cryptography right in Android Part OneArash Ramez
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesMona Rajput
 

Semelhante a Cryptology - The practice and study of hiding information (20)

Cryptography
CryptographyCryptography
Cryptography
 
Security - ch3.pptx
Security - ch3.pptxSecurity - ch3.pptx
Security - ch3.pptx
 
Security - ch3.pptx
Security - ch3.pptxSecurity - ch3.pptx
Security - ch3.pptx
 
Sw2
Sw2Sw2
Sw2
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
 
Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxLecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptx
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modules
 
Ch 12: Cryptography
Ch 12: CryptographyCh 12: Cryptography
Ch 12: Cryptography
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxLec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptx
 
How to do Cryptography right in Android Part One
How to do Cryptography right in Android Part OneHow to do Cryptography right in Android Part One
How to do Cryptography right in Android Part One
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Cryptology - The practice and study of hiding information

  • 1. Cryptology The practice and study of hiding information. michael.dance@gmail.com @mikedance
  • 2. Presentation Goals • Provide a high level overview of cryptography • Clarify the objectives of cryptography • Define the terminology • Explain the basic concepts to build an understanding of how digital security systems, like Bitcoin, are built
  • 3. Branches • Cryptography • Symmetric Algorithms • Asymmetric (Public Key) Algorithms • Cryptography Protocols • Cryptanalysis
  • 4. Cryptography Objectives There are four things we are trying to achieve with cryptography.
  • 5. Confidentiality Information is kept secret from all but the authorised parties.
  • 6. Message Authentication The sender of a message is authentic.
  • 7. Message Integrity The message has not been tampered with during transmission.
  • 8. Non Repudiation The sender of a message cannot deny that they created or sent the message.
  • 9. Terminology There are around 21 terms you have to know.
  • 10. Cryptography The science of secret writing with the goal of hiding the meaning of a message.
  • 11. Cryptanalysis The science and art of breaking crypto systems.
  • 12. Cipher/Cypher An algorithm for performing encryption and decryption.
  • 13. Encryption The process of hiding the meaning of a message so only authorised parties can read it.
  • 14. Decryption The process of restoring a cipher text to the original message.
  • 15. Channel A communication medium, for example, the internet, mobile/wireless networks, radio waves, etc.
  • 16. Secure Channel A secure communication medium which can be trusted, used to exchange secret key information, for example, face to face communication.
  • 17. Insecure Channel An insecure channel is an untrusted communication medium, for example, the internet.
  • 18. Message The plaintext (readable) message you would like to keep secret.
  • 20. Symmetric Algorithms When encryption and decryption is performed using the same secret key.
  • 21. Secret Key The data used to encrypt and decrypt in a symmetric algorithm. For example, a password. This must be communicated over a secure channel and kept secret.
  • 22. Asymmetric/Public Key Algorithms When encryption and decryption is performed using different keys.
  • 23. Private Key The key used to decrypt a cipher text in a public key algorithm. This must be kept secret.
  • 24. Public Key The key used to encrypt a message in a public key algorithm. This can be made public.
  • 25. Key Pair The related public and private keys.
  • 26. Key Space The set of all possible keys.
  • 27. Key Size/Length The size measured in bits of the key, this determines the key space required to brute force attack the key.
  • 29. PRNG Pseudo Random Number Generator is a RNG that is not truly random, used when security is not a concern, for example with video games.
  • 30. CSPRNG A cryptographically secure pseudo-random number generator. Used for cryptography applications, for example generating a bitcoin private key.
  • 31. THE END. Of the terminology.
  • 33. Kerckhoffs’ Principle A crypto system should be secure even if the attacker knows all the details about the system, with the exception of the secret key.
  • 34. Symmetric Crypto Systems Uses one secret key for encryption and decryption
  • 35. Analogy A safe with one lock where each person with access has a copy of the same key
  • 36. DES • Data Encryption Standard • The most popular and best studied block cipher of the last 30 years • Proposed in 1974 in response to a NIST (National Institute of Standards and Technology) request for a standardised cipher to secure government and national security communications • Proposed by IBM cryptographers, with input from the NSA with no public discourse • Insecure due to small key space
  • 37. 3DES • Triple DES • Performs DES encryption 3 times, which yields a more secure cipher • Still widely used primarily due to legacy implementations and hardware • Software implementations are not very efficient
  • 38. AES • Advanced Encryption Standard • The most widely used symmetric cipher today • In 1997, an open worldwide competition was held where cryptography algorithms were submitted and reviewed by the international scientific community • In 2001, the Rinjdael cipher, created by two young Belgian cryptographers was selected for AES over submissions from IBM, RSA, and several famous cryptographers • In 2003, the NSA announced it will allow AES encryption to be used for classified top secret documents • Used in Blockchain.info wallets, Mac FileVault, Skype, WIFI encryption, IPSec, TLS, SSH, etc. • No known attacks have been found
  • 39. Symmetric Pitfalls • Key Distribution Problem • A copy of the key must be exchanged over a secure channel, problematic to do over the internet! • The number of keys required can get very large • Non repudiation is not possible because several people may use the same key
  • 40. Asymmetric/Public Key Crypto Systems Uses a public key for encryption and a private key for decryption.
  • 41. Analogy A mailbox on the street, everyone can put a letter in (encrypt), but only a person with a private (secret) key can retrieve the letters (decrypt).
  • 42. Background • Symmetric cryptography has been around for as long as written language, public key cryptography is very new • Public key cryptography was publicly introduced in 1976 by Whitfield Diffie, Martin Hellman, and Ralph Merkle
  • 43. Overview • Solves the key exchange problem because the encryption key can be public (hence the name, public key) • Can be used to prove the authenticity and integrity of a message using digital signatures, and a digital signature algorithm (non repudiation) • Can be used to identify entities using challenge and response protocols together with digital signatures, for example, electronic car keys, passports, or bank cards • Relies on one way functions, which is easy to compute in one direction, but the inverse computation is computationally infeasible
  • 44. RSA • Published in 1977 by Ron Rivest, Adi Shamir and Leonard Adleman • Security is provided by the integer factorisation problem • Given two large primes, it is easy to compute the product, but difficult to factor the resulting product • Requires large key sizes to be secure with modern day computers, which is problematic for smaller devices like mobile phones, smart cards, etc.
  • 45. Elliptic Curve Cryptography • Introduced in 1985 by Neal Koblitz and Victor S. Miller, algorithms entered wide use in 2004, and 2005 • Uses elliptic curve over finite field mathematics to generate public and private keys • Security is provided by the elliptic curve discrete logarithm problem • Provides roughly the same security of RSA with large key sizes, with much smaller key sizes, which is leading to adoption in mobile phones, and smart cards • Bitcoin uses private and public key pairs based on ECC
  • 46. Asymmetric Pitfalls • Encryption is significantly more computationally expensive than symmetric algorithms
  • 47. In reality A hybrid approach is used by using a public key algorithm (which is slower) to encrypt and exchange a symmetric key (which is small), a symmetric algorithm (which is fast) can then be used to encrypt the message (which is big).
  • 49. What’s Next? • Digital Signatures and Hash Functions • Elliptic Curve Cryptography • Bitcoin Cryptography
  • 51. Further Reading • Understanding Cryptography by Christof Paar and Jan Pelzl (http://www.crypto-textbook.com/) • Cryptography Lectures • https://www.youtube.com/playlist? list=PLoJC20gNfC2gAB-eg7oaUTheB_JgQY4-q • Public Key Cryptography: Diffie-Hellman Key Exchange • https://www.youtube.com/watch?v=3QnD2c4Xovk