SlideShare uma empresa Scribd logo
1 de 35
10- System.Security.Cryptography 
@MhdAlyan
Outlines  Discover System.Security.Cryptography(How To Ensure Secure Layer for our 
Applications) 
 Understand Security Objectives (Security Requirements) , Security 
Mechanism . 
 Explaining Security Requirements such as : 
 Confidentiality 
 Data Integrity 
 Availability 
 Authentications 
 None Repudiation . 
 Symmetric Encryption(Such as : AES) . 
 Asymmetric Encryption(Such as : RSA). 
05 2 تشرين الثاني، 14
Course Outlines 
 Hash Functions(Such as , MD5 ,SHA-n) 
 Message Authentication ways. 
 Digital Signature ,What is it ? , Why do we need? , How is it used? 
 Entity Authentication (Such as : by Random Numbers !) 
 PKI 
 CA 
 … 
05 3 تشرين الثاني، 14
Introduction 
 What is Security? 
 What is Information Security? 
 Why We Need to Information security ? 
 security requirements 
 Security Mechanisms 
05 4 تشرين الثاني، 14
What is Security? 
 What is Security? 
 Protecting general assets 
 can be realized through: 
 Prevention 
 Detection 
 Reaction 
 Example : Private property 
 Prevention: locks at doors, window bars, walls around the property. 
 Detection: stolen items aren’t there any more, burglar alarms, CCTV, … 
 Reaction: call the police,… 
05 5 تشرين الثاني، 14
What is Information Security ? 
 Information security 
 Protecting information and information resources such as: 
books, faxes, computer data, voice communications, etc. 
 Information security 
 What needs to be protected ? , i.e., assets 
 Why (Security requirements which include CIA), 
 What we need to protect from (Threats, vulnerabilities, risks), 
 and how (Security measures) to protect it for as long as it exists 
 Security measures are implemented according to security policies 
05 6 تشرين الثاني، 14
7 
What is Information Systems Security? 
Information 
Systems 
Security (assets) 
Measures 
Attackers 
Policies
security requirements 
 Most important security requirements are: 
 Confidentiality: keeping information secret from 
all but those who are authorized to see it. 
 Integrity: ensuring information has not been 
altered by unauthorized or unknown means. 
 Availability: keeping information accessible by 
authorized users when required 
05 8 تشرين الثاني، 14
Security Goals 
Integrity 
Confidentiality 
Avaliability 
Henric Johnson 9
security requirements 
Other requirements: 
 Entity authentication: corroboration of the identity of an 
entity (e.g., a person, a credit card) 
 Identification, identity verification 
 Message authentication: corroborating the source of 
information; also known as data origin authentication. 
 Message authentication implicitly provides data integrity 
 Non-repudiation: preventing the denial of previous 
commitments or actions 
05 10 تشرين الثاني، 14
Security Mechanisms 
 Cryptography 
 Using Hashing (One Way Function) Functions For Data 
Integrity 
 Using Random Numbers for Authentication 
 Using Digital Signature For None –Repudiation 
05 11 تشرين الثاني، 14
Cryptography 
 Encryption algorithms have the following schema: 
05 12 تشرين الثاني، 14
Cryptography algorithms 
 Types of cryptographic algorithms: 
 Symmetric Cryptography 
 Stream Cipher . 
 Block Cipher (Such as , DES ,3DES,AES) 
 Asymmetric (Public Key) Cryptography(RSA,ElGamal) 
05 13 تشرين الثاني، 14
Symmetric Cryptography
15 
Symmetric Cryptography 
Encryption key = Decryption key 
ciphertext 
Encryption 
Algorithm 
Decryption 
plaintext algorithm plaintext 
AES 
Block of plaintext 
128 
Block of ciphertext 
128 
Encryption key 
128, 192, or 256
Symmetric Cryptography 
Example 
 Characteristics : 
 Using The Same Key , for Encryption and Decryption 
 Relatively small size of the key 
 Key must be kept secret 
 In a multiuser environment, there are heaters in the 
process of key management 
 Relatively Fast. 
 Prefer to use for encrypting the massive information. 
05 16 تشرين الثاني، 14
Asymmetric Cryptography 
05 17 تشرين الثاني، 14
Asymmetric Cryptography 
 Alice wants to send a secret message m to Bob 
 Bob should have 2 keys: public KUb and private KRb 
 Prior to message encryption, Alice gets by some means an 
authentic copy of Bob’s public key (i.e., the encryption 
key) 
05 18 تشرين الثاني، 14
Asymmetric Cryptography 
Decryption 
KRb 
Key Source 
Message 
Source 
Encryption 
m 
Alice 
Message 
Source 
m 
Bob 
KUb 
05 19 تشرين الثاني، 14
Asymmetric Cryptography 
Example 
 Characteristics : 
 Two keys are used. 
 The size of the keys is too large(over 1024 bit) 
 Does not need the public key to any confidential 
 Relatively Slow. 
 Preferably be used in data encryption small size 
(asymmetric keys algorithms, such as AES Key) 
05 20 تشرين الثاني، 14
Public Keys Distribution 
 By the hand 
05 21 تشرين الثاني، 14
Attacking RSA 
05 22 تشرين الثاني، 14
Attacking RSA 
RSA claims that 1024-bit keys are likely to 
become crackable some time between 2006 
and 2010 and that 2048-bit keys are 
sufficient until 2030. 
An RSA key length of 3072 bits should be 
used if security is required beyond 2030. 
05 23 تشرين الثاني، 14
One-Way Functions (OWF) 
 A one-way function is a function that is “easy” to compute 
and “difficult” to reverse (Such as : MD5,SHA-n) 
 H(m) provides error-detection capability(Data Integrity) 
 Example. 
05 24 تشرين الثاني، 14
Message Authentication 
 Message authentication is a procedure to verify that 
received messages come from the pretended source 
and have not been altered. 
 Also called data origin authentication 
 It provides integrity. 
05 25 تشرين الثاني، 14
Message Authentication 
 Message Authentication Can be done by: 
 Message encryption: 
 Symmetric encryption: if the encryption/decryption key is not known to any other 
party (except the sender and receiver) 
 Asymmetric encryption: 
 the sender should uses its private key to encrypt the message, 
 the sender’s public key is then used to decrypt the message. 
 This helps providing only authentication ! 
 Hash code: 
 H(m||S), where S is secret key shared between the sender and receiver. 
 No encryption 
05 تشرين الثاني، 14 
26
Message Authentication 
 Example . 
05 27 تشرين الثاني، 14
Digital signature 
 The purpose of a digital signature is thus for an entity to bind 
its identity to a message. 
 We use the term: 
 signer for an entity who creates a digital signature 
 verifier for an entity who receives a signed message and attempts to 
check whether the digital signature is “correct” or not. 
 A digital signature on a message provides: 
 Message authentication : message’s origin is known + integrity 
 Non-repudiation 
05 28 تشرين الثاني، 14
Digital signature using hash algorithms 
05 29 تشرين الثاني، 14
RSA Signature 
message 
Hash 
Function 
Hash 
(RSA) 
signature 
Signer’s 
private key 
message Signed 
signature 
message 
05 30 تشرين الثاني، 14
Verification of a RSA Signature 
Signer’s 
public key 
Hash 
Function 
message 
signature 
= ? 
Decision 
(RSA) 
05 31 تشرين الثاني، 14
32 
•Traditional method of using a password (PAP) 
Password1 
User Name 
+Password 
Network
33 
• CHAP Method 
Network 
Client1 P1 
Client2 P2 
Client3 P3 
P1 
Rand1 
Hash(Rand1,P1)
05 34 تشرين الثاني، 14
05 35 تشرين الثاني، 14

Mais conteúdo relacionado

Mais procurados

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI TechnologySylvain Maret
 
Data encryption
Data encryptionData encryption
Data encryptionAman Jain
 
POST-QUANTUM CRYPTOGRAPHY
POST-QUANTUM CRYPTOGRAPHYPOST-QUANTUM CRYPTOGRAPHY
POST-QUANTUM CRYPTOGRAPHYPavithra Muthu
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL CertificateCheapSSLUSA
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Mumbai Academisc
 
Network Security: Standards and Cryptography
Network Security: Standards and CryptographyNetwork Security: Standards and Cryptography
Network Security: Standards and CryptographyJack Davis
 
Inro to Secure Sockets Layer: SSL
Inro to Secure Sockets Layer: SSLInro to Secure Sockets Layer: SSL
Inro to Secure Sockets Layer: SSLDipankar Achinta
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
 
Online security & encryption
Online security & encryptionOnline security & encryption
Online security & encryptionQamar Farooq
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notesgangadhar9989166446
 
Cryptography and security
Cryptography and securityCryptography and security
Cryptography and securityresearch30
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowBrijesh Vishwakarma
 

Mais procurados (20)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Ciphers
CiphersCiphers
Ciphers
 
Data encryption
Data encryptionData encryption
Data encryption
 
POST-QUANTUM CRYPTOGRAPHY
POST-QUANTUM CRYPTOGRAPHYPOST-QUANTUM CRYPTOGRAPHY
POST-QUANTUM CRYPTOGRAPHY
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL Certificate
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)
 
Network Security: Standards and Cryptography
Network Security: Standards and CryptographyNetwork Security: Standards and Cryptography
Network Security: Standards and Cryptography
 
Inro to Secure Sockets Layer: SSL
Inro to Secure Sockets Layer: SSLInro to Secure Sockets Layer: SSL
Inro to Secure Sockets Layer: SSL
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
Online security & encryption
Online security & encryptionOnline security & encryption
Online security & encryption
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Marco Casassa Mont: Pki overview
Marco Casassa Mont: Pki overviewMarco Casassa Mont: Pki overview
Marco Casassa Mont: Pki overview
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
Cryptography and security
Cryptography and securityCryptography and security
Cryptography and security
 
s117
s117s117
s117
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 

Destaque

1 first lesson -assemblies
1  first lesson -assemblies1  first lesson -assemblies
1 first lesson -assembliesMohammad Alyan
 
3 third lesson-reflection
3 third lesson-reflection3 third lesson-reflection
3 third lesson-reflectionMohammad Alyan
 
Fax With Sangoma Gateway
Fax With Sangoma GatewayFax With Sangoma Gateway
Fax With Sangoma GatewayHossein Yavari
 
2 second lesson- attributes
2 second lesson- attributes2 second lesson- attributes
2 second lesson- attributesMohammad Alyan
 
4 fourth lesson-deployment
4 fourth lesson-deployment4 fourth lesson-deployment
4 fourth lesson-deploymentMohammad Alyan
 
Login System with Windows/Microsoft Live using OAuth php and mysql
Login System with Windows/Microsoft Live using OAuth php and mysqlLogin System with Windows/Microsoft Live using OAuth php and mysql
Login System with Windows/Microsoft Live using OAuth php and mysqlthesoftwareguy7
 
8 memory managment & pointers
8 memory managment & pointers8 memory managment & pointers
8 memory managment & pointersMohammad Alyan
 

Destaque (13)

1 first lesson -assemblies
1  first lesson -assemblies1  first lesson -assemblies
1 first lesson -assemblies
 
5 fifth lesson -xml
5 fifth lesson -xml5 fifth lesson -xml
5 fifth lesson -xml
 
Introduction To ERP
Introduction To ERPIntroduction To ERP
Introduction To ERP
 
7 multi threading
7 multi threading7 multi threading
7 multi threading
 
3 third lesson-reflection
3 third lesson-reflection3 third lesson-reflection
3 third lesson-reflection
 
Fax With Sangoma Gateway
Fax With Sangoma GatewayFax With Sangoma Gateway
Fax With Sangoma Gateway
 
2 second lesson- attributes
2 second lesson- attributes2 second lesson- attributes
2 second lesson- attributes
 
4 fourth lesson-deployment
4 fourth lesson-deployment4 fourth lesson-deployment
4 fourth lesson-deployment
 
Login System with Windows/Microsoft Live using OAuth php and mysql
Login System with Windows/Microsoft Live using OAuth php and mysqlLogin System with Windows/Microsoft Live using OAuth php and mysql
Login System with Windows/Microsoft Live using OAuth php and mysql
 
8 memory managment & pointers
8 memory managment & pointers8 memory managment & pointers
8 memory managment & pointers
 
Coursera
CourseraCoursera
Coursera
 
9 networking
9 networking9 networking
9 networking
 
Models for hierarchical data
Models for hierarchical dataModels for hierarchical data
Models for hierarchical data
 

Semelhante a 10 system.security.cryptography

Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSSURBHI SAROHA
 
Cryptography /Sankar jayam
Cryptography /Sankar jayamCryptography /Sankar jayam
Cryptography /Sankar jayamtasankar14
 
Sw2 prezen3pdf
Sw2 prezen3pdfSw2 prezen3pdf
Sw2 prezen3pdfs1190088
 
Sw prezen3pdf
Sw prezen3pdfSw prezen3pdf
Sw prezen3pdfs1190088
 
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYMETHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYIJNSA Journal
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...pankaj kumari
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...Kimberly Thomas
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...IOSR Journals
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationAlex Punnen
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvanitrraincity
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfKailasS9
 

Semelhante a 10 system.security.cryptography (20)

Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Cryptography /Sankar jayam
Cryptography /Sankar jayamCryptography /Sankar jayam
Cryptography /Sankar jayam
 
Sankar jayam
Sankar jayamSankar jayam
Sankar jayam
 
Sw2 prezen3pdf
Sw2 prezen3pdfSw2 prezen3pdf
Sw2 prezen3pdf
 
Sw prezen3pdf
Sw prezen3pdfSw prezen3pdf
Sw prezen3pdf
 
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYMETHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
 
Cryptography
CryptographyCryptography
Cryptography
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
 
Week12 b
Week12 bWeek12 b
Week12 b
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Encryption Primer por Cathy Nolan
Encryption Primer por Cathy NolanEncryption Primer por Cathy Nolan
Encryption Primer por Cathy Nolan
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentation
 
Encryption techniques
Encryption techniques Encryption techniques
Encryption techniques
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 

Mais de Mohammad Alyan

Mais de Mohammad Alyan (11)

Blue ocean strategy arabic
Blue ocean strategy arabicBlue ocean strategy arabic
Blue ocean strategy arabic
 
Apple case study
Apple case studyApple case study
Apple case study
 
Introduction to Industry Life Cycles
 Introduction to Industry Life Cycles  Introduction to Industry Life Cycles
Introduction to Industry Life Cycles
 
Crowd funding
Crowd fundingCrowd funding
Crowd funding
 
Coursera
CourseraCoursera
Coursera
 
Course index
Course indexCourse index
Course index
 
التفكير- مصنع للإبداع
التفكير- مصنع للإبداعالتفكير- مصنع للإبداع
التفكير- مصنع للإبداع
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Linq introduction
Linq introductionLinq introduction
Linq introduction
 
10 1 otp all
10 1 otp all10 1 otp all
10 1 otp all
 
6 ado.net
6 ado.net6 ado.net
6 ado.net
 

10 system.security.cryptography

  • 2. Outlines  Discover System.Security.Cryptography(How To Ensure Secure Layer for our Applications)  Understand Security Objectives (Security Requirements) , Security Mechanism .  Explaining Security Requirements such as :  Confidentiality  Data Integrity  Availability  Authentications  None Repudiation .  Symmetric Encryption(Such as : AES) .  Asymmetric Encryption(Such as : RSA). 05 2 تشرين الثاني، 14
  • 3. Course Outlines  Hash Functions(Such as , MD5 ,SHA-n)  Message Authentication ways.  Digital Signature ,What is it ? , Why do we need? , How is it used?  Entity Authentication (Such as : by Random Numbers !)  PKI  CA  … 05 3 تشرين الثاني، 14
  • 4. Introduction  What is Security?  What is Information Security?  Why We Need to Information security ?  security requirements  Security Mechanisms 05 4 تشرين الثاني، 14
  • 5. What is Security?  What is Security?  Protecting general assets  can be realized through:  Prevention  Detection  Reaction  Example : Private property  Prevention: locks at doors, window bars, walls around the property.  Detection: stolen items aren’t there any more, burglar alarms, CCTV, …  Reaction: call the police,… 05 5 تشرين الثاني، 14
  • 6. What is Information Security ?  Information security  Protecting information and information resources such as: books, faxes, computer data, voice communications, etc.  Information security  What needs to be protected ? , i.e., assets  Why (Security requirements which include CIA),  What we need to protect from (Threats, vulnerabilities, risks),  and how (Security measures) to protect it for as long as it exists  Security measures are implemented according to security policies 05 6 تشرين الثاني، 14
  • 7. 7 What is Information Systems Security? Information Systems Security (assets) Measures Attackers Policies
  • 8. security requirements  Most important security requirements are:  Confidentiality: keeping information secret from all but those who are authorized to see it.  Integrity: ensuring information has not been altered by unauthorized or unknown means.  Availability: keeping information accessible by authorized users when required 05 8 تشرين الثاني، 14
  • 9. Security Goals Integrity Confidentiality Avaliability Henric Johnson 9
  • 10. security requirements Other requirements:  Entity authentication: corroboration of the identity of an entity (e.g., a person, a credit card)  Identification, identity verification  Message authentication: corroborating the source of information; also known as data origin authentication.  Message authentication implicitly provides data integrity  Non-repudiation: preventing the denial of previous commitments or actions 05 10 تشرين الثاني، 14
  • 11. Security Mechanisms  Cryptography  Using Hashing (One Way Function) Functions For Data Integrity  Using Random Numbers for Authentication  Using Digital Signature For None –Repudiation 05 11 تشرين الثاني، 14
  • 12. Cryptography  Encryption algorithms have the following schema: 05 12 تشرين الثاني، 14
  • 13. Cryptography algorithms  Types of cryptographic algorithms:  Symmetric Cryptography  Stream Cipher .  Block Cipher (Such as , DES ,3DES,AES)  Asymmetric (Public Key) Cryptography(RSA,ElGamal) 05 13 تشرين الثاني، 14
  • 15. 15 Symmetric Cryptography Encryption key = Decryption key ciphertext Encryption Algorithm Decryption plaintext algorithm plaintext AES Block of plaintext 128 Block of ciphertext 128 Encryption key 128, 192, or 256
  • 16. Symmetric Cryptography Example  Characteristics :  Using The Same Key , for Encryption and Decryption  Relatively small size of the key  Key must be kept secret  In a multiuser environment, there are heaters in the process of key management  Relatively Fast.  Prefer to use for encrypting the massive information. 05 16 تشرين الثاني، 14
  • 17. Asymmetric Cryptography 05 17 تشرين الثاني، 14
  • 18. Asymmetric Cryptography  Alice wants to send a secret message m to Bob  Bob should have 2 keys: public KUb and private KRb  Prior to message encryption, Alice gets by some means an authentic copy of Bob’s public key (i.e., the encryption key) 05 18 تشرين الثاني، 14
  • 19. Asymmetric Cryptography Decryption KRb Key Source Message Source Encryption m Alice Message Source m Bob KUb 05 19 تشرين الثاني، 14
  • 20. Asymmetric Cryptography Example  Characteristics :  Two keys are used.  The size of the keys is too large(over 1024 bit)  Does not need the public key to any confidential  Relatively Slow.  Preferably be used in data encryption small size (asymmetric keys algorithms, such as AES Key) 05 20 تشرين الثاني، 14
  • 21. Public Keys Distribution  By the hand 05 21 تشرين الثاني، 14
  • 22. Attacking RSA 05 22 تشرين الثاني، 14
  • 23. Attacking RSA RSA claims that 1024-bit keys are likely to become crackable some time between 2006 and 2010 and that 2048-bit keys are sufficient until 2030. An RSA key length of 3072 bits should be used if security is required beyond 2030. 05 23 تشرين الثاني، 14
  • 24. One-Way Functions (OWF)  A one-way function is a function that is “easy” to compute and “difficult” to reverse (Such as : MD5,SHA-n)  H(m) provides error-detection capability(Data Integrity)  Example. 05 24 تشرين الثاني، 14
  • 25. Message Authentication  Message authentication is a procedure to verify that received messages come from the pretended source and have not been altered.  Also called data origin authentication  It provides integrity. 05 25 تشرين الثاني، 14
  • 26. Message Authentication  Message Authentication Can be done by:  Message encryption:  Symmetric encryption: if the encryption/decryption key is not known to any other party (except the sender and receiver)  Asymmetric encryption:  the sender should uses its private key to encrypt the message,  the sender’s public key is then used to decrypt the message.  This helps providing only authentication !  Hash code:  H(m||S), where S is secret key shared between the sender and receiver.  No encryption 05 تشرين الثاني، 14 26
  • 27. Message Authentication  Example . 05 27 تشرين الثاني، 14
  • 28. Digital signature  The purpose of a digital signature is thus for an entity to bind its identity to a message.  We use the term:  signer for an entity who creates a digital signature  verifier for an entity who receives a signed message and attempts to check whether the digital signature is “correct” or not.  A digital signature on a message provides:  Message authentication : message’s origin is known + integrity  Non-repudiation 05 28 تشرين الثاني، 14
  • 29. Digital signature using hash algorithms 05 29 تشرين الثاني، 14
  • 30. RSA Signature message Hash Function Hash (RSA) signature Signer’s private key message Signed signature message 05 30 تشرين الثاني، 14
  • 31. Verification of a RSA Signature Signer’s public key Hash Function message signature = ? Decision (RSA) 05 31 تشرين الثاني، 14
  • 32. 32 •Traditional method of using a password (PAP) Password1 User Name +Password Network
  • 33. 33 • CHAP Method Network Client1 P1 Client2 P2 Client3 P3 P1 Rand1 Hash(Rand1,P1)
  • 34. 05 34 تشرين الثاني، 14
  • 35. 05 35 تشرين الثاني، 14