SlideShare uma empresa Scribd logo
1 de 23
Zahid Mian
Part of the Brown-bag Series
 History andTerms
 WhyWe Need Encryption
 How is Encryption Used In Systems
 Difference in Ciphers
 Various Implementations
 HashValues
 Digital Signatures
 Why Attacks Are Successful
 Hieroglyphs
 4000 years ago
 Use pictures to represent words/messages
 Caesar ShiftCipher
 Replace characters by an offset (or shifting)
 Offset = 2, then “hello” -> “jgnnq”
 Improvements over time
 Steganography,Vigenere Coding
 Modern really means digital
 Much more mathematically oriented
 Operating on bit values
 Use of public key and secret key
 Even though algorithm are public, it’s nearly
impossible to obtain original information
 Plaintext –The original information
 Cipher – A secret way of writing (an algorithm)
 Encryption Key – A value that is used to encrypt plaintext
(aka, public key)
 Decryption Key – A value that is used to decrypt
Ciphertext (aka, private key)
 Ciphertext -The encrypted information
 Algorithm – (Often) Public algorithm that uses keys to
encrypt or decrypt information
 Interceptor/Attacker – unauthorized entity that tries to
determine the cipher text (aka, hacker)
 Symmetric – single key used for encryption and
decryption
 Asymmetric – uses public key and private key
http://www.infosectoday.com/Articles/Intro_to_Cryptography/CryptoFig05a.jpg
This is how things generally work today, but there are a lot of
pieces that make this happen.
 Passive – Simply gaining unauthorized access to
information.
 Most common password is 123456
 Active – A hacker attempts to make changes to
data on the target or data en route
 Masquerading: hacker pretends to be someone
 Denial of Service (DoS): deny access to legitimate
users by overwhelming the system (common)
 Using technical information to steal user id (e.g.,
using session id)
 Known Plaintext Attack (KPA)
 Attacker knows plaintext of some part of the ciphertext; attempts to
decrypt the rest
 Chosen Plaintext Attack (CPA)
 Attacker has ciphertext and plaintext; attempts to determine key
 Brute Force Attack (BFA)
 Attacker tries to determine key by attempting all possible values
 Man in the Middle (MIM)
 Simple, but technically challenging method of duping both the sender
and the receiver into thinking keys came from correct source
 Side Channel Attacks (SCA)
 Data Remanence (reading data that should have been deleted)
 Row Hammer (low-level memory hack)
 Fault Analysis (forcing errors and reading outputs for clues)
 Traditionally Ciphers were single character
 Caesar Cipher: shift a single character
 Two-character Cipher (Playfair)
 Use two characters as key
 String Cipher (Vigenere)
 Use a string (word) as key
 One-Time Pad
 Key length equals length of plaintext
 Block/Stream (DES,AES)
 Plaintext is processed in blocks/streams of bits at a
time
Simple
Feedback
 Underlying model for many block ciphers
 Same algorithm for encryption/decryption
 Steps
 Input is split into two halves
 RHS input is transformed by function f which receives
a subkey
 LHS combined with transformed input from RHS
using XOR operation
 RHS and LHS are switched to obtain the input for next
round
 Repeat
32 bit 32 bit
f
32 bit 32 bit
32 bit 32 bit
Ki
LHSi-1 RHSi-1
LHSi-1 = RHSi-1 RHSi-1 = LHSi-1
 Block size is 64 bits
 Key length is 64 bits (though only 56 are used)
 Round-key generator creates 48-bit Key
• Very Strong Cipher
• Fallen out of favor
because small key value
• Can be hacked with
exhaustive search
 Don’t abandon original DES; change usage
 Effectively use 3 Keys (3X56 = 168)
 Problem of short key solved
 Kind of slow
 Process
 Encrypt plaintext using K1
 Decrypt output of Step1 using K2
 Encrypt output of Step2 using K3
 Output of Step3 is ciphertext
 Decrypt in reverse order
 The more popular algorithm today
 Much faster thanTriple DES
 128-bit data; 128/192/256-bit keys
 Key size depends on the number of rounds
 A “bit” more complex algorithm (pun
intended)
 For details see online resources
 To-Date no attacks againstAES have been
successful
 Asymmetric Cipher (diff keys)
 Necessary due to growth of
Internet
 Used for smaller pieces of data
 ThreeTypes
 RSA (widely used)
 ElGamal
 Elliptic Curve Cryptography (ECC)
http://etutorials.org/Programming/Programming+.net+security/Part+III+.NET+Cryptography/Chapter+15.+Asymmetric+Encryption/15.1+
Asymmetric+Encryption+Explained/
 Function that converts arbitrarily long numeric
input into a fixed numeric output called a hash
 Very Efficient
 Hard to reverse value
 Hard to produce same hash for diff inputs
 Some well known Hash Functions
 Message Digest (MD), Secure Hash Function (SHA),
RIPEMD
 Most Common Use: Password Storage
 Secure Apps will not save your password in plaintext
 How can we be sure a message is authentic?
 In the old days, a signature on a letter proved
authenticity
 Digital Signatures do the same thing-they
ensure that the message is from the original
sender with the original message
 Adds trust when exchanging data
 Using Encryption with Digital Signatures is
important
 Certifying Authority (CA) responsible for
management of certificates
 Generating, issuing, publishing, verifying, revoking
Encryption of Email
Decryption of Email
 User Carelessness / Stolen Credentials
 Stolen equipment (laptops, phones, etc.)
 Incorrect Implementation / Backdoor
 Broken Processes / InsiderThreats
 PhishingAttacks
 Sending sensitive data over plaintext
 Zero-day threats / Maintenance
 Application vulnerabilities
Intro to modern cryptography
Intro to modern cryptography

Mais conteúdo relacionado

Mais procurados

6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
drewz lin
 

Mais procurados (20)

Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Cryptanalysis 101
Cryptanalysis 101Cryptanalysis 101
Cryptanalysis 101
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
DES
DESDES
DES
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryptography
CryptographyCryptography
Cryptography
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 

Destaque

Cryptography by Epul
Cryptography by EpulCryptography by Epul
Cryptography by Epul
Agate Studio
 
Message digest & digital signature
Message digest & digital signatureMessage digest & digital signature
Message digest & digital signature
Dinesh Kodam
 

Destaque (20)

Ch31
Ch31Ch31
Ch31
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
Modern Cryptography
Modern CryptographyModern Cryptography
Modern Cryptography
 
Apprenticeship artifact
Apprenticeship  artifactApprenticeship  artifact
Apprenticeship artifact
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
Cryptography by Epul
Cryptography by EpulCryptography by Epul
Cryptography by Epul
 
Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation
 
Cryptography
Cryptography Cryptography
Cryptography
 
Message digest & digital signature
Message digest & digital signatureMessage digest & digital signature
Message digest & digital signature
 
Forouzan isdn
Forouzan isdnForouzan isdn
Forouzan isdn
 
PSTN
PSTNPSTN
PSTN
 
Basic ISDN
Basic ISDNBasic ISDN
Basic ISDN
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
ISDN & DSL
ISDN & DSLISDN & DSL
ISDN & DSL
 
Diffiehellman
DiffiehellmanDiffiehellman
Diffiehellman
 
Lesson 1 the pstn
Lesson 1 the pstnLesson 1 the pstn
Lesson 1 the pstn
 
Presentation on DSL & ADSL
Presentation on DSL & ADSLPresentation on DSL & ADSL
Presentation on DSL & ADSL
 
DSL - ADSL
DSL - ADSLDSL - ADSL
DSL - ADSL
 
Isdn networking
Isdn networkingIsdn networking
Isdn networking
 

Semelhante a Intro to modern cryptography

Cryptography
CryptographyCryptography
Cryptography
Rohan04
 
Unit V network management and security
Unit V network management and securityUnit V network management and security
Unit V network management and security
sangusajjan
 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptx
ams1ams11
 
Cryptography101
Cryptography101Cryptography101
Cryptography101
NCC Group
 

Semelhante a Intro to modern cryptography (20)

Day5
Day5Day5
Day5
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Unit V network management and security
Unit V network management and securityUnit V network management and security
Unit V network management and security
 
Cryptography
CryptographyCryptography
Cryptography
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Moein
MoeinMoein
Moein
 
Encryption Primer por Cathy Nolan
Encryption Primer por Cathy NolanEncryption Primer por Cathy Nolan
Encryption Primer por Cathy Nolan
 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptx
 
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...
 
Cryptography101
Cryptography101Cryptography101
Cryptography101
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Password based encryption
Password based encryptionPassword based encryption
Password based encryption
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 

Mais de zahid-mian (9)

Mongodb Aggregation Pipeline
Mongodb Aggregation PipelineMongodb Aggregation Pipeline
Mongodb Aggregation Pipeline
 
MongoD Essentials
MongoD EssentialsMongoD Essentials
MongoD Essentials
 
Hadoop Technologies
Hadoop TechnologiesHadoop Technologies
Hadoop Technologies
 
Hadoop M/R Pig Hive
Hadoop M/R Pig HiveHadoop M/R Pig Hive
Hadoop M/R Pig Hive
 
NoSQL Databases
NoSQL DatabasesNoSQL Databases
NoSQL Databases
 
Statistics101: Numerical Measures
Statistics101: Numerical MeasuresStatistics101: Numerical Measures
Statistics101: Numerical Measures
 
Amazon SimpleDB
Amazon SimpleDBAmazon SimpleDB
Amazon SimpleDB
 
C# 6 New Features
C# 6 New FeaturesC# 6 New Features
C# 6 New Features
 
Introduction to d3js (and SVG)
Introduction to d3js (and SVG)Introduction to d3js (and SVG)
Introduction to d3js (and SVG)
 

Último

The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 

Último (20)

The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT  - Elevating Productivity in Today's Agile EnvironmentHarnessing ChatGPT  - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 

Intro to modern cryptography

  • 1. Zahid Mian Part of the Brown-bag Series
  • 2.  History andTerms  WhyWe Need Encryption  How is Encryption Used In Systems  Difference in Ciphers  Various Implementations  HashValues  Digital Signatures  Why Attacks Are Successful
  • 3.  Hieroglyphs  4000 years ago  Use pictures to represent words/messages  Caesar ShiftCipher  Replace characters by an offset (or shifting)  Offset = 2, then “hello” -> “jgnnq”  Improvements over time  Steganography,Vigenere Coding
  • 4.  Modern really means digital  Much more mathematically oriented  Operating on bit values  Use of public key and secret key  Even though algorithm are public, it’s nearly impossible to obtain original information
  • 5.  Plaintext –The original information  Cipher – A secret way of writing (an algorithm)  Encryption Key – A value that is used to encrypt plaintext (aka, public key)  Decryption Key – A value that is used to decrypt Ciphertext (aka, private key)  Ciphertext -The encrypted information  Algorithm – (Often) Public algorithm that uses keys to encrypt or decrypt information  Interceptor/Attacker – unauthorized entity that tries to determine the cipher text (aka, hacker)  Symmetric – single key used for encryption and decryption  Asymmetric – uses public key and private key
  • 6. http://www.infosectoday.com/Articles/Intro_to_Cryptography/CryptoFig05a.jpg This is how things generally work today, but there are a lot of pieces that make this happen.
  • 7.  Passive – Simply gaining unauthorized access to information.  Most common password is 123456  Active – A hacker attempts to make changes to data on the target or data en route  Masquerading: hacker pretends to be someone  Denial of Service (DoS): deny access to legitimate users by overwhelming the system (common)  Using technical information to steal user id (e.g., using session id)
  • 8.  Known Plaintext Attack (KPA)  Attacker knows plaintext of some part of the ciphertext; attempts to decrypt the rest  Chosen Plaintext Attack (CPA)  Attacker has ciphertext and plaintext; attempts to determine key  Brute Force Attack (BFA)  Attacker tries to determine key by attempting all possible values  Man in the Middle (MIM)  Simple, but technically challenging method of duping both the sender and the receiver into thinking keys came from correct source  Side Channel Attacks (SCA)  Data Remanence (reading data that should have been deleted)  Row Hammer (low-level memory hack)  Fault Analysis (forcing errors and reading outputs for clues)
  • 9.  Traditionally Ciphers were single character  Caesar Cipher: shift a single character  Two-character Cipher (Playfair)  Use two characters as key  String Cipher (Vigenere)  Use a string (word) as key  One-Time Pad  Key length equals length of plaintext  Block/Stream (DES,AES)  Plaintext is processed in blocks/streams of bits at a time
  • 11.  Underlying model for many block ciphers  Same algorithm for encryption/decryption  Steps  Input is split into two halves  RHS input is transformed by function f which receives a subkey  LHS combined with transformed input from RHS using XOR operation  RHS and LHS are switched to obtain the input for next round  Repeat
  • 12. 32 bit 32 bit f 32 bit 32 bit 32 bit 32 bit Ki LHSi-1 RHSi-1 LHSi-1 = RHSi-1 RHSi-1 = LHSi-1
  • 13.  Block size is 64 bits  Key length is 64 bits (though only 56 are used)  Round-key generator creates 48-bit Key • Very Strong Cipher • Fallen out of favor because small key value • Can be hacked with exhaustive search
  • 14.  Don’t abandon original DES; change usage  Effectively use 3 Keys (3X56 = 168)  Problem of short key solved  Kind of slow  Process  Encrypt plaintext using K1  Decrypt output of Step1 using K2  Encrypt output of Step2 using K3  Output of Step3 is ciphertext  Decrypt in reverse order
  • 15.  The more popular algorithm today  Much faster thanTriple DES  128-bit data; 128/192/256-bit keys  Key size depends on the number of rounds  A “bit” more complex algorithm (pun intended)  For details see online resources  To-Date no attacks againstAES have been successful
  • 16.  Asymmetric Cipher (diff keys)  Necessary due to growth of Internet  Used for smaller pieces of data  ThreeTypes  RSA (widely used)  ElGamal  Elliptic Curve Cryptography (ECC)
  • 18.  Function that converts arbitrarily long numeric input into a fixed numeric output called a hash  Very Efficient  Hard to reverse value  Hard to produce same hash for diff inputs  Some well known Hash Functions  Message Digest (MD), Secure Hash Function (SHA), RIPEMD  Most Common Use: Password Storage  Secure Apps will not save your password in plaintext
  • 19.  How can we be sure a message is authentic?  In the old days, a signature on a letter proved authenticity  Digital Signatures do the same thing-they ensure that the message is from the original sender with the original message  Adds trust when exchanging data  Using Encryption with Digital Signatures is important  Certifying Authority (CA) responsible for management of certificates  Generating, issuing, publishing, verifying, revoking
  • 21.  User Carelessness / Stolen Credentials  Stolen equipment (laptops, phones, etc.)  Incorrect Implementation / Backdoor  Broken Processes / InsiderThreats  PhishingAttacks  Sending sensitive data over plaintext  Zero-day threats / Maintenance  Application vulnerabilities

Notas do Editor

  1. Which of these are likely to happen? Some are more theoretical than practical.
  2. In feedback cipher, the encrypted text of the previous step is used to encrypt the next block
  3. Right side image shows the all 16 rounds of encryption. Number of rounds is configurable Left side shows a single round of encryption. LHS = Left Hand Side RHS = Right Hand Side
  4. Each person adopting this scheme has a public-private key pair. the key pairs used for encryption/decryption and signing/verifying are different. The private key used for signing is referred to as the signature key and the public key as the verification key. Signer feeds data to the hash function and generates hash of data. Hash value and signature key are then fed to the signature algorithm which produces the digital signature on given hash. Signature is appended to the data and then both are sent to the verifier. Verifier feeds the digital signature and the verification key into the verification algorithm. The verification algorithm gives some value as output. Verifier also runs same hash function on received data to generate hash value. For verification, this hash value and output of verification algorithm are compared. Based on the comparison result, verifier decides whether the digital signature is valid. Since digital signature is created by ‘private’ key of signer and no one else can have this key; the signer cannot repudiate signing the data in future.