SlideShare una empresa de Scribd logo
1 de 13
Security and Encryption
What is Encryption?
• Information is often stored and transmitted in a
  file
• A plaintext file uses a common encoding
  format such as ASCII or Unicode to represent
  the characters of the file.
• Encryption is a translation of a file into a format
  that hides the content from selected parties; a
  secret code; ciphertext.
Uses of Encryption
• Privacy/Secrecy       •  Confidentiality
• – email messages
                        • – personnel records
• – wireless phones
                        • – medical records
• Security
• – passwords           • – transaction
• – wireless networks     records
• Intellectual          • Authentication
  Property              • – digital signatures
• – copy protection     • – login
What Is Cryptography?
• Cryptography -- from the Greek for “secret
  writing” -- is the mathematical “scrambling” of
  data so that only someone with the necessary
  key can “unscramble” it.
• Cryptography allows secure transmission of
  private information over insecure channels (for
  example packet-switched networks).
• Cryptography also allows secure storage of
  sensitive data on any computer.
Technology and Risk
• Technological advances created new risks
 ▫ electronic communication makes information
   more easily available to more parties
 ▫ long-term storage of sensitive data requires
   stronger encryption techniques
• Some technologies actually reduce risk
 ▫ fiber optic cable
 ▫ strong encryption
German Enigma Cipher Machine
•In 1918, Arthur Scherbius filed for a
patent for Enigma Cipher Machine
and offered it to the German Navy.
• In 1926, German navy begins using
Enigma Machine, lightly modified
from a commercial model.
•In 1930, German armed forces
introduced a
significantly modified military model.
Simple Cryptography
Two basic principles
•   Substitution
•   THIS IS A SECRET (key n=3)
•   WKLV LV D VHFUHW
•   Transposition
•    THIS IS A SECRET (key 4213)
•   IHSTSI S EAERTC
Caesar Cipher
Rotating Key Cipher
Goals of Cipher:
• Diffussion:
 ▫ 􀂉 Small change in plaintext, changes lots of
  ciphertext
 ▫ 􀂉 Statistical properties of plaintext hidden in
  ciphertext
• 􀂉 Confusion:
 ▫ 􀂉 Statistical relationship between key and
  ciphertext as complex as possible
 ▫ 􀂉 So, need to design functions that produce
  output that is diffuse and confused
General Principles
•   Longer keys make better ciphers
•    􀂉 Random keys make better ciphers
•    􀂉 Good ciphers produce “random” ciphertext
•    􀂉 Best keys are used once and thrown away
Public Key Cryptography
• Your turn…..
 ▫ What is it?
 ▫ How does it work?
 ▫ Include an analogy
 ▫ Any weaknesses?
 ▫ If you come across digital signatures, what are
   they?
 ▫ Use MS Word

Más contenido relacionado

La actualidad más candente

Network Appliances at Rhino Labs Inc.
Network Appliances at Rhino Labs Inc. Network Appliances at Rhino Labs Inc.
Network Appliances at Rhino Labs Inc. Shane Williams
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Worksray0510711s
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesMurali Krishna
 
Wireless Security, Firewall,Encryption
Wireless Security, Firewall,EncryptionWireless Security, Firewall,Encryption
Wireless Security, Firewall,EncryptionAshwin Harikumar
 
Models For Communication Security
Models For Communication SecurityModels For Communication Security
Models For Communication SecurityAkNirojan
 
Attack presentation
Attack presentationAttack presentation
Attack presentationFrikha Nour
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12s1190091
 
Library security systems
Library security systemsLibrary security systems
Library security systemsErnani Agulto
 
sw2 week13
sw2 week13sw2 week13
sw2 week13s1170113
 

La actualidad más candente (16)

Firewall
FirewallFirewall
Firewall
 
Ga13
Ga13Ga13
Ga13
 
Eng12
Eng12Eng12
Eng12
 
Week11
Week11Week11
Week11
 
Network Appliances at Rhino Labs Inc.
Network Appliances at Rhino Labs Inc. Network Appliances at Rhino Labs Inc.
Network Appliances at Rhino Labs Inc.
 
Cyber security
Cyber securityCyber security
Cyber security
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modules
 
Wireless Security, Firewall,Encryption
Wireless Security, Firewall,EncryptionWireless Security, Firewall,Encryption
Wireless Security, Firewall,Encryption
 
Models For Communication Security
Models For Communication SecurityModels For Communication Security
Models For Communication Security
 
Attack presentation
Attack presentationAttack presentation
Attack presentation
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
 
Library security systems
Library security systemsLibrary security systems
Library security systems
 
sw2 week13
sw2 week13sw2 week13
sw2 week13
 
Intro Micro Hardware
Intro Micro HardwareIntro Micro Hardware
Intro Micro Hardware
 

Destacado

Intro to functional_skills_and_learning_log
Intro to functional_skills_and_learning_logIntro to functional_skills_and_learning_log
Intro to functional_skills_and_learning_logRebecca Jones
 
Btec unit 1 the online world learning aim b
Btec unit 1  the online world learning aim bBtec unit 1  the online world learning aim b
Btec unit 1 the online world learning aim bRebecca Jones
 
04 access howtobuttons
04 access howtobuttons04 access howtobuttons
04 access howtobuttonsRebecca Jones
 
03 access howtofrmmaster
03 access howtofrmmaster03 access howtofrmmaster
03 access howtofrmmasterRebecca Jones
 
Software development lifecycle
Software development lifecycleSoftware development lifecycle
Software development lifecycleRebecca Jones
 
03 analysis of_requirementsspecification
03 analysis of_requirementsspecification03 analysis of_requirementsspecification
03 analysis of_requirementsspecificationRebecca Jones
 
Fractions decimals percentages multiple choice quiz
Fractions decimals percentages multiple choice quizFractions decimals percentages multiple choice quiz
Fractions decimals percentages multiple choice quizRebecca Jones
 
P2 functions and equations from a graph questions
P2  functions and equations from a graph questionsP2  functions and equations from a graph questions
P2 functions and equations from a graph questionsRebecca Jones
 

Destacado (11)

Codesof practice
Codesof practiceCodesof practice
Codesof practice
 
1.4 adaptations
1.4 adaptations1.4 adaptations
1.4 adaptations
 
Intro to functional_skills_and_learning_log
Intro to functional_skills_and_learning_logIntro to functional_skills_and_learning_log
Intro to functional_skills_and_learning_log
 
Btec unit 1 the online world learning aim b
Btec unit 1  the online world learning aim bBtec unit 1  the online world learning aim b
Btec unit 1 the online world learning aim b
 
04 access howtobuttons
04 access howtobuttons04 access howtobuttons
04 access howtobuttons
 
03 access howtofrmmaster
03 access howtofrmmaster03 access howtofrmmaster
03 access howtofrmmaster
 
Software development lifecycle
Software development lifecycleSoftware development lifecycle
Software development lifecycle
 
03 analysis of_requirementsspecification
03 analysis of_requirementsspecification03 analysis of_requirementsspecification
03 analysis of_requirementsspecification
 
Fractions decimals percentages multiple choice quiz
Fractions decimals percentages multiple choice quizFractions decimals percentages multiple choice quiz
Fractions decimals percentages multiple choice quiz
 
P2 functions and equations from a graph questions
P2  functions and equations from a graph questionsP2  functions and equations from a graph questions
P2 functions and equations from a graph questions
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 

Similar a Securityand encryption

digital signature for SMS security
digital signature for SMS securitydigital signature for SMS security
digital signature for SMS securityNilu Desai
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYAdityaShukla141
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesMona Rajput
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Petar Radanliev
 
Securing Text Messages Application Using MED
Securing Text Messages Application Using MEDSecuring Text Messages Application Using MED
Securing Text Messages Application Using MEDZatulNadia
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniquesMohitManna
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1Alfred Ouyang
 

Similar a Securityand encryption (20)

Info security & crypto
Info security & cryptoInfo security & crypto
Info security & crypto
 
Cryptography
CryptographyCryptography
Cryptography
 
digital signature for SMS security
digital signature for SMS securitydigital signature for SMS security
digital signature for SMS security
 
cryptography
cryptographycryptography
cryptography
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
Encryption
EncryptionEncryption
Encryption
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 
groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Crytography
CrytographyCrytography
Crytography
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
 
Securing Text Messages Application Using MED
Securing Text Messages Application Using MEDSecuring Text Messages Application Using MED
Securing Text Messages Application Using MED
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Security - ch3.pptx
Security - ch3.pptxSecurity - ch3.pptx
Security - ch3.pptx
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
 
Cryptography
CryptographyCryptography
Cryptography
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 

Más de Rebecca Jones

02 access howtobasicforms
02 access howtobasicforms02 access howtobasicforms
02 access howtobasicformsRebecca Jones
 
01 access howtointroduction
01 access howtointroduction01 access howtointroduction
01 access howtointroductionRebecca Jones
 
Pt induction slides 2014
Pt induction slides 2014Pt induction slides 2014
Pt induction slides 2014Rebecca Jones
 
Pt induction slides 2014
Pt induction slides 2014Pt induction slides 2014
Pt induction slides 2014Rebecca Jones
 
08 e commerce entities
08 e commerce entities08 e commerce entities
08 e commerce entitiesRebecca Jones
 
08 benefits of e-commerce
08 benefits of e-commerce08 benefits of e-commerce
08 benefits of e-commerceRebecca Jones
 
18 database features
18 database features18 database features
18 database featuresRebecca Jones
 
Employee management-security-controls
Employee management-security-controlsEmployee management-security-controls
Employee management-security-controlsRebecca Jones
 
Threats to system power point 1
Threats to system power point 1Threats to system power point 1
Threats to system power point 1Rebecca Jones
 
2.1 environmental science
2.1 environmental science2.1 environmental science
2.1 environmental scienceRebecca Jones
 
4.4 aerobic respiration
4.4 aerobic respiration4.4 aerobic respiration
4.4 aerobic respirationRebecca Jones
 

Más de Rebecca Jones (13)

02 access howtobasicforms
02 access howtobasicforms02 access howtobasicforms
02 access howtobasicforms
 
01 access howtointroduction
01 access howtointroduction01 access howtointroduction
01 access howtointroduction
 
Pt induction slides 2014
Pt induction slides 2014Pt induction slides 2014
Pt induction slides 2014
 
Pt induction slides 2014
Pt induction slides 2014Pt induction slides 2014
Pt induction slides 2014
 
08 e commerce entities
08 e commerce entities08 e commerce entities
08 e commerce entities
 
08 benefits of e-commerce
08 benefits of e-commerce08 benefits of e-commerce
08 benefits of e-commerce
 
18 database features
18 database features18 database features
18 database features
 
Employee management-security-controls
Employee management-security-controlsEmployee management-security-controls
Employee management-security-controls
 
Layers of control
Layers of controlLayers of control
Layers of control
 
Threats to system power point 1
Threats to system power point 1Threats to system power point 1
Threats to system power point 1
 
2.1 environmental science
2.1 environmental science2.1 environmental science
2.1 environmental science
 
4.4 aerobic respiration
4.4 aerobic respiration4.4 aerobic respiration
4.4 aerobic respiration
 
Unit 4 it proposal
Unit 4 it proposalUnit 4 it proposal
Unit 4 it proposal
 

Securityand encryption

  • 2. What is Encryption? • Information is often stored and transmitted in a file • A plaintext file uses a common encoding format such as ASCII or Unicode to represent the characters of the file. • Encryption is a translation of a file into a format that hides the content from selected parties; a secret code; ciphertext.
  • 3. Uses of Encryption • Privacy/Secrecy • Confidentiality • – email messages • – personnel records • – wireless phones • – medical records • Security • – passwords • – transaction • – wireless networks records • Intellectual • Authentication Property • – digital signatures • – copy protection • – login
  • 4. What Is Cryptography? • Cryptography -- from the Greek for “secret writing” -- is the mathematical “scrambling” of data so that only someone with the necessary key can “unscramble” it. • Cryptography allows secure transmission of private information over insecure channels (for example packet-switched networks). • Cryptography also allows secure storage of sensitive data on any computer.
  • 5. Technology and Risk • Technological advances created new risks ▫ electronic communication makes information more easily available to more parties ▫ long-term storage of sensitive data requires stronger encryption techniques • Some technologies actually reduce risk ▫ fiber optic cable ▫ strong encryption
  • 6. German Enigma Cipher Machine •In 1918, Arthur Scherbius filed for a patent for Enigma Cipher Machine and offered it to the German Navy. • In 1926, German navy begins using Enigma Machine, lightly modified from a commercial model. •In 1930, German armed forces introduced a significantly modified military model.
  • 8. Two basic principles • Substitution • THIS IS A SECRET (key n=3) • WKLV LV D VHFUHW • Transposition • THIS IS A SECRET (key 4213) • IHSTSI S EAERTC
  • 11. Goals of Cipher: • Diffussion: ▫ 􀂉 Small change in plaintext, changes lots of ciphertext ▫ 􀂉 Statistical properties of plaintext hidden in ciphertext • 􀂉 Confusion: ▫ 􀂉 Statistical relationship between key and ciphertext as complex as possible ▫ 􀂉 So, need to design functions that produce output that is diffuse and confused
  • 12. General Principles • Longer keys make better ciphers • 􀂉 Random keys make better ciphers • 􀂉 Good ciphers produce “random” ciphertext • 􀂉 Best keys are used once and thrown away
  • 13. Public Key Cryptography • Your turn….. ▫ What is it? ▫ How does it work? ▫ Include an analogy ▫ Any weaknesses? ▫ If you come across digital signatures, what are they? ▫ Use MS Word