SlideShare una empresa de Scribd logo
1 de 27
Descargar para leer sin conexión
Instructor: Mr. E. Anwar Reddick




Internet and computer communications
technologies are inherently insecure
Without security, anyone with access to the
communications infrastructure can READ AND
MODIFY the messages your computer sends
out


Security techniques make use of a process
called encryption
◦ “en” means to make
◦ “crypt” means secret or hidden



Cryptography – use of secret writing (use of
encryption)
◦ “graphy” means writing or some form or
representation




Cryptology – study of secret writing
Cryptanalysis – “breaking” secret writing aka
uncovering the secret
Encryption is the process of taking a “cleartext” message and making it
uncomprehensible
 Example:
Transforming the clear-text message such as
“Hello World” into some cipher-text such as
“n3$1#ved9”





Secure Sockets Layer (SSL)
Transport Layer Security (TLS)
Internet Protocol Security (IPsec)
◦ Used by Virtual Private Networks (VPNs)





Wired Equivalent Privacy (WEP)
WiFi Protected Access (WPA)








An encryption algorithm is like a treasure
chest
Put your secret in a chest and lock it with a
key
Whoever has the right key can reveal the
secret
Revealing the secret (opening the chest) with
a key is called decryption


Modern encryption (and decryption) algorithms
are based on mathematical operations
◦ Messages and keys are converted to numbers
◦ Remember computers operate on binary!



Let:
◦ E -> encryption algorithm, D -> decryption algorithm
◦ M -> clear-text message, C -> cipher-text
◦ K -> key




E(M, K) = C
D(C, K) = M





The math is extremely complex
If a hacker obtained C, but did not have K,
the hacker “should” not be able to use D to
produce M in a reasonable amount of time
with a reasonably powerful computer
Reasonably powerful computer?
◦ Think the most powerful supercomputer times 2



Reasonable amount of time?
◦ Think thousands of years!




Cryptography is only good until someone figures
out how to take C and D and produce M without
knowing K in a short amount of time
At that point, it’s time for a new algorithm!
◦ Think about how WEP was found to be insecure and led
to the development of WPA
◦ DES was found to be insecure and led to the
development of Triple-DES and AES



Really, really, really smart people (good-natured
and bad) called cryptographers work tirelessly
trying to break cryptographic algorithms


Symmetric Cryptography
◦ The key that is used for encryption is also used for
decryption



Asymmetric Cryptography
◦ One key is used for encryption and a different key
is used for decryption




If Leia wants to send a secret message “death
star location” to Luke…
They first need to have a copy of the same
key – called a secret key
◦ Remember they must keep the key secret!

Secret Key 1


Then Leia must find a chest made to use the
key
◦ I.e., Leia must find a suitable symmetric encryption
algorithm




Then Leia can put the message into the chest,
lock it, and have it sent to Luke
I.e., Leia can encrypt the message and send it
across the insecure Internet to Luke (via Email, WWW, etc)




Luke has the secret key, so he can retrieve
the message and do his job
I.e., Luke uses the secret key to decrypt the
message






Since only Luke and Leia have the secret key,
only they can open the chest
If the message gets intercepted in transit
(which happens on the Internet), the message
remains uncomprehensible
If the message gets destroyed in transit, Leia
can just try again







Luke and Leia must agree on a key to use
before they can communicate secretly
This is not always feasible
Asymmetric Cryptography addresses this
problem
Symmetric Cryptography is nevertheless still
important for computer security


Leia and Luke, separately, create two keys, called
a key-pair
◦ Leia has her pair, and Luke has his own, different pair





One of Leia’s keys is called her private key and
the other is called her public key
Let Kpre denote Leia’s private key
◦ Kpbe deontes Leia’s public key



E(M1, Kpre) = C’
◦ D(C’, Kpbe) = M1



E(M1, Kpbe) = C”
◦ D(C”, Kpre) = M1








Did you catch that? Go back and double
check.
If a message is encrypted (with an asymmetric
algorithm) with a private key, then the
resulting cipher text can be decrypted only
with the corresponding public key
If a message is encrypted with a public key,
then the cipher text can be decrypted only
with the corresponding private key
There’s complex math to make this work




RSA is a set of asymmetric algorithms created by
Ron Rivest, Adi Shamir, and Leonard Adleman
They figured out how to make the math work in
1977
◦ Following research done by Whitfield Diffie, Martin
Hellman, and Ralph Merkle






No one has been able to break it yet 
Web (SSL, TLS), and e-mail encryption is based
on RSA
Translation: pretty much your entire digital life is
protected by RSA
◦ Online banking, E-commerce
◦ Online access to school, health, personal records, etc



Why the names “private” and “public” keys?
You keep your private key private
◦ Only you should have access to your private key!



Anyone can know your public key and the
cryptography still works just fine
◦ It’s okay even for bad guys to know your public key


Leia has her key-pair, and Luke has his own

public
Kpbe

Kpbu

private
Kpre


Kpru

Assume there are magical treasure chests that
work with key-pairs
◦

Complex math can often seem like magic








Leia wants to send the message “death star
location” to Luke in a way that only Luke can
read the message
Leia has a magic asymmetric chest (aka
asymmetric algorithm)
Which key should Leia use to encrypt the
message?
The answer is on next slide


Luke’s public key!
◦ Remember it’s okay for everyone to have your
public key, even the bad guys
◦ Here, we’re assuming that Leia can reliably access
Luke’s public key



Why Luke’s public key?
◦ Only Luke’s private key can be used to decrypt the
message
 And only Luke should have Luke’s private key




Leia puts the message in a chest, locks it with
Luke’s public key, and has it sent to Luke
No one, besides Luke, can open the chest
◦ Not Vader, not even Leia

Kpbu




Luke uses his private key that he keeps
private to open the chest, see the message,
and can do his job
I.e., Luke decrypts the message with his
private key

Kpru











What if Vader alters Leia’s chest (alters the cipher
text)?
What if Vader replaces Leia’s chest with his own
chest with a fake message that he locks with
Luke’s public key?
How does Leia get Luke’s public key?
What happens if Luke looses his private key?
What happens if Luke’s private key gets stolen?
Why is symmetric cryptography still used?
How do Leia and Luke agree on a symmetric key
if they’re not together?







After the 1st death star is destroyed, the Empire
builds another one at another location. With
symmetric cryptography, what if Vader captures
Leia’s new chest for the 2nd death star but
replaces it with a copy of Leia’s original chest
with the old location?
What if a chest (or encryption algorithm) is
defective?
This information is just the basics
Wikipedia is an excellent source of more
information

Más contenido relacionado

La actualidad más candente

Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSSURBHI SAROHA
 
Cryptography chap#6.pptx
Cryptography chap#6.pptxCryptography chap#6.pptx
Cryptography chap#6.pptxHamnaMalik31
 
Cryptography
CryptographyCryptography
CryptographyPPT4U
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1Alfred Ouyang
 
Hybrid Cryptography with examples in Ruby and Go
Hybrid Cryptography with examples in Ruby and GoHybrid Cryptography with examples in Ruby and Go
Hybrid Cryptography with examples in Ruby and GoEleanor McHugh
 
Cryptography by gaurav singh
Cryptography by gaurav singhCryptography by gaurav singh
Cryptography by gaurav singhGaurav Singh
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Anas Rock
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communicationMohd Arif
 

La actualidad más candente (20)

Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography basices
Cryptography basicesCryptography basices
Cryptography basices
 
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
 
Criptography
CriptographyCriptography
Criptography
 
Cryptography chap#6.pptx
Cryptography chap#6.pptxCryptography chap#6.pptx
Cryptography chap#6.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Is case study
Is   case studyIs   case study
Is case study
 
Cryptography
CryptographyCryptography
Cryptography
 
Hybrid Cryptography with examples in Ruby and Go
Hybrid Cryptography with examples in Ruby and GoHybrid Cryptography with examples in Ruby and Go
Hybrid Cryptography with examples in Ruby and Go
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography by gaurav singh
Cryptography by gaurav singhCryptography by gaurav singh
Cryptography by gaurav singh
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
 

Similar a Basic Cryptography Overview

Network Security
Network SecurityNetwork Security
Network Securityhj43us
 
amer-network-sihubconferances-security.ppt
amer-network-sihubconferances-security.pptamer-network-sihubconferances-security.ppt
amer-network-sihubconferances-security.pptnavidkamrava
 
Cryptography Intro - NCL
Cryptography Intro - NCLCryptography Intro - NCL
Cryptography Intro - NCLjrice8
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxImXaib
 
E-mail and Encryption
E-mail and EncryptionE-mail and Encryption
E-mail and Encryptionhey4ndr3w
 
Cryptography intro
Cryptography introCryptography intro
Cryptography introismaelhaider
 
Cryptography for developers
Cryptography for developersCryptography for developers
Cryptography for developersKai Koenig
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Petar Radanliev
 
Dark Side of the Net Lecture 2 Cryptography
Dark Side of the Net Lecture 2 CryptographyDark Side of the Net Lecture 2 Cryptography
Dark Side of the Net Lecture 2 CryptographyMarcus Leaning
 
Network security notes
Network security notesNetwork security notes
Network security notesnetlabacademy
 

Similar a Basic Cryptography Overview (20)

b
bb
b
 
Crypt
CryptCrypt
Crypt
 
Network Security
Network SecurityNetwork Security
Network Security
 
MAT255_Final_Paper_RSA_Encryption
MAT255_Final_Paper_RSA_EncryptionMAT255_Final_Paper_RSA_Encryption
MAT255_Final_Paper_RSA_Encryption
 
amer-network-sihubconferances-security.ppt
amer-network-sihubconferances-security.pptamer-network-sihubconferances-security.ppt
amer-network-sihubconferances-security.ppt
 
What is Encryption
What is EncryptionWhat is Encryption
What is Encryption
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
 
Cryptography Intro - NCL
Cryptography Intro - NCLCryptography Intro - NCL
Cryptography Intro - NCL
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
 
E-mail and Encryption
E-mail and EncryptionE-mail and Encryption
E-mail and Encryption
 
Cryptography intro
Cryptography introCryptography intro
Cryptography intro
 
Cryptography for developers
Cryptography for developersCryptography for developers
Cryptography for developers
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
 
Encryption
EncryptionEncryption
Encryption
 
Dark Side of the Net Lecture 2 Cryptography
Dark Side of the Net Lecture 2 CryptographyDark Side of the Net Lecture 2 Cryptography
Dark Side of the Net Lecture 2 Cryptography
 
Network security notes
Network security notesNetwork security notes
Network security notes
 
Cryptography
CryptographyCryptography
Cryptography
 
1111111111.pptx
1111111111.pptx1111111111.pptx
1111111111.pptx
 
Crypt
CryptCrypt
Crypt
 
Security.ppt
Security.pptSecurity.ppt
Security.ppt
 

Último

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Basic Cryptography Overview

  • 1. Instructor: Mr. E. Anwar Reddick
  • 2.   Internet and computer communications technologies are inherently insecure Without security, anyone with access to the communications infrastructure can READ AND MODIFY the messages your computer sends out
  • 3.  Security techniques make use of a process called encryption ◦ “en” means to make ◦ “crypt” means secret or hidden  Cryptography – use of secret writing (use of encryption) ◦ “graphy” means writing or some form or representation   Cryptology – study of secret writing Cryptanalysis – “breaking” secret writing aka uncovering the secret
  • 4. Encryption is the process of taking a “cleartext” message and making it uncomprehensible  Example: Transforming the clear-text message such as “Hello World” into some cipher-text such as “n3$1#ved9” 
  • 5.    Secure Sockets Layer (SSL) Transport Layer Security (TLS) Internet Protocol Security (IPsec) ◦ Used by Virtual Private Networks (VPNs)   Wired Equivalent Privacy (WEP) WiFi Protected Access (WPA)
  • 6.     An encryption algorithm is like a treasure chest Put your secret in a chest and lock it with a key Whoever has the right key can reveal the secret Revealing the secret (opening the chest) with a key is called decryption
  • 7.  Modern encryption (and decryption) algorithms are based on mathematical operations ◦ Messages and keys are converted to numbers ◦ Remember computers operate on binary!  Let: ◦ E -> encryption algorithm, D -> decryption algorithm ◦ M -> clear-text message, C -> cipher-text ◦ K -> key   E(M, K) = C D(C, K) = M
  • 8.    The math is extremely complex If a hacker obtained C, but did not have K, the hacker “should” not be able to use D to produce M in a reasonable amount of time with a reasonably powerful computer Reasonably powerful computer? ◦ Think the most powerful supercomputer times 2  Reasonable amount of time? ◦ Think thousands of years!
  • 9.   Cryptography is only good until someone figures out how to take C and D and produce M without knowing K in a short amount of time At that point, it’s time for a new algorithm! ◦ Think about how WEP was found to be insecure and led to the development of WPA ◦ DES was found to be insecure and led to the development of Triple-DES and AES  Really, really, really smart people (good-natured and bad) called cryptographers work tirelessly trying to break cryptographic algorithms
  • 10.  Symmetric Cryptography ◦ The key that is used for encryption is also used for decryption  Asymmetric Cryptography ◦ One key is used for encryption and a different key is used for decryption
  • 11.   If Leia wants to send a secret message “death star location” to Luke… They first need to have a copy of the same key – called a secret key ◦ Remember they must keep the key secret! Secret Key 1
  • 12.  Then Leia must find a chest made to use the key ◦ I.e., Leia must find a suitable symmetric encryption algorithm
  • 13.   Then Leia can put the message into the chest, lock it, and have it sent to Luke I.e., Leia can encrypt the message and send it across the insecure Internet to Luke (via Email, WWW, etc)
  • 14.   Luke has the secret key, so he can retrieve the message and do his job I.e., Luke uses the secret key to decrypt the message
  • 15.    Since only Luke and Leia have the secret key, only they can open the chest If the message gets intercepted in transit (which happens on the Internet), the message remains uncomprehensible If the message gets destroyed in transit, Leia can just try again
  • 16.     Luke and Leia must agree on a key to use before they can communicate secretly This is not always feasible Asymmetric Cryptography addresses this problem Symmetric Cryptography is nevertheless still important for computer security
  • 17.  Leia and Luke, separately, create two keys, called a key-pair ◦ Leia has her pair, and Luke has his own, different pair   One of Leia’s keys is called her private key and the other is called her public key Let Kpre denote Leia’s private key ◦ Kpbe deontes Leia’s public key  E(M1, Kpre) = C’ ◦ D(C’, Kpbe) = M1  E(M1, Kpbe) = C” ◦ D(C”, Kpre) = M1
  • 18.     Did you catch that? Go back and double check. If a message is encrypted (with an asymmetric algorithm) with a private key, then the resulting cipher text can be decrypted only with the corresponding public key If a message is encrypted with a public key, then the cipher text can be decrypted only with the corresponding private key There’s complex math to make this work
  • 19.   RSA is a set of asymmetric algorithms created by Ron Rivest, Adi Shamir, and Leonard Adleman They figured out how to make the math work in 1977 ◦ Following research done by Whitfield Diffie, Martin Hellman, and Ralph Merkle    No one has been able to break it yet  Web (SSL, TLS), and e-mail encryption is based on RSA Translation: pretty much your entire digital life is protected by RSA ◦ Online banking, E-commerce ◦ Online access to school, health, personal records, etc
  • 20.   Why the names “private” and “public” keys? You keep your private key private ◦ Only you should have access to your private key!  Anyone can know your public key and the cryptography still works just fine ◦ It’s okay even for bad guys to know your public key
  • 21.  Leia has her key-pair, and Luke has his own public Kpbe Kpbu private Kpre  Kpru Assume there are magical treasure chests that work with key-pairs ◦ Complex math can often seem like magic
  • 22.     Leia wants to send the message “death star location” to Luke in a way that only Luke can read the message Leia has a magic asymmetric chest (aka asymmetric algorithm) Which key should Leia use to encrypt the message? The answer is on next slide
  • 23.  Luke’s public key! ◦ Remember it’s okay for everyone to have your public key, even the bad guys ◦ Here, we’re assuming that Leia can reliably access Luke’s public key  Why Luke’s public key? ◦ Only Luke’s private key can be used to decrypt the message  And only Luke should have Luke’s private key
  • 24.   Leia puts the message in a chest, locks it with Luke’s public key, and has it sent to Luke No one, besides Luke, can open the chest ◦ Not Vader, not even Leia Kpbu
  • 25.   Luke uses his private key that he keeps private to open the chest, see the message, and can do his job I.e., Luke decrypts the message with his private key Kpru
  • 26.        What if Vader alters Leia’s chest (alters the cipher text)? What if Vader replaces Leia’s chest with his own chest with a fake message that he locks with Luke’s public key? How does Leia get Luke’s public key? What happens if Luke looses his private key? What happens if Luke’s private key gets stolen? Why is symmetric cryptography still used? How do Leia and Luke agree on a symmetric key if they’re not together?
  • 27.     After the 1st death star is destroyed, the Empire builds another one at another location. With symmetric cryptography, what if Vader captures Leia’s new chest for the 2nd death star but replaces it with a copy of Leia’s original chest with the old location? What if a chest (or encryption algorithm) is defective? This information is just the basics Wikipedia is an excellent source of more information