network encryption vince ceccarelli group 7 tc 200

Post on 01-Jan-2016

228 Views

Category:

Documents

6 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Network Encryption

Vince Ceccarelli

Group 7

TC 200

What is Encryption?

• Encryption – a process that hides the content of a message in such a way that it can be revealed through a decryption process

• Encryption and decryption are processes of Cryptography

• Cryptography - study of techniques using secret writing as codes or ciphers

How is it done?

• The cryptography process uses encryption/decryption algorithms

• The algorithms use a key - a long sequence of bits (1s, 0s)

• The key is used to alter the original message mathematically to create a new encrypted/decrypted message

Keys

• The keys provide the necessary means of protection

• They must be kept secret or anyone with knowledge of them would be able to crack the decryption process with the right algorithm

• In some cases two keys are used, one for encryption and one for decryption

• This can make the encryption key public and the decryption key private

Keys and Bits

• Keys are determined by the amount of bits they have (amount of numbers)

• All the possibilities of a 2-bit key:

00,01,10,11

• A 3-bit key has 8 possible values

• Possible values formula – 2^n (n being the number of bits)– 40-bit key has 1.099511628E12(2^40)

Types of Encryption Algorithms

• RSA

• DES/3DES

• BLOWFISH

• IDEA

• SEAL

• RC4

RSA

• Created in 1977 by Ron Rivest, Adi Shamir, and Len Adleman

• Uses public and private key

• Starts with 2 large prime numbers

• Goes through long math process

• Results in a public and private key

DES/3DES

• Data Encryption Standard• Developed by U.S. Government in 1977• Uses a 56-bit key• Used in ATMs • 3DES is the same thing except it encrypts

the data 3 times and uses a different key for at least one of the passes

• This creates a cumulative key size of 112-168 bits

BLOWFISH

• Designed by Bruce Schneider in 1993

• Uses keys from 32 to 448 bits

• It was a fast, free alternative to encryption algorithms when it came out

IDEA

• Developed by Dr. X. Lai and Prof. J. Massey in Switzerland in early 1900s

• Replaced the DES standard

• Uses a 128 bit key

• Said to be impossible to break by checking every key

• No other means of attack is known

SEAL

• Software-optimized Encryption Algorithm

• Designed by Rogaway and Coppersmith in 1993

• Uses a 160 bit key

• Is a Stream-Cipher – data is encrypted continuously as opposed to Block Ciphers (DES, BLOWFISH, and IDEA)

RC4

• Invented by Ron Rivest, Co-Producer of RSA

• Used in Lotus Notes and Netscape

• Uses up to a 2048-bit key

• Useful in situations in which a new key can be used for each message

SOURCES

• http://compnetworking.about.com/od/networksecurityprivacy/l/aa011303a.htm

• http://www.mycrypto.net/encryption/crypto_algorithms.html• http://www.cohn-family.com/images/cert-rsa-encryption.jpg• http://gnrt.terena.org/gfx/book/ProtectingUsers/public-key-

encryption_smaller.gif• http://gnrt.terena.org/gfx/book/ProtectingUsers/single-key-

encryption_smaller.gif• http://www.skilldrive.com/book/DOTNET%20in

%20Samples_soubory/image042.gif

top related