an overview of cryptography ying wang-suorsa helsinki university of technology

12
An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology

Upload: russell-marsh

Post on 12-Jan-2016

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology

An Overview of Cryptography

Ying Wang-SuorsaHelsinki University of Technology

Page 2: An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology

Objectives

To provide you with an introduction to cryptology Some terms and concepts behind basic

cryptographic methods Some basic cryptographic algorithms Trust models

Page 3: An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology

Cryptography : the art of providing securecommunication over insecure channels.Encode text and provide a method for decodingNot hide message!

Confidentiality : Ensuring that no one can readthe message except intended receiver.Authentication : The process of proving one'sidentity.Integrity : Ensuring the received messages has notbeen altered in any way from the original.Non-repudiation : A mechanism to prove that thesender really sent this message.

Page 4: An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology

Levels of CryptographicAction – In today's internet, most Syst. are split between application level and transport level.

7 – Application

6 – Presentation

5 – Session S-HTTP

4 – Transport SSL

3 – Network IPSEC

2 – Data Link PPTP

1 – Physical

Page 5: An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology

Importance of Cryptography

Military applications : command and controlDiplomatic applications : information gathering, spyEconomic applications : Information protectionBanking transactionAuthentication and signaturesModern e-commerce

How can the public use cryptography quickly and safely?

Page 6: An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology

Importance of Cryptography

Modern methods of communication are inherentlyinsecure

Internet is very insecure Ethernet networks liable to having sniffers Cable modems pass through other people's homes

Page 7: An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology

Pre-computerized Crypto schemes

Transposition Ciphers Reverse pairs of lettersHELLO WORLDEHLL OOWLRD Remover every second letter and put it at the endHELLO WORLDHLOWRDEL OL Reverse the lettersHELLO WORLDDLROW OLLEH Many trickers...

Page 8: An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology

Pre-computerized Crypto schemes

Substitution Ciphers

ABCDEFGHIJKLMNOPQRSTUVWXYZBADCFEHGJILKNMPORQTSVUXWZY

HELLO WORLD GFKKPXPQKC

Page 9: An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology

Types of Cryptographic Algorithms

Page 10: An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology

Why Three Encryption Techniques?

The answer lies in that each scheme is optimized for some specific applications

Page 11: An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology

Trust Models

PGP Web of Trust

Kerberos

Public Key Certificates and CertificateAuthorities

Page 12: An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology

Kerberos Architecture