network encryption vince ceccarelli group 7 tc 200

17
Network Encryption Vince Ceccarelli Group 7 TC 200

Upload: tracy-may

Post on 01-Jan-2016

228 views

Category:

Documents


6 download

TRANSCRIPT

Page 1: Network Encryption Vince Ceccarelli Group 7 TC 200

Network Encryption

Vince Ceccarelli

Group 7

TC 200

Page 2: Network Encryption Vince Ceccarelli Group 7 TC 200

What is Encryption?

• Encryption – a process that hides the content of a message in such a way that it can be revealed through a decryption process

• Encryption and decryption are processes of Cryptography

• Cryptography - study of techniques using secret writing as codes or ciphers

Page 3: Network Encryption Vince Ceccarelli Group 7 TC 200

How is it done?

• The cryptography process uses encryption/decryption algorithms

• The algorithms use a key - a long sequence of bits (1s, 0s)

• The key is used to alter the original message mathematically to create a new encrypted/decrypted message

Page 4: Network Encryption Vince Ceccarelli Group 7 TC 200

Keys

• The keys provide the necessary means of protection

• They must be kept secret or anyone with knowledge of them would be able to crack the decryption process with the right algorithm

• In some cases two keys are used, one for encryption and one for decryption

• This can make the encryption key public and the decryption key private

Page 5: Network Encryption Vince Ceccarelli Group 7 TC 200
Page 6: Network Encryption Vince Ceccarelli Group 7 TC 200
Page 7: Network Encryption Vince Ceccarelli Group 7 TC 200
Page 8: Network Encryption Vince Ceccarelli Group 7 TC 200

Keys and Bits

• Keys are determined by the amount of bits they have (amount of numbers)

• All the possibilities of a 2-bit key:

00,01,10,11

• A 3-bit key has 8 possible values

• Possible values formula – 2^n (n being the number of bits)– 40-bit key has 1.099511628E12(2^40)

Page 9: Network Encryption Vince Ceccarelli Group 7 TC 200

Types of Encryption Algorithms

• RSA

• DES/3DES

• BLOWFISH

• IDEA

• SEAL

• RC4

Page 10: Network Encryption Vince Ceccarelli Group 7 TC 200

RSA

• Created in 1977 by Ron Rivest, Adi Shamir, and Len Adleman

• Uses public and private key

• Starts with 2 large prime numbers

• Goes through long math process

• Results in a public and private key

Page 11: Network Encryption Vince Ceccarelli Group 7 TC 200

DES/3DES

• Data Encryption Standard• Developed by U.S. Government in 1977• Uses a 56-bit key• Used in ATMs • 3DES is the same thing except it encrypts

the data 3 times and uses a different key for at least one of the passes

• This creates a cumulative key size of 112-168 bits

Page 12: Network Encryption Vince Ceccarelli Group 7 TC 200
Page 13: Network Encryption Vince Ceccarelli Group 7 TC 200

BLOWFISH

• Designed by Bruce Schneider in 1993

• Uses keys from 32 to 448 bits

• It was a fast, free alternative to encryption algorithms when it came out

Page 14: Network Encryption Vince Ceccarelli Group 7 TC 200

IDEA

• Developed by Dr. X. Lai and Prof. J. Massey in Switzerland in early 1900s

• Replaced the DES standard

• Uses a 128 bit key

• Said to be impossible to break by checking every key

• No other means of attack is known

Page 15: Network Encryption Vince Ceccarelli Group 7 TC 200

SEAL

• Software-optimized Encryption Algorithm

• Designed by Rogaway and Coppersmith in 1993

• Uses a 160 bit key

• Is a Stream-Cipher – data is encrypted continuously as opposed to Block Ciphers (DES, BLOWFISH, and IDEA)

Page 16: Network Encryption Vince Ceccarelli Group 7 TC 200

RC4

• Invented by Ron Rivest, Co-Producer of RSA

• Used in Lotus Notes and Netscape

• Uses up to a 2048-bit key

• Useful in situations in which a new key can be used for each message

Page 17: Network Encryption Vince Ceccarelli Group 7 TC 200

SOURCES

• http://compnetworking.about.com/od/networksecurityprivacy/l/aa011303a.htm

• http://www.mycrypto.net/encryption/crypto_algorithms.html• http://www.cohn-family.com/images/cert-rsa-encryption.jpg• http://gnrt.terena.org/gfx/book/ProtectingUsers/public-key-

encryption_smaller.gif• http://gnrt.terena.org/gfx/book/ProtectingUsers/single-key-

encryption_smaller.gif• http://www.skilldrive.com/book/DOTNET%20in

%20Samples_soubory/image042.gif