security systems for digital data
DESCRIPTION
This was one presentation I held last year during my exchange semester at the University of Nebraska at Omaha.TRANSCRIPT
![Page 1: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/1.jpg)
Security Systems for Digital DataSecurity Systems for Digital DataBig Brother is watching YOUBig Brother is watching YOU
Bernhard Hofer 03/10/2008CIST 3100 - Organizations, Applications & Technology
![Page 2: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/2.jpg)
Page 2
Table of contentsTable of contents
1. History and Terminology
2. Cryptography nowadays and
Encrypting Digital Data
3. Big Brother www
4. The Future (quantum cryptography)
5. Question time
![Page 3: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/3.jpg)
Page 3
Beginning of cryptographyBeginning of cryptography
• Egypt‘s Old Kingdom (4500+ years ago)
non-standard hieroglyphs
• The Greeks of Classical times
The SCYTALE, used by Spartan military
enlarge image
![Page 4: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/4.jpg)
Page 4Page 4
H E
L
P
M
E I
A
M
… wood cylinder
strip of paper
![Page 5: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/5.jpg)
Page 5
Terminology (I)Terminology (I)
c r y p t o g r a p h ykryptós, „hidden“ graphéin, „to write“
„secret writing“
![Page 6: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/6.jpg)
Page 6
Terminology (II)Terminology (II)
Hello, this is my first english pres at UNO
… plaintext (ordinary information)
encryption (converting plaintext)
decryption (reverse process)
H?$% /&!!““= )(/&%ded die=?30((&% ?$$?)
… ciphertext (unreadable plaintext)
cip
her
key +
![Page 7: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/7.jpg)
Page 7
Table of contentsTable of contents
1. History and Terminology
2. Cryptography nowadays and
Encrypting Digital Data
3. Big Brother www
4. The Future (quantum cryptography)
5. Question time
![Page 8: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/8.jpg)
Page 8
Cryptography nowadays (I)Cryptography nowadays (I)
“Cryptography is about communication in the presence of adversaries.”
Ronald Rivest, "Cryptography" From the Handbook of Theoretical Computer Science, edited by J. van Leeuwen, Elsevier Science Publishers B.V., 1990
![Page 9: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/9.jpg)
Page 9
Symmetric key system (private key)
… sender and receiver share the same key (for encryption and decryption)
… like the wind (very fast)
… 2 different kinds (block and stream ciphers)
… Examples: D(A)ES, RC4, MD5, hash
Cryptography nowadays (II)Cryptography nowadays (II)
![Page 10: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/10.jpg)
Page 10
Asymmetric key system (public key)
… founded 1976 by Diffie and Hellman
… 2 keys (same lenght): 1 public and 1 private
… both are different but related
… slower than symmetric key methods
Cryptography nowadays (III)Cryptography nowadays (III)
![Page 11: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/11.jpg)
Page 11
Key Serverin a so called Trust Center
Player 1 Player 2
… wants to deliver a SECURE message
public key
encrypting …
private key
… delivering message
decrypting …
!! Authentication Problem !!
Player 2 doesn‘t know,who sent the message!?!
Everybody knows the public key from Player 2!
Cryptography nowadays (IV)Cryptography nowadays (IV)
![Page 12: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/12.jpg)
Page 12
Key Serverin a so called Trust Center
Player 1 Player 2
… wants to deliver a SECURE message
public key
encrypting …
private key
… delivering message
decrypting …
!! Confidentiality Problem !!
Player 2 knows,who sent the message!
But: Everybody could decrypt the message from Player 1!
continue pres.
Cryptography nowadays (VI)Cryptography nowadays (VI)
![Page 13: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/13.jpg)
Page 13
Asymmetric key system (public key)
… full security, if process repeated twice
… operational area: Combination of the symmetric and asymmectric
… Examples: RSA, DSA, SSL, SSL2, …
Cryptography nowadays (VIII)Cryptography nowadays (VIII)
![Page 14: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/14.jpg)
Page 14
Table of contentsTable of contents
1. History and Terminology
2. Cryptography nowadays and
Encrypting Digital Data
3. Big Brother www
4. The Future (quantum cryptography)
5. Question time
![Page 15: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/15.jpg)
Page 15
The internet
… local structure
… none secure, open information system
… private, public and economic player
… cryptography is the only way for privacy protection over the world wide web!
Big Brother www (I)Big Brother www (I)
![Page 16: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/16.jpg)
Page 16
Requirements for secure interaction
… availability
… authentification
… confidentiality
… integrity
… commitment
Big Brother www (II)Big Brother www (II)
![Page 17: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/17.jpg)
Page 17
Useful applications
… PGP (Pretty Good Privacy)RSA, IDEA founded 1991 by Phil Zimmermann
… confidential certificates digital signature for online banking
… SSL (Secure Socket Layer … https://) founded by Netscape, cryptography for web pages
Big Brother www (III)Big Brother www (III)
![Page 18: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/18.jpg)
Page 18
The one and only security hole is
Nothing and/ore nobody could save you against Brute Force Attacks ;-)
!! YOUR PASSWORD !!
Big Brother www (IV)Big Brother www (IV)
![Page 19: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/19.jpg)
Page 19
cost increases per power(10.000 $, 100.000 $, 1.000.000 $, …)
Key length in Bit
Codebreaking timetableCodebreaking timetable
![Page 20: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/20.jpg)
Page 20
Table of contentsTable of contents
1. History and Terminology
2. Cryptography nowadays and
Encrypting Digital Data
3. Big Brother www
4. The Future (quantum cryptography)
5. Question time
![Page 21: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/21.jpg)
Page 21
In princible …
… it is a old school symmetric encryption
… nothing else as a key distributer
… it isn‘t based on mathematical
… but on the physics of information
Quantum cryptography (I)Quantum cryptography (I)
![Page 22: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/22.jpg)
Page 22
In action …
… first implemented between the BA CA and the Vienna City-Hall over a 1.500m FDDA (fibre optics) cabel in April 2004
by Anton Zeilinger …
Quantum cryptography (II)Quantum cryptography (II)
![Page 23: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/23.jpg)
Page 23
Table of contentsTable of contents
1. History and Terminology
2. Cryptography nowadays and
Encrypting Digital Data
3. Big Brother www
4. The Future (quantum cryptography)
5. Question time
![Page 24: Security Systems for Digital Data](https://reader036.vdocuments.us/reader036/viewer/2022062614/54650945af7959167a8b65a7/html5/thumbnails/24.jpg)
Page 24
… for your attention!!
Bernhard Hofer
CIST 3100 - Organizations, Applications & Technology
Thank you...Thank you...