Cryptography&Security

21
Guided by VIBJAN KOLAPATI Mrs. SHEENA MATHEW CS-B,ROLL NO:97

description

presented by Vibjan kolapati, SOE, CUSAT

Transcript of Cryptography&Security

Page 1: Cryptography&Security

Guided by VIBJAN KOLAPATI Mrs. SHEENA MATHEW CS-B,ROLL NO:97

Page 2: Cryptography&Security

INTRODUCTION SECURITY APPLICATIONS CHALLENGES CONCLUSION REFERENCES

Page 3: Cryptography&Security

Cryptography is Art & Science of preparing coded or protected

Communication intelligible only to the authorized person.

Cryptography jargon: ciphertext, plaintext, keys,symmetric

&asymmetric algorithms.History : from World War-ICryptology Cryptanalysis

Page 4: Cryptography&Security

Cryptography: Codes and Code books Ciphers

Cryptanalysis: Art of analyzing ciphertext to extract the

plaintext or the key.Steganography:

Page 5: Cryptography&Security
Page 6: Cryptography&Security

SECURITY REQUIREMENTS: Confidentiality Integrity AuthenticationSECURITY THREATS: Information disclosure Integrity violation Generic threat : trojan horses Authentication threats

Page 7: Cryptography&Security

SECURITY MECHANISMS:

Encryption: The method of disguising

plaintext in such a way as to hide its substance is called encryption.

Decryption:

The process of reverting ciphertext to its original plaintext is called decryption.

Page 8: Cryptography&Security

Digital Signatures:

Digital signatures enable the recipient of information to verify the authenticity of the information’s origin, and also verify that the information is intact. Thus, public key digital signatures provide authentication and data integrity.

Hash Algorithms: A one-way hash function takes

variable-length input, in this case, a message of any length, even thousands or millions of bits—and produces a fixed-length output; say, 160-bits. The hash function ensures that, if the information is changed in any way—even by just one bit—an entirely different output value is produced.

Page 9: Cryptography&Security

I. Protecting ATM transactions

II. Smart Card

III. Cryptography Application Block

IV. Watermarking

Page 10: Cryptography&Security

Advantages of ATM : >Easy to access >would not require human intervention >economical

Customer authentication: > customer’s signature

> customer’s voiceprint > customer’s fingerprint > a password assigned to the customer

Page 11: Cryptography&Security

Q2=f(Q1); Q2=f(Q1)=1,000,000,000 – Q1 Q2(Janu)=1,000,000,000 –

17,894,567 =999,982,105,433

User_ID PAN PIN

Janu 17894567 8974Sonu 76654321 7860

Page 12: Cryptography&Security

The solution – encipherment!

Q2= EK{Q1}. If the cryptographic algorithm EK{ --- } is sufficiently strong, then knowledge of

the pair (Q1,Q2) or even a large number of pairs ({Q1(i), Q2(i)):1< i < N} might not permit a customer easily to deduce the secret key K.

A solution to permit the user to select a U-PIN((User_ID)).

The PIN(User_ID), PINOffset(User_ID), and U-PIN(User_ID) in

the IBM 3624 system are related by

U - PIN(User ID)= Left16[EK{PAN(User ID)}]+ PINOffset(User ID).

Standard Decimalization Table:

0 1 2 3 4 5 6 7 8 9 A B C D E F

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

Page 13: Cryptography&Security

Smart card is pocket-sized card with embedded integrated circuits which can process data.

The smart card will provide proof of identity when a user is communicating with a remote server. Secure transactions involving a smart card will require cryptography.

If the identification process is based on public-key cryptography, then

. The key will need to be stored in the EEPROM, . The smart card will need to read-protect the key, and . The owner of the card will need to use a PIN to prove identity to

the card.

Page 14: Cryptography&Security
Page 15: Cryptography&Security

A secure cryptoprocessor is a dedicated computer or microprocessor for carrying out cryptograpic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance.

Cryptoprocessors input program instructions in encrypted form, decrypt the instructions to plain instructions which are then executed within the same cryptoprocessor chip where the decrypted instructions are inaccessibly stored. By never revealing the decrypted program instructions, the cryptoprocessor prevents tampering of programs by technicians who may have legitimate access to the sub-system data bus.

Page 16: Cryptography&Security

Cryptography Application Block simplifies how developers incorporate cryptographic functionality in their applications. Applications can use the application block for a variety of tasks, such as encrypting information, creating a hash from data, and comparing hash values to verify that data has not been altered.

The Cryptography Application Block was designed to achieve the following goals:

Encapsulate the logic that is used to perform the most common application cryptography tasks.

Present a standard consistent model for common cryptography tasks.

Make sure minimal or negligible performance impact compared to manually written cryptography code that accomplishes the same functionality.

Provide a key protection model that can be customized to satisfy your organization's security requirements.

Page 17: Cryptography&Security
Page 18: Cryptography&Security

Watermarking is a method in computer security by which identifiers of sources or copyright owners of digital or analog signals are embedded into the respective signals themselves in order to keep track of where a signal comes from or who the copyright owners are.

The characteristic security requirements on digital watermarking schemes, also called electronic copyright marking schemes (ECMS), are as follows:

>unobstrusiveness: Watermarks should not degrade the quality of the cover-signal.

>robustness:Watermarks should be embedded into the content, in such a way that any signal transform of reasonable strength cannot remove the watermark.

Page 19: Cryptography&Security

Plays role in business economics, e-commerce,banking

etc.,Plays role in web security SSL protocolPlays role in military agencies National Security Agency(NSA).Plays role in System Security Unix passwords, SIM cards etc.,

Page 20: Cryptography&Security

In the future, as telephone networks become digital, even the actual conversations may be recorded and stored. All of this amounts to a great potential loss of privacy. Cryptography is one tool that will be able to ensure more privacy. The ability to encrypt data, communications, and other information gives individuals the power to restore personal

privacy.

Cryptography is important for more than just privacy, however. Cryptography protects the world’s banking systems as well. Many banks and other financial institutions conduct their business over open networks, such as the Internet.

Page 21: Cryptography&Security

1.Microsoft Encarta Encyclopedia 2.Cryptography Encyclopedia 3.Cryptography and Data security by Dorothy

Elizabeth,Amazon.com 4.Computer-security and Cryptography by Alan konheim,ACM

portal. 5.Cryptography & Data security by Denning,Amazon.com 6. Bloom, Jefrey A., Ingemar J. Cox, Ton Kalker, Jean-Paul M.G.

Linnartz, Matthew L. Miller, C., andBrendan S. Traw (1999). “Copy protection for DVDvideo.” Proceedings of the IEEE,87 (7), 1267–1276.

7.Applied Cryptography and Data security by Prof. Christof Paar 8.www.msdn.microsft.com