System Security: Cryptography Technologies

15
System Security: Cryptography Technologies CPE 261403 - Operating Systems http://www.e-cpe.org/moodle

description

System Security: Cryptography Technologies. CPE 261403 - Operating Systems http://www.e-cpe.org/moodle. What does the fish mean?. Ichthys. User name / Password. Threat Ex: Wifi Packet Sniffers. Protection with Cryptography. Encryption and Decryption. Symmetric – Uses a shared key - PowerPoint PPT Presentation

Transcript of System Security: Cryptography Technologies

Page 1: System Security: Cryptography Technologies

System Security:Cryptography Technologies

CPE 261403 - Operating Systemshttp://www.e-cpe.org/moodle

Page 2: System Security: Cryptography Technologies

What does the fish mean?

Page 3: System Security: Cryptography Technologies

Ichthys

Page 4: System Security: Cryptography Technologies
Page 5: System Security: Cryptography Technologies

User name / Password

Page 6: System Security: Cryptography Technologies

Threat Ex: Wifi Packet Sniffers

Page 7: System Security: Cryptography Technologies

Protection with Cryptography

Page 8: System Security: Cryptography Technologies

Encryption and Decryption

Symmetric – Uses a shared key

Asymmetric – Added security with Public and Private keys

Page 9: System Security: Cryptography Technologies

Symmetric Encryption

I LOVE YOU

Simple example: Add a constant to the ASCII value

J MPWF ZPVKey = 1

Page 10: System Security: Cryptography Technologies

Some Examples Data Encryption Standard (DES)

56 bit key for every 64 bit value

Advanced Encryption Standard (AES) 256 bit key for every 128 bit value

RC4 As used in WEP (Wired Equivalent Privacy)

WPA, WPA2 (Wi-Fi Protected Access) 256 bit key

Page 11: System Security: Cryptography Technologies

Asymmetric Encryption

Page 12: System Security: Cryptography Technologies

Algorithm Example

Public Key = (kd, N)

Private Key = (ke, N)

N = p.q (where p, q are prime numbers) Pick kd that is < N Calculate ke where

ke.kd mod (p-1)(q-1) = 1

Page 13: System Security: Cryptography Technologies

Example If p = 7 and q = 13 N = 7.13 = 91

Pick Kd = 5 Find Ke

Ke.5 mod (7-1)(13-1) = 1 Ke = 29

Public Key = (5, 91)Private Key = (29, 91)

Page 14: System Security: Cryptography Technologies

Encrypting and Decrypting

Encrypt message = (input ^ ke ) mod N Decrypt message = (input ^ kd) mod N

If we want to send the number 69

Encrypted message = 69 ^ 5 mod 91 = 62

Decrypted message = 62 ^ 29 mod 91 = 69

*Note: number must < N

Page 15: System Security: Cryptography Technologies

Notes

In reality p and q can be 512 bits each