1 / 15

System Security: Cryptography Technologies

System Security: Cryptography Technologies. CPE 261403 - Operating Systems http://www.e-cpe.org/moodle. What does the fish mean?. Ichthys. User name / Password. Threat Ex: Wifi Packet Sniffers. Protection with Cryptography. Encryption and Decryption. Symmetric – Uses a shared key

lulu
Download Presentation

System Security: Cryptography Technologies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. System Security:Cryptography Technologies CPE 261403 - Operating Systems http://www.e-cpe.org/moodle

  2. What does the fish mean?

  3. Ichthys

  4. User name / Password

  5. Threat Ex: Wifi Packet Sniffers

  6. Protection with Cryptography

  7. Encryption and Decryption • Symmetric – Uses a shared key • Asymmetric – Added security with Public and Private keys

  8. Symmetric Encryption Simple example: Add a constant to the ASCII value I LOVE YOU J MPWF ZPV Key = 1

  9. Some Examples • Data Encryption Standard (DES) • 56 bit key for every 64 bit value • Advanced Encryption Standard (AES) • 256 bit key for every 128 bit value • RC4 • As used in WEP (Wired Equivalent Privacy) • WPA, WPA2 (Wi-Fi Protected Access) • 256 bit key

  10. Asymmetric Encryption

  11. Algorithm Example Public Key = (kd, N) Private Key = (ke, N) • N = p.q (where p, q are prime numbers) • Pick kd that is < N • Calculate ke where • ke.kd mod (p-1)(q-1) = 1

  12. Example • If p = 7 and q = 13 • N = 7.13 = 91 • Pick Kd = 5 • Find Ke • Ke.5 mod (7-1)(13-1) = 1 • Ke = 29 Public Key = (5, 91) Private Key = (29, 91)

  13. Encrypting and Decrypting • Encrypt message = (input ^ ke ) mod N • Decrypt message = (input ^ kd) mod N • If we want to send the number 69 • Encrypted message = 69 ^ 5 mod 91 = 62 • Decrypted message = 62 ^ 29 mod 91 = 69 • *Note: number must < N

  14. Notes • In reality p and q can be 512 bits each

More Related