1 / 12

An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology

An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology. Objectives. To provide you with an introduction to cryptology Some terms and concepts behind basic cryptographic methods Some basic cryptographic algorithms Trust models.

ardara
Download Presentation

An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. An Overview of CryptographyYing Wang-SuorsaHelsinki University of Technology

  2. Objectives • To provide you with an introduction to cryptology • Some terms and concepts behind basic cryptographic methods • Some basic cryptographic algorithms • Trust models

  3. Cryptography : the art of providing secure communication over insecure channels. • Encode text and provide a method for decoding • Not hide message! Confidentiality : Ensuring that no one can read the message except intended receiver. Authentication : The process of proving one's identity. Integrity : Ensuring the received messages has not been altered in any way from the original. Non-repudiation : A mechanism to prove that the sender really sent this message.

  4. Levels of CryptographicAction – In today's internet, most Syst. are split between application level and transport level. 7 – Application 6 – Presentation 5 – Session S-HTTP 4 – Transport SSL 3 – Network IPSEC 2 – Data Link PPTP 1 – Physical

  5. Importance of Cryptography Military applications : command and control Diplomatic applications : information gathering, spy Economic applications : • Information protection • Banking transaction • Authentication and signatures • Modern e-commerce How can the public use cryptography quickly and safely?

  6. Importance of Cryptography Modern methods of communication are inherently insecure • Internet is very insecure • Ethernet networks liable to having sniffers • Cable modems pass through other people's homes

  7. Pre-computerized Crypto schemes Transposition Ciphers • Reverse pairs of letters • HELLO WORLD • EHLL OOWLRD • Remover every second letter and put it at the end • HELLO WORLD • HLOWRDEL OL • Reverse the letters • HELLO WORLD • DLROW OLLEH • Many trickers...

  8. Pre-computerized Crypto schemes Substitution Ciphers ABCDEFGHIJKLMNOPQRSTUVWXYZ BADCFEHGJILKNMPORQTSVUXWZY HELLO WORLD • GFKKPXPQKC

  9. Types of Cryptographic Algorithms

  10. Why Three Encryption Techniques? The answer lies in that each scheme is optimized for some specific applications

  11. Trust Models PGP Web of Trust Kerberos Public Key Certificates and Certificate Authorities

  12. Kerberos Architecture

More Related