1 / 8

Asynchronous Cryptology: Implementations and Applications

Asynchronous Cryptology: Implementations and Applications. Tim Ransom ransomts@email.appstate.edu James Corsi corsijn@email.appstate.edu. Summer Bridge 2013 August 2, 2013. Overview. What is Cryptology? Symmetric vs. Asymmetric Public vs. Private Keys What makes them secure?

hildebrand
Download Presentation

Asynchronous Cryptology: Implementations and Applications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Asynchronous Cryptology:Implementations andApplications Tim Ransom ransomts@email.appstate.edu James Corsi corsijn@email.appstate.edu Summer Bridge 2013 August 2, 2013

  2. Overview What is Cryptology? Symmetric vs. Asymmetric Public vs. Private Keys What makes them secure? Acknowledgements

  3. What is Cryptology? The encryption and decryption of a message to ensure a secret communication Has become very prominent after WWI with the introduction of computers Combines the fields of applied mathematics, computer science and electrical engineering

  4. Symmetric vs. Asymmetric Symmetric Advantages: Higher rates of throughput Keys are relatively short Simple symmetric keys can be composed to create a stronger cipher Public Key Advantages: Same keys can be used for long periods of time Public keys reduce the total number of keys needed, making management much simpler Only the private key must be kept secret Symmetric Disadvantages: For two parties, both keys must be kept secret Digital signature verifications typically require large keys for public validation Public Key Disadvantages: Throughput speeds can be very slow No public scheme has been proven secure

  5. Public vs. Private Keys Private keys are usually used to decrypt messages encrypted with the related public key They can be used for encryption to verify the author of the message Public keys are freely available and usually encrypt data Public keys can decrypt data to publicly announce information

  6. What makes them secure? RSA Algorithms DH Algorithms Extra security measures: • Trusted Third Party (TTP) • Digital Signature

  7. Acknowledgements Dr. Tashakkori Dr. Norris Appalachian State The National Science Foundation STEP program

  8. References Menezes, Alfred J., Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. Boca Raton: CRC, 1997. Print. Pfleeger, Charles P., and Shari L. Pfleeger. Security in Computing. 3rd ed. Upper Saddle River: Prentice Hall, 2003. Print. Pieprzyk, Josef, Thomas Hardjono, and Jennifer Seberry. Fundamentals of Computer Security. New York: Springer-Verlag Berlin Heidelberg, 2003. Print. Garrett, Paul, and Daniel Lieman. Public-key Cryptography: American Mathematical Society Short Course, January 13-14, 2003, Baltimore, Maryland. Vol. 62. Providence, RI: American Mathematical Society, 2005. Print Abhishek. “Symmetric and Asymmetric Encryption.” Drawing. Cryptocats.com 27 August 2008. <http://cryptocrats.com/digital-rights-management/drm-technologies-drm-part-2/> “Public-key-crypto-1” by KohanX - CC: BY “Public key shared secret” by David Gothberg - CC: BY “Diffie-Hellman Key Exchange” by Flugaal - CC: BY

More Related