SIA400 Cryptography is the Means of Transforming Data into a Way that Renders it Unreadable by Anyone Except the Intended Recipient.
Download ReportTranscript SIA400 Cryptography is the Means of Transforming Data into a Way that Renders it Unreadable by Anyone Except the Intended Recipient.
SIA400 Cryptography is the Means of Transforming Data into a Way that Renders it Unreadable by Anyone Except the Intended Recipient. Military Use Defence Against External/Internal Hackers Defence against Industrial Espionage Securing E-commerce Securing Bank Accounts/Electronic Payment Technologies Securing Intellectual Property Avoiding Liability ר ש ת ק ע פ צ ס מ נ ל כ י ט ח ז א ד ו ה ח י ט כ ל מ נ ס פ ע A B C D E F G H I J K L M N O P Q R S T Z P Y ב ג X W V U T S ז R Q O N M L K J I ו ג ד ה ב צ ת ש H G ר ק א U V W X Y Z F E D C B A A B C D E F G H I J K L MN O P Q R S T U V WX Y Z D E F G HI J K L MN O P Q R S T U V WX Y Z A B C MICROSOFT TECHED PLFURVRIW WHFKHG A B C D E F G H I J 0 1 2 3 4 5 6 7 K L M N O P Q R S T U V W X Y Z 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z D K V Q F I B J W P E S C X H T M Y A U O L R G Z N I H O P E Y O U E N J O Y T WJ I H Z U F H T Z H O F X P E C H E D V J Q F Z Z Z Z Z Z Z Z ZW Z Z Z Z Z Z Z Z ZW Z Z Z Z ZW Z Z W Z Z Z Z Z Z ZW Z Z Z Z ZW Z Z W Z Z Z Z Z Z ZW Z Z Z Z ZW Z Z W Z Z Z Z Z Z ZW Z Z Z Z ZW Z Z W Z Z Z Z Z Z ZW Z Z Z Z ZW Z Z W Z Z Z P 13.33 Z 11.67 S 8.33 U 8.33 H D E V 5.83 5.00 5.00 4.17 F W Q T 3.33 3.33 2.50 2.50 B G Y I 1.67 1.67 1.67 0.83 C K L N 0.00 0.00 0.00 0.00 O 7.50 M 6.67 X 4.17 A 1.67 J 0.83 R 0.00 Z Z Z ZW Z Z Z Z ZW Z Z W Z Z Z Giovanni Battista Bellaso 1535 1871 1942 1837 1975 – Present Day 1903 1946 – Present Day http://users.telenet.be/d.rijmenants/en/enigmasim.htm The Enigma Rotor Settings Symmetric / Secret Key Cryptography • Use a Single Key for Both Encryption and Decryption Asymmetric / Public Key Cryptography • Uses One Key for Encryption and Another for Decryption Hash Functions • Uses a Mathematical Transformation to Irreversibly “Encrypt" Information Digital Signatures Encryption Authentication / Non Repudiation Message Integrity (Privacy & Confidentiality) Symmetric Key Algorithm Stream Cipher RC4 SEAL WAKE A5 PKZIP Block Cipher AES, DES, 3DES RC2,RC5,RC6 Blowfish, Twofish, Serpent Mars, Cast, Idea Public Key Asymmetric Algorithm Discrete Log DSA ECC Diffe-Helman ElGamal Factoring RSA LUC Message Digest Hash Algorithm MD2 MD5 SHA SHA-1 SHA-2 SHA-3 (Pending) Ripe-MD160 Key Management ISA/KMP IKE SKIP Photuris Diffe-Helman ElGamal Public Key Infrastructure (PKI) PXIX SPKI SDS PGP DNSEC Winners of the NIST 2001 AES Design Competition Joan Daemen and Vincent Rijmen Decimal Hex Decimal Hex Decimal Hex 1 1 11 B 21 15 2 2 12 C 22 16 3 3 13 D 23 17 4 4 14 E 24 18 5 5 15 F 25 19 6 6 16 10 26 1A 7 7 17 11 27 1B 8 8 18 12 28 1C 9 9 19 13 29 1D 10 A 20 14 30 1E Click Me Click Me Encryption/Decryption Digital Signatures Key Exchange Secure Communications Considered to be The Fathers of Public Key Cryptography Whitfield Diffie and Martin Hellman Bob’s Network Alice’s Network Formulae 3 Formulae 1 Prime Number Alice’s Secret Integer Base Number A Prime Number Bob’s Secret Integer Base Number B Bob’s Public Value Y Alice's Public Value X Formulae 2 Formulae 4 Shared Secret Z Alice’s Value X Alice's Secret Integer Prime Number Bob’s Value Y Alice's Secret Integer Prime Number Same Value Secret Key Secret Key F(x)+ Y X X Once selected Alice Raises RA No Matter how large the number is A Will Eventually Map into a Range Between 0 & N -1 = X Tools Exist to Calculate X From A to Raise RA(A) and find X is easy. Very . RB RAxB RA B B B A A Note the significant change in the hash sum for minor changes in the input. Note that the hash sum is the same length for varying input sizes. This is extremely useful. http://en.wikipedia.org/wiki/SHA Open Web Application Security Project The Cryptography Chronicles: Explaining the Unexplained Part 1 The Cryptography Chronicles: Explaining the Unexplained Part 2 Lock, Stock & Two Smoking Smart Devices! Cyber Threats Security Panel