SIA400 Cryptography is the Means of Transforming Data into a Way that Renders it Unreadable by Anyone Except the Intended Recipient.

Download Report

Transcript SIA400 Cryptography is the Means of Transforming Data into a Way that Renders it Unreadable by Anyone Except the Intended Recipient.

SIA400
Cryptography is the Means of Transforming Data into a Way that
Renders it Unreadable by Anyone Except the Intended Recipient.
Military Use
Defence Against External/Internal
Hackers
Defence against Industrial
Espionage
Securing E-commerce
Securing Bank Accounts/Electronic
Payment Technologies
Securing Intellectual Property
Avoiding Liability
‫ר ש ת‬
‫ק‬
‫ע פ צ‬
‫ס‬
‫מ נ‬
‫ל‬
‫כ‬
‫י‬
‫ט‬
‫ח‬
‫ז‬
‫א‬
‫ד‬
‫ו ה‬
‫ח‬
‫י ט‬
‫כ‬
‫ל‬
‫מ‬
‫נ‬
‫ס‬
‫פ ע‬
A B C D E F G H I J
K L
M N O P Q R S T
Z
P
Y
‫ב‬
‫ג‬
X W V U T
S
‫ז‬
R Q
O N
M L
K J
I
‫ו‬
‫ג ד ה‬
‫ב‬
‫צ‬
‫ת ש‬
H G
‫ר ק‬
‫א‬
U V W X Y Z
F
E
D
C B A
A B C D E F G H I J K L MN O P Q R S T U V WX Y Z
D E F G HI J K L MN O P Q R S T U V WX Y Z A B C
MICROSOFT TECHED
PLFURVRIW WHFKHG
A B
C D E F G H I J
0 1
2
3
4 5 6
7
K
L
M N
O
P
Q
R
S
T
U
V
W X
Y
Z
8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
D K V Q F I B J W P E S C X H T M Y A U O L R G Z N
I H O P
E Y O U E N J
O Y
T
WJ
I
H Z
U F
H T
Z H O F
X
P
E
C H E
D
V J
Q
F
Z
Z
Z
Z
Z
Z
Z
Z
ZW Z
Z
Z Z
Z
Z
Z
Z
ZW
Z
Z
Z
Z
ZW Z
Z W
Z Z
Z
Z
Z
Z
ZW
Z
Z
Z
Z
ZW Z
Z W
Z Z
Z
Z
Z
Z
ZW
Z
Z
Z
Z
ZW Z
Z W
Z Z
Z
Z
Z
Z
ZW
Z
Z
Z
Z
ZW Z
Z W
Z Z
Z
Z
Z
Z
ZW
Z
Z
Z
Z
ZW Z
Z W
Z Z
Z
P 13.33
Z 11.67
S 8.33
U 8.33
H
D
E
V
5.83
5.00
5.00
4.17
F
W
Q
T
3.33
3.33
2.50
2.50
B
G
Y
I
1.67
1.67
1.67
0.83
C
K
L
N
0.00
0.00
0.00
0.00
O 7.50
M 6.67
X 4.17
A
1.67
J
0.83
R 0.00
Z
Z
Z
ZW
Z
Z
Z
Z
ZW Z
Z W
Z Z
Z
Giovanni Battista Bellaso 1535
1871
1942
1837
1975 – Present Day
1903
1946 – Present Day
http://users.telenet.be/d.rijmenants/en/enigmasim.htm
The Enigma Rotor Settings
Symmetric / Secret Key Cryptography
• Use a Single Key for Both Encryption and Decryption
Asymmetric / Public Key Cryptography
• Uses One Key for Encryption and Another for Decryption
Hash Functions
• Uses a Mathematical Transformation to Irreversibly
“Encrypt" Information
Digital Signatures
Encryption
Authentication / Non Repudiation
Message Integrity
(Privacy & Confidentiality)
Symmetric Key
Algorithm
Stream
Cipher
RC4
SEAL
WAKE
A5
PKZIP
Block
Cipher
AES, DES, 3DES
RC2,RC5,RC6
Blowfish,
Twofish,
Serpent
Mars, Cast, Idea
Public Key
Asymmetric Algorithm
Discrete
Log
DSA
ECC
Diffe-Helman
ElGamal
Factoring
RSA
LUC
Message Digest
Hash Algorithm
MD2
MD5
SHA
SHA-1
SHA-2
SHA-3 (Pending)
Ripe-MD160
Key Management
ISA/KMP
IKE
SKIP
Photuris
Diffe-Helman
ElGamal
Public Key
Infrastructure (PKI)
PXIX
SPKI
SDS
PGP
DNSEC
Winners of the NIST 2001 AES Design Competition
Joan Daemen and Vincent Rijmen
Decimal
Hex
Decimal
Hex
Decimal
Hex
1
1
11
B
21
15
2
2
12
C
22
16
3
3
13
D
23
17
4
4
14
E
24
18
5
5
15
F
25
19
6
6
16
10
26
1A
7
7
17
11
27
1B
8
8
18
12
28
1C
9
9
19
13
29
1D
10
A
20
14
30
1E
Click Me
Click Me
Encryption/Decryption
Digital Signatures
Key Exchange
Secure Communications
Considered to be The Fathers of Public Key Cryptography
Whitfield Diffie and Martin Hellman
Bob’s Network
Alice’s Network
Formulae 3
Formulae 1
Prime Number
Alice’s Secret
Integer
Base Number
A
Prime Number
Bob’s Secret Integer
Base Number
B
Bob’s Public Value Y
Alice's Public Value X
Formulae 2
Formulae 4
Shared Secret Z
Alice’s Value X
Alice's Secret Integer
Prime Number
Bob’s Value Y
Alice's Secret Integer
Prime Number
Same Value
Secret Key
Secret Key
F(x)+ Y
X
X
Once selected Alice Raises RA
No Matter how large the number is A Will Eventually
Map into a Range Between 0 & N -1 = X
Tools Exist to Calculate X From A to Raise RA(A) and
find X is easy.
Very
.
RB
RAxB
RA
B
B
B
A
A
Note the significant change in the hash sum for minor changes in the input. Note that
the hash sum is the same length for varying input sizes. This is extremely useful.
http://en.wikipedia.org/wiki/SHA
Open Web Application Security Project
The Cryptography Chronicles: Explaining the Unexplained Part 1
The Cryptography Chronicles: Explaining the Unexplained Part 2
Lock, Stock & Two Smoking Smart Devices!
Cyber Threats Security Panel