0% found this document useful (0 votes)
26 views19 pages

Human Computing - Lecture 6

The document discusses various cryptographic methods, including classical ciphers, symmetric and asymmetric encryption, and the role of public key infrastructure (PKI) and certificate authorities (CA). It highlights the strengths and weaknesses of symmetric and asymmetric systems, emphasizing the importance of key distribution and management. Additionally, it notes that while encryption is crucial for security, human factors often pose significant risks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views19 pages

Human Computing - Lecture 6

The document discusses various cryptographic methods, including classical ciphers, symmetric and asymmetric encryption, and the role of public key infrastructure (PKI) and certificate authorities (CA). It highlights the strengths and weaknesses of symmetric and asymmetric systems, emphasizing the importance of key distribution and management. Additionally, it notes that while encryption is crucial for security, human factors often pose significant risks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

Human Computing

CRYPTOGRAPHY – DATA ENCRYPTION PART 2


Classical Ciphers

 Classical ciphers used one of the following methods for the protection of
information
 Substitution
 To encrypt a message with the Caesar cipher, each letter of message is replaced by the
letter three positions later in the alphabet.
 "WIKIPEDIA" encrypts as "ZLNLSHGLD".
 Caesar rotated the alphabet by three letters, but any number works
 Permutation/Transposition - Substitution ciphers replace each letter with a
different letter or symbol to produce the ciphertext, in a Transposition cipher, the
letters are just moved around.
 Poly alphabetic ciphers
 Weddingday encypts to YADGNIDDEW
Practice time:
Using Shift cipher encrypt
Weddingday
K = 13

Formula: (n+x) mod


26

https://www.khanacademy.org/computing/computer-science/cryptography/ciphers/a/
shift-cipher
Classical Ciphers

 Book / Running Key


 A large body of text is used as the key
 Vulnerable to redundancy attacks
 Codes
 Construction of words/phrase mappings to other phrases, number or
symbols
 Stenography
 From the Greek for covered writing
 Hiding the existence of a message
 Microdots, watermarks
Symmetric Cryptography

 An encryption system in which the sender and receiver of a message share a single,
common key that is used to encrypt and decrypt the message.
 The most popular symmetric–key system is the Data Encryption Standard (DES)
Symmetric Cryptography

 The process makes use of public and private components


 Public
 Algorithm to be used
 The cipher text
 Private
 They key to be used
 The exact transformation used out of a number of possibilities
Asymmetric Cryptography

 The encryption process where different keys are used for encrypting and decrypting the
information.
 Keys are different but are mathematically related, such that retrieving the plain text by decrypting
ciphertext is feasible.
 Fairly new (45 years?)
Asymmetric Cryptography

 Makes use of multiple keys for greater security, and solving the problem of key
distribution
 Each party has their own keys, obviating the need for a shared secret key
 Bases on the work by Diffie & Hellman Rivest, Shamir & Adleman
 named after its authors (Rivest, Shamir and Adleman) one of the most popular: patented 1977,
published academically 1978
 Finding large prime factors of numbers is a problem
 Computationally intense

Rivest, Ronald L., Adi Shamir, and Leonard Adleman. “A method for obtaining digital signatures and public-key cryptosystems.” Communications of the
ACM 21.2 (1978): 120-126.
Asymmetric Cryptography

 Some points to note:


 Public key cannot decrypt a message it encrypted
 Ideally a private key cannot be derived from a public key
 A message encrypted with one key can only be decrypted with the
corresponding half
 The private key MUST be kept private
Asymmetric Cryptography

 RSA is the most widely used form of public key encryption,


 RSA Algorithm
 RSA stands for Rivest, Shamir, and Adelman
 Both public and private key are interchangeable
 Variable Key Size (512, 1024, or 2048 bits)
 2 ^n
Pros & Cons : Asymmetric

 Strengths
 Better Key distribution
 Scalability
 Provides Confidentiality, authentication, non- repudiation
 Weaknesses
 Slower and more resource intensive than symmetric systems
Pros & Cons : Symmetric

 Strengths
 Faster than asymmetric systems
 Hard to break if a sufficiently large key size is used
 Weaknesses
 Key distribution
 Scalability
 Limited security
 Confidentiality only
 No Authentication or Non-repudiation
The Key distribution Problem

Symmetric Asymmetric
 Separate key required for each pair  Each user has their own keys
of people  You only need the public portion of a
 Key distribution is a problem key
 Only provides C  Provides CIA
 Complex to manage large numbers  Improved manageability
Public key infrastructure (PKI)

 Public key infrastructure (PKI) refers to the deployment and management of a public
key encryption system, where asymmetric encryption keys are used to enable secure
authentication and encryption-key exchange.
 PKI’s authentication and key-exchange mechanisms enable security functionality such as
access control, secure messaging, data encryption, data/message signing, secure boot,
and more.
 Provides Authentication, Confidentiality, Integrity, Non-Repudiation, Access Control
 PKI is considered highly secure but also hard to manage, as it requires a set of roles,
policies, and procedures to create, manage, distribute, use, store, and revoke
encryption keys and related digital certificate
 A PKI consists of the software, data formats, programs, procedures, algorithms,
communications and security policies which enable a dispersed group of people to
communicate in a secure manner
Certificate Authority (CA)

 Certificate Authority is a trusted third party entity that issues


digital certificates and manages the public keys and credentials
for data encryption for the end user.
 The responsibility of the CA in this process is to ensure that the
company or user receives a unique certificate for an efficient
identity authentication.
 CA checks with a Qualified Information Source (QIS) to verify the
data supplied by the applicant, before issuing the digital
certificate.
 A registration authority (RA) is an authority in a network that
verifies user requests for a digital certificate and tells the
certificate authority (CA) to issue it
 CA is trusted by people to perform some kind of verification on clients
 I trust you because the RA trusts you
 Do you know whose web site it is?
 Is the URL correct?
 Are you likely to send any
confidential information over this
link?
 When you should really worry
 Are you doing anything
involving:
 Financial transactions?
 Passwords?
 Personal data?
 Downloading anything?
Summary

 Cryptography is present in our everyday lives


 Encryption and decryption form some of the basic building blocks of many security systems
 Just because you are encrypting data does not mean it is safe
 As with most security, the human factor is the weakest.
 Encryption algorithms are basically step-by-step directions for performing cryptographic
functions (such as encryption, decryption, hashing, etc.)
 Algorithms come in asymmetric and symmetric varieties.
 In the first, one key encrypts data and another decrypts data.
 In the latter, one key performs both the encryption and decryption functions.
 Symmetric algorithms are efficient processes that are designed for encrypting data in
secure, non-public-facing channels.

You might also like