Security Systems for Digital Data

Post on 14-Nov-2014

1308 Views

Category:

Technology

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

This was one presentation I held last year during my exchange semester at the University of Nebraska at Omaha.

Transcript

Security Systems for Digital DataSecurity Systems for Digital DataBig Brother is watching YOUBig Brother is watching YOU

Bernhard Hofer 03/10/2008CIST 3100 - Organizations, Applications & Technology

Page 2

Table of contentsTable of contents

1. History and Terminology

2. Cryptography nowadays and

Encrypting Digital Data

3. Big Brother www

4. The Future (quantum cryptography)

5. Question time

Page 3

Beginning of cryptographyBeginning of cryptography

• Egypt‘s Old Kingdom (4500+ years ago)

non-standard hieroglyphs

• The Greeks of Classical times

The SCYTALE, used by Spartan military

enlarge image

Page 4Page 4

H E

L

P

M

E I

A

M

… wood cylinder

strip of paper

Page 5

Terminology (I)Terminology (I)

c r y p t o g r a p h ykryptós, „hidden“ graphéin, „to write“

„secret writing“

Page 6

Terminology (II)Terminology (II)

Hello, this is my first english pres at UNO

… plaintext (ordinary information)

encryption (converting plaintext)

decryption (reverse process)

H?$% /&!!““= )(/&%ded die=?30((&% ?$$?)

… ciphertext (unreadable plaintext)

cip

her

key +

Page 7

Table of contentsTable of contents

1. History and Terminology

2. Cryptography nowadays and

Encrypting Digital Data

3. Big Brother www

4. The Future (quantum cryptography)

5. Question time

Page 8

Cryptography nowadays (I)Cryptography nowadays (I)

“Cryptography is about communication in the presence of adversaries.”

Ronald Rivest, "Cryptography" From the Handbook of Theoretical Computer Science, edited by J. van Leeuwen, Elsevier Science Publishers B.V., 1990

Page 9

Symmetric key system (private key)

… sender and receiver share the same key (for encryption and decryption)

… like the wind (very fast)

… 2 different kinds (block and stream ciphers)

… Examples: D(A)ES, RC4, MD5, hash

Cryptography nowadays (II)Cryptography nowadays (II)

Page 10

Asymmetric key system (public key)

… founded 1976 by Diffie and Hellman

… 2 keys (same lenght): 1 public and 1 private

… both are different but related

… slower than symmetric key methods

Cryptography nowadays (III)Cryptography nowadays (III)

Page 11

Key Serverin a so called Trust Center

Player 1 Player 2

… wants to deliver a SECURE message

public key

encrypting …

private key

… delivering message

decrypting …

!! Authentication Problem !!

Player 2 doesn‘t know,who sent the message!?!

Everybody knows the public key from Player 2!

Cryptography nowadays (IV)Cryptography nowadays (IV)

Page 12

Key Serverin a so called Trust Center

Player 1 Player 2

… wants to deliver a SECURE message

public key

encrypting …

private key

… delivering message

decrypting …

!! Confidentiality Problem !!

Player 2 knows,who sent the message!

But: Everybody could decrypt the message from Player 1!

continue pres.

Cryptography nowadays (VI)Cryptography nowadays (VI)

Page 13

Asymmetric key system (public key)

… full security, if process repeated twice

… operational area: Combination of the symmetric and asymmectric

… Examples: RSA, DSA, SSL, SSL2, …

Cryptography nowadays (VIII)Cryptography nowadays (VIII)

Page 14

Table of contentsTable of contents

1. History and Terminology

2. Cryptography nowadays and

Encrypting Digital Data

3. Big Brother www

4. The Future (quantum cryptography)

5. Question time

Page 15

The internet

… local structure

… none secure, open information system

… private, public and economic player

… cryptography is the only way for privacy protection over the world wide web!

Big Brother www (I)Big Brother www (I)

Page 16

Requirements for secure interaction

… availability

… authentification

… confidentiality

… integrity

… commitment

Big Brother www (II)Big Brother www (II)

Page 17

Useful applications

… PGP (Pretty Good Privacy)RSA, IDEA founded 1991 by Phil Zimmermann

… confidential certificates digital signature for online banking

… SSL (Secure Socket Layer … https://) founded by Netscape, cryptography for web pages

Big Brother www (III)Big Brother www (III)

Page 18

The one and only security hole is

Nothing and/ore nobody could save you against Brute Force Attacks ;-)

!! YOUR PASSWORD !!

Big Brother www (IV)Big Brother www (IV)

Page 19

cost increases per power(10.000 $, 100.000 $, 1.000.000 $, …)

Key length in Bit

Codebreaking timetableCodebreaking timetable

Page 20

Table of contentsTable of contents

1. History and Terminology

2. Cryptography nowadays and

Encrypting Digital Data

3. Big Brother www

4. The Future (quantum cryptography)

5. Question time

Page 21

In princible …

… it is a old school symmetric encryption

… nothing else as a key distributer

… it isn‘t based on mathematical

… but on the physics of information

Quantum cryptography (I)Quantum cryptography (I)

Page 22

In action …

… first implemented between the BA CA and the Vienna City-Hall over a 1.500m FDDA (fibre optics) cabel in April 2004

by Anton Zeilinger …

Quantum cryptography (II)Quantum cryptography (II)

Page 23

Table of contentsTable of contents

1. History and Terminology

2. Cryptography nowadays and

Encrypting Digital Data

3. Big Brother www

4. The Future (quantum cryptography)

5. Question time

Page 24

… for your attention!!

Bernhard Hofer

CIST 3100 - Organizations, Applications & Technology

Thank you...Thank you...

top related