Top Banner
Guided by VIBJAN KOLAPATI Mrs. SHEENA MATHEW CS-B,ROLL NO:97
21

Cryptographysecurity 1222867498937700-9

May 22, 2015

Download

Technology

muthulx

Crryptography & Security
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cryptographysecurity 1222867498937700-9

Guided by VIBJAN KOLAPATI Mrs. SHEENA MATHEW CS-B,ROLL NO:97

Page 2: Cryptographysecurity 1222867498937700-9

INTRODUCTION SECURITY APPLICATIONS CHALLENGES CONCLUSION REFERENCES

Page 3: Cryptographysecurity 1222867498937700-9

Cryptography is Art & Science of preparing coded or protected

Communication intelligible only to the authorized person.

Cryptography jargon: ciphertext, plaintext, keys,symmetric

&asymmetric algorithms.History : from World War-ICryptology Cryptanalysis

Page 4: Cryptographysecurity 1222867498937700-9

Cryptography: Codes and Code books Ciphers

Cryptanalysis: Art of analyzing ciphertext to extract the

plaintext or the key.Steganography:

Page 5: Cryptographysecurity 1222867498937700-9
Page 6: Cryptographysecurity 1222867498937700-9

SECURITY REQUIREMENTS: Confidentiality Integrity AuthenticationSECURITY THREATS: Information disclosure Integrity violation Generic threat : trojan horses Authentication threats

Page 7: Cryptographysecurity 1222867498937700-9

SECURITY MECHANISMS:

Encryption: The method of disguising

plaintext in such a way as to hide its substance is called encryption.

Decryption:

The process of reverting ciphertext to its original plaintext is called decryption.

Page 8: Cryptographysecurity 1222867498937700-9

Digital Signatures:

Digital signatures enable the recipient of information to verify the authenticity of the information’s origin, and also verify that the information is intact. Thus, public key digital signatures provide authentication and data integrity.

Hash Algorithms: A one-way hash function takes

variable-length input, in this case, a message of any length, even thousands or millions of bits—and produces a fixed-length output; say, 160-bits. The hash function ensures that, if the information is changed in any way—even by just one bit—an entirely different output value is produced.

Page 9: Cryptographysecurity 1222867498937700-9

I. Protecting ATM transactions

II. Smart Card

III. Cryptography Application Block

IV. Watermarking

Page 10: Cryptographysecurity 1222867498937700-9

Advantages of ATM : >Easy to access >would not require human intervention >economical

Customer authentication: > customer’s signature

> customer’s voiceprint > customer’s fingerprint > a password assigned to the customer

Page 11: Cryptographysecurity 1222867498937700-9

Q2=f(Q1); Q2=f(Q1)=1,000,000,000 – Q1 Q2(Janu)=1,000,000,000 –

17,894,567 =999,982,105,433

User_ID PAN PIN

Janu 17894567 8974Sonu 76654321 7860

Page 12: Cryptographysecurity 1222867498937700-9

The solution – encipherment!

Q2= EK{Q1}. If the cryptographic algorithm EK{ --- } is sufficiently strong, then knowledge of

the pair (Q1,Q2) or even a large number of pairs ({Q1(i), Q2(i)):1< i < N} might not permit a customer easily to deduce the secret key K.

A solution to permit the user to select a U-PIN((User_ID)).

The PIN(User_ID), PINOffset(User_ID), and U-PIN(User_ID) in

the IBM 3624 system are related by

U - PIN(User ID)= Left16[EK{PAN(User ID)}]+ PINOffset(User ID).

Standard Decimalization Table:

0 1 2 3 4 5 6 7 8 9 A B C D E F

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

Page 13: Cryptographysecurity 1222867498937700-9

Smart card is pocket-sized card with embedded integrated circuits which can process data.

The smart card will provide proof of identity when a user is communicating with a remote server. Secure transactions involving a smart card will require cryptography.

If the identification process is based on public-key cryptography, then

. The key will need to be stored in the EEPROM, . The smart card will need to read-protect the key, and . The owner of the card will need to use a PIN to prove identity to

the card.

Page 14: Cryptographysecurity 1222867498937700-9
Page 15: Cryptographysecurity 1222867498937700-9

A secure cryptoprocessor is a dedicated computer or microprocessor for carrying out cryptograpic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance.

Cryptoprocessors input program instructions in encrypted form, decrypt the instructions to plain instructions which are then executed within the same cryptoprocessor chip where the decrypted instructions are inaccessibly stored. By never revealing the decrypted program instructions, the cryptoprocessor prevents tampering of programs by technicians who may have legitimate access to the sub-system data bus.

Page 16: Cryptographysecurity 1222867498937700-9

Cryptography Application Block simplifies how developers incorporate cryptographic functionality in their applications. Applications can use the application block for a variety of tasks, such as encrypting information, creating a hash from data, and comparing hash values to verify that data has not been altered.

The Cryptography Application Block was designed to achieve the following goals:

Encapsulate the logic that is used to perform the most common application cryptography tasks.

Present a standard consistent model for common cryptography tasks.

Make sure minimal or negligible performance impact compared to manually written cryptography code that accomplishes the same functionality.

Provide a key protection model that can be customized to satisfy your organization's security requirements.

Page 17: Cryptographysecurity 1222867498937700-9
Page 18: Cryptographysecurity 1222867498937700-9

Watermarking is a method in computer security by which identifiers of sources or copyright owners of digital or analog signals are embedded into the respective signals themselves in order to keep track of where a signal comes from or who the copyright owners are.

The characteristic security requirements on digital watermarking schemes, also called electronic copyright marking schemes (ECMS), are as follows:

>unobstrusiveness: Watermarks should not degrade the quality of the cover-signal.

>robustness:Watermarks should be embedded into the content, in such a way that any signal transform of reasonable strength cannot remove the watermark.

Page 19: Cryptographysecurity 1222867498937700-9

Plays role in business economics, e-commerce,banking

etc.,Plays role in web security SSL protocolPlays role in military agencies National Security Agency(NSA).Plays role in System Security Unix passwords, SIM cards etc.,

Page 20: Cryptographysecurity 1222867498937700-9

In the future, as telephone networks become digital, even the actual conversations may be recorded and stored. All of this amounts to a great potential loss of privacy. Cryptography is one tool that will be able to ensure more privacy. The ability to encrypt data, communications, and other information gives individuals the power to restore personal

privacy.

Cryptography is important for more than just privacy, however. Cryptography protects the world’s banking systems as well. Many banks and other financial institutions conduct their business over open networks, such as the Internet.

Page 21: Cryptographysecurity 1222867498937700-9

1.Microsoft Encarta Encyclopedia 2.Cryptography Encyclopedia 3.Cryptography and Data security by Dorothy

Elizabeth,Amazon.com 4.Computer-security and Cryptography by Alan konheim,ACM

portal. 5.Cryptography & Data security by Denning,Amazon.com 6. Bloom, Jefrey A., Ingemar J. Cox, Ton Kalker, Jean-Paul M.G.

Linnartz, Matthew L. Miller, C., andBrendan S. Traw (1999). “Copy protection for DVDvideo.” Proceedings of the IEEE,87 (7), 1267–1276.

7.Applied Cryptography and Data security by Prof. Christof Paar 8.www.msdn.microsft.com