Quantum Computing and Cryptography Their impact on cryptographic practice
|
|
|
- Joleen Miller
- 10 years ago
- Views:
Transcription
1 Quantum Computing and Cryptography Their impact on cryptographic practice Tim Moses Director, Advanced Security Technology Entrust, Inc. January Entrust, Inc. All rights reserved.
2 Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. Entrust is a registered trademark of Entrust Limited in Canada. All other company and product names are trademarks or registered trademarks of their respective owners. The material provided in this document is for information purposes only. It is not intended to be advice. You should not act or abstain from acting based upon such information without first consulting a professional. ENTRUST DOES NOT WARRANT THE QUALITY, ACCURACY OR COMPLETENESS OF THE INFORMATION CONTAINED IN THIS ARTICLE. SUCH INFORMATION IS PROVIDED "AS IS" WITHOUT ANY REPRESENTATIONS AND/OR WARRANTIES OF ANY KIND, WHETHER EXPRESS, IMPLIED, STATUTORY, BY USAGE OF TRADE, OR OTHERWISE, AND ENTRUST SPECIFICALLY DISCLAIMS ANY AND ALL REPRESENTATIONS, AND/OR WARRANTIES OF MERCHANTABILITY, SATISFACTORY QUALITY, NON-INFRINGEMENT, OR FITNESS FOR A SPECIFIC PURPOSE Entrust, Inc. All rights reserved Entrust, Inc. All rights reserved. Page ii
3 Table of Contents 1 Solving the Impossible Quantum Mechanics Quantum Computing...3 A Practical Quantum Computer... 3 Implications for Information Security Quantum Cryptography...5 Random Number Generation... 5 The Key Distribution Problem... 6 The Quantum Solution... 6 Quantum vs. Public-Key Cryptography Conclusions About Entrust Entrust, Inc. All rights reserved. Page iii
4 1 Solving the Impossible Recent years have seen significant advances in both quantum computing and quantum cryptography. Reports have hinted at radical implications for the practice of computing in general and information security in particular. Certain well-known problems in the fields of modeling, optimization and cryptography have proven intractable using the classical model of computation. But, using a model of computation that exploits quantum mechanical phenomena, solutions to these problems become possible. If and when quantum computers of sufficient size become a reality, secure information systems based on public-key cryptography will require an overhaul. Present-day cryptographic systems offer what is called "computational security"; in theory, at least, if one could assemble sufficient computing resources for sufficient time, then one could break them, although the cryptographic systems commonly in use today have been engineered to make this a possibility in theory only. Quantum mechanical phenomena offer the possibility of "absolute security": systems that are secure no matter how much resource is available to attack them. Quantum cryptography is in use today in specialized applications, but it lacks the flexibility that conventional cryptographic systems can provide. 2 Quantum Mechanics The scale of everyday experience extends from fractions of an inch to thousands of miles. Years of exploring this range of physical scales makes us feel that we understand how objects will behave under most circumstances. Until as recently as a hundred years ago it was thought that our understanding of the everyday scale would enable us to understand how things behave on both a much larger and a much smaller scale. However, scientific developments in the 20th century showed us that this was not the case. Einstein s general theory of relativity, for instance, has shown us that, on the large scale, spacetime is curved by the presence of mass. Our familiarity with the everyday scale did not prepare us for this conclusion. The same turns out to be true for scales much smaller than those encountered in everyday experience. One of the first hints of this was the so-called two-slit experiment. It was observed in 1927 by Clinton Davisson at Bell Labs that, when you place a barrier with a single slit between a source of electrons and a fluorescent screen, a single line is illuminated on the screen. When you place a barrier with two parallel slits between the source and the screen, the illumination takes on the form of a series of parallel lines fading in intensity the farther away they are from the center. This is not surprising and is entirely consistent with a wave interpretation of electrons, which was the commonly held view at the time. However, Davisson discovered that when you turn down the intensity of the electron beam to the point where individual electrons can be observed striking the fluorescent screen, something entirely unexpected happens: the positions at which the electrons strike are points distributed randomly with a probability matching the illumination pattern observed at higher intensity. Copyright 2008 Entrust. All rights reserved. Page 1
5 It is as if each electron has physical extent so that it actually passes through both slits, but when it is observed striking the screen, it collapses to a point whose position is randomly distributed according to a wave function. Waves and particles are both familiar, but quite distinct, concepts at the everyday scale. But, at the subatomic scale, objects appear to possess the properties of both. This observation was one of the first to suggest that classical theories were inadequate to explain events on the subatomic scale and that eventually gave rise to quantum theory. It has now been discovered that objects on an extremely small scale behave in a manner that is quite different from objects on the everyday scale, such as tennis balls. Perhaps the most surprising observation is that objects on this very small scale, such as subatomic particles and photons, have properties that can be described by probability functions and that they adopt concrete values only once they are observed. While the probability functions are entirely amenable to analysis, the concrete values they adopt when observed appear to be random. If you find this hard to believe, then you are in good company. In fact, Niels Bohr once remarked that anyone who is not shocked by quantum theory has not understood it. Nevertheless, quantum theory has been called the most successful scientific theory ever developed, because of the broad range of experimental observations with which it is consistent. One of the most dramatic illustrations of the probabilistic wave function representation of objects on the quantum scale is a thought experiment described by Erwin Schrödinger, and that is universally referred to as Schrödinger s cat. We are asked to imagine a box containing a cat, a vial of cyanide, a radioactive source and a Geiger counter. The apparatus is arranged such that, if the Geiger counter detects the emission of an electron from the radioactive source, then the vial is broken, the cyanide is released and the cat dies. According to quantum theory, the two states in which the electron has been emitted and the electron has not been emitted exist simultaneously. So, the two states: the cat dies and the cat lives, exist simultaneously until the box is opened and the fate of the cat is determined. To the best of our knowledge, no one has actually attempted to perform this experiment. But, if they were to, we can be confident that their observations would be entirely consistent with this theory. What we should take from this thought experiment is that quantum objects adopt multiple states simultaneously a process called superposition and that they collapse to a single random state only when they are observed. These properties can be exploited to create an entirely new model of computation; one that can solve problems that have proven intractable to classical models. They can also form the basis for new cryptographic schemes: ones that offer absolute security in certain specialized applications Entrust, Inc. All rights reserved. Page 2
6 3 Quantum Computing Quantum computing is a new model of computation that takes advantage of the strange and wonderful properties of quantum objects. Certain problems, whose difficulty increases exponentially with the problem size in the classical model, scale polynomially (or even linearly) in the quantum model, thereby making a solution possible even for large systems. A Practical Quantum Computer In the classical computing model, the basic unit of information is a bit, which can adopt one of two mutually exclusive states; either a "0" or a "1. The most elementary computing operation is a gate, which takes some number of bits at its inputs and produces a bit at its output, the value of the output bit bearing some relationship to the value of the input bits. These gates can be combined into circuits to realize more complex operations, such as a data-processing unit. Similarly, in the quantum computing model, the basic unit of information is called the quantum bit or qubit, which can be realized in any of what physicists call an ideal two-state quantum system. Examples of suitable systems include photons (with vertical and horizontal polarization representing the two orthogonal states), electrons and other spin-1/2 systems (with spin up and down representing the two orthogonal states) and systems defined by two energy levels of atoms or ions. Each state corresponds to the familiar "0" and "1" bit values. But qubits can also take on values that are superpositions of these two states. Thus, they can be thought of as occupying a state that is a combination of both a "0" state and a "1" state. While quantum mechanics describes a number of intriguing phenomena, superposition is the one that has received the most attention for its suitability as the basis of a quantum computer. Scientists have been able to develop gates for some two-state quantum systems that take qubits as input and output a qubit. The superposition state of the output qubit depends deterministically upon the superposition states of its inputs. These gates can then be combined into a circuit that implements an algorithm to solve a specific mathematical problem. The internal qubits of a quantum computer may maintain their state superpositions for the duration of the calculation, until the result is read out. Only then will the output state collapse to a concrete value representing the solution to the problem. One company has announced that it has built a commercial quantum computer, based on a superconductivity effect, with a 28-qubit register, although some experts are skeptical about this claim. The computer architecture is designed to address optimization problems. And, it is not suitable for problems of interest to cryptographers. Nevertheless, experts predict that, in years, quantum computers will exist that are large enough to solve practical problems, including those in the field of cryptography. Quantum computers are not general-purpose programmable machines. They are not going to replace classical computers in all applications, offering a way of extending Moore's Law beyond its present time horizon. Rather there is a limited set of important mathematical problems that cannot be solved with the classical computing model and that fall easily to attack by a quantum computer Entrust, Inc. All rights reserved. Page 3
7 Implications for Information Security Should large quantum computers ever be built, there will be at least two important implications for information security. Quantum computers will impact the security of both symmetric-key algorithms (e.g. block ciphers) and public-key algorithms (such as RSA), although the seriousness of the impact will be different for each. For a strong block cipher with an N-bit key, 2 N classical operations are required to be certain of finding the key. This is accomplished by searching through all 2 N possible keys, decrypting ciphertext with each, until a plausible plaintext is obtained. Then the right key has been found. For example, AES-128 uses a key of 128 bits, and so operations are required to recover the key. Keys of this size provide very strong security, and most cryptographers believe that they should be secure for at least the next 20 years. Quantum computers, on the other hand, can run an algorithm called unstructured quantum search that can break a symmetric cipher substantially faster than classical algorithms can. It can find a key in 2 N/2 operations. Using the example above, unstructured quantum search would require 2 64 operations to recover an AES-128 key. In these circumstances, AES-128 would be considered insecure for many applications. And in order to restore the required level of security, it would be necessary to switch to AES-256. Indeed, AES-256 was developed with just such an eventuality in mind. The implications for public-key cryptography are more serious. Quantum computers can run algorithms that break all the popular public-key systems in trivial amounts of time. For instance, a quantum algorithm called Shor's algorithm can recover an RSA key in polynomial time. Shor's Algorithm It is tempting to think that quantum computers attack cryptanalytic problems using superposition to conduct an exhaustive search of the key space in parallel. But, this is not the case. Shor's algorithm implements the quantum analog of the fast Fourier transform to find the 'period' of the RSA operation P = P ed (Mod n). While it is not possible, using a quantum computer, to discover the coefficients of the transform, it is possible to discover the period. And, given the public key and the period, it is possible to discover the private key. The quantum Fourier transform scales polynomially with the size of the RSA modulus. Hence, breaking RSA becomes a practical proposition. Similar algorithms exist for all commonly used public-key algorithms including DSA, Diffie- Hellman and ECC. If large quantum computers can be built, then these ciphers become useless. It is estimated that 2048-bit RSA keys could be broken on a quantum computer comprising 4,000 qubits and 100 million gates. Experts speculate that quantum computers of this size may be available within the next years. There do exist some public-key algorithms that do not appear to be vulnerable to attack by quantum computers, although none of them is as well-studied as the ones in common use today. Many of the public-key systems based upon the lattice reduction problem, such as schemes whose basic elements are polynomials, appear to resist quantum attacks. In fact, the American National Standards Institute is developing a standard for a polynomial-based public key establishment protocol, with just this possibility in mind. Ralph Merkle, in some of his pioneering work on public-key cryptography, has also developed algorithms that appear to be invulnerable to the quantum computational model. These include his puzzle scheme for key agreement and his one-time signature scheme that uses just hash functions to create signatures Entrust, Inc. All rights reserved. Page 4
8 None of these options has been the subject of enough practical research to be implemented with confidence today. But, given the long timeframe that appears to be available for their development, these, and other algorithms, will certainly be ready for prime-time before current methods are rendered insecure. Even more certain is the possibility that symmetric-key approaches, like Kerberos, will be a practical replacement for today's public-key solutions. Quantum cryptography is another key distribution method that would be immune from quantum computing attacks, for those environments in which quantum cryptography is applicable. This is because quantum cryptography provides "absolute security. Note, however, that there are certain auxiliary operations within quantum cryptographic schemes that depend upon symmetric or public-key cryptography, and these would be impacted exactly as described above. 4 Quantum Cryptography There are two areas of cryptography that can potentially benefit from the application of quantum mechanical techniques: random number generation and key distribution. Random Number Generation Many of the processes that we commonly think of as random are not truly random at all: we merely lack the data or computing power to predict their future values. For instance, if we had sufficient information about a piece of buttered toast falling toward a carpeted floor we would be able to predict whether it will land butter-side down or butter-side up. (In actuality, Murphy's Law governs the situation, and the toast will always land butter-side down.) Quantum processes on the other hand are truly random. No amount of computing power will enable us to make predictions about their future values. Most cryptographic mechanisms use keys to protect either the confidentiality or integrity of data. These keys must be unpredictable to an attacker, so they are usually produced by a random process. But, it is very difficult to demonstrate the amount of entropy exhibited by a software-only random number generator. So, true randomness, such as that exhibited by quantum processes is of enormous interest to cryptographers. And practical ways have been found to generate random numbers using quantum mechanical processes such as tunneling and radioactive decay Entrust, Inc. All rights reserved. Page 5
9 The Key Distribution Problem The key distribution problem is encountered by any two parties that want to communicate securely. If Alice and Bob want to use a traditional block cipher and message authentication code to protect their communications, they need first of all to agree upon a key. Today, this problem is usually solved by public-key cryptography. Alice and Bob each generate a public-private key pair and register the public part with a certification authority (CA). The CA then creates a certificate for each public key and distributes it to the other. Alice and Bob can now use their own private key and the public key from the other s certificate to agree on a shared symmetric key with which to protect their communication. A number of algorithms and protocols exist for doing this, including Diffie-Hellman key agreement and RSA key transport. Public-key cryptography is currently a secure way to protect information. Using the key sizes commonly in use today, it appears infeasible for an attacker to obtain a user s private key solely by analyzing his or her public key, which is what would typically be required to break a public-key scheme. However, in theory, if sufficient computing power were available, or if a solution were to be found to the mathematical problem upon which the algorithm is based, then these schemes would be vulnerable to attack. There is no reason to believe that either of these outcomes will occur in the foreseeable future. However, since the security provided is "computational, rather than "absolute, researchers are interested in finding better approaches. The Quantum Solution Quantum cryptography is not a new cipher and it does not completely replace all uses of symmetric and public-key cryptography. It does, however, provide a radically different approach to the key distribution problem. Like public-key cryptography, it allows Alice and Bob to securely agree on a key over an insecure channel. The key can then be used in a conventional symmetric cipher, message authentication code or one-time-pad. Quantum cryptography provides absolute security because, unlike traditional cryptographic schemes that are based upon hard mathematical problems, it is based on a physical law known as the Heisenberg Uncertainty Principle. In its original formulation, this law states that a particle's measured position and momentum cannot both be known with arbitrary precision. That is, the more certainty there is about a particle s position, the more uncertainty there is about its momentum, and vice versa. Heisenberg's uncertainty principle has since been generalized to cover other pairs of properties such as energy and time, horizontal and vertical polarizations, etc. Each of these pairs of properties is known as a conjugate variable and each has the property that the more precisely one knows one of the properties, the less precisely one can know the other. Musical Analogy Consider a musical sound. It is not possible to measure both the instant in time at which a sound occurs and its pitch with exact precision. If it has a pitch, then it must have a duration, and the greater the duration, the less precisely determined is the instant of occurrence, and the more precise determined is the pitch. The converse is equally true. A similar situation exists with quantum particles. They possess both position and momentum. But, it is impossible to determine both precisely. The more precisely one knows the position, the less precisely one knows the momentum and vice-versa. This is not a consequence of inadequate measuring techniques, but a fundamental property of matter Entrust, Inc. All rights reserved. Page 6
10 Before looking at how quantum cryptography actually works, let s consider an analogous model. Alice wants to agree upon a 1-bit value with Bob (if she wants to exchange a larger value, she can simply repeat the procedure the required number of times). Alice has a box with two compartments. She puts a coin in each compartment. The compartments are constructed in such a way that they can be opened individually, but there is an interlock that prevents them both being open at the same time. Furthermore, when one compartment is opened, the floor of the other compartment jumps, so that the coin in that compartment flips and lands randomly on either heads or tails. In order to send a 1-bit value to Bob, Alice chooses one of the compartments at random and places a coin in it so that the visible face represents the value she wants to send. She then puts another coin in the other compartment with a random face uppermost. On receiving the box, Bob guesses which compartment Alice used for the significant coin, he opens it and reads the value. If he opens the wrong compartment he will get a random value and the value that Alice intended to send him will be lost forever. Similarly, an attacker that doesn t know which compartment to open will have a chance of opening the wrong compartment and reading the random value. If the attacker then passes the box along to Bob, there is a chance that she will have changed the value being exchanged to a completely random value, thereby introducing an error. After Alice sends the box multiple times, she and Bob compare the compartment in which she placed the coin with the one that he opened each time, and they discard the results for which Bob guessed wrongly. Even if an attacker were to eavesdrop on this conversation, the odds are against her having made the same choices as Bob for all bits, and so there will almost certainly be errors in the bit sequence she obtains. Also, the bit sequence received by Bob will have been corrupted. So, he and Alice only have to compare some subset of bits to discover that the exchange has been compromised. Quantum cryptography works in a similar way. Using as an example polarized photons, the polarization state can be represented using either the rectilinear basis of vertical and horizontal polarization or the diagonal basis of 45 and 135. Alice creates a random bit and randomly selects one of the two bases (rectilinear or diagonal) in which to transmit it. She then prepares a photon polarization state depending both on the bit value and the basis and transmits the photon to Bob. This process is then repeated for each bit in the sequence. According to the laws of quantum mechanics, there is no possible measurement that can distinguish between the four different polarization states, as they are not all orthogonal. The only measurement possible is between any two orthogonal states (a basis), so, for example, measuring in the rectilinear basis will give a result of horizontal or vertical. If the photon was created as horizontally or vertically polarized then this will measure the correct state, but if it was created as 45 or 135, then the rectilinear measurement will instead return either horizontal or vertical at random. Furthermore, after this measurement, the photon will be polarized in the state in which it was measured (horizontal or vertical), with all information about its initial polarization lost. An attacker could attempt to measure the photon polarization and decode the bit values. However, like Bob, she will not know which basis Alice used. The attacker will not be able to measure those polarizations that she guesses incorrectly and, thus, will necessarily introduce errors into the sequence, just as if she had opened the wrong compartment of our fictitious box. Alice and Bob can detect these errors by publicly comparing some number of the exchanged values and rejecting the key stream if a significant number are in error. So, according to the laws of quantum physics the attack will be detected and the sequence can be discarded Entrust, Inc. All rights reserved. Page 7
11 Quantum vs. Public-Key Cryptography Quantum cryptography is practical today. It has been implemented and keys have been exchanged over distances of greater than 100 km/62.1 miles. Key agreement is possible at rates of about 2 kilobits per second; and not just in the laboratory. There are commercial companies that are currently selling equipment to perform quantum key distribution along the lines described above. The story behind quantum cryptography is very attractive. However, there are a few details that limit its widespread application. To begin with, notice that in order for Alice and Bob to agree upon the basis that was encoded or to detect errors introduced by an attacker, they need to communicate over an authentic channel. Confidentiality is not required, as no security is lost if the attacker can see these communications. However, they need to be sure that the attacker is not modifying the communication and thereby disguising her activities. Typically, an authentic channel is obtained by the two parties sharing a cryptographic key that can be used as part of a cryptographic integrity mechanism. Thus, Alice and Bob will usually need to have some previously shared information in order to use quantum key distribution in a secure manner. This is actually not substantially better than the current situation of agreeing upon keys using public-key cryptography. It is also worth noting that, currently, in order for Alice to transmit a photon to Bob, both Alice and Bob must be online at the same time and they must have an unbroken, continuous communication channel (e.g., a single optical fiber) between them. Research is being conducted that may make a "quantum router" practical. Such a device would regenerate a photon, preserving its polarization. This would allow quantum cryptography to operate over a network. Regardless, a real-time communication channel is required, because currently there is no way to store the photon for measurement at a later time. Also, Alice and Bob must communicate both to agree upon the encoding basis and to detect errors after transmission and reception of the photon, but before the key is used. Thus, quantum cryptography does not lend itself to many common uses of cryptography, such as storeand-forward encryption (as is used in file encryption and secure ) and situations where there may be many intermediaries (as on the Internet). Research is continuing in order to overcome these limitations. Quantum cryptography does not, currently, provide a satisfactory method of obtaining a digital signature. Digital signatures, and the integrity and authenticity protection that they provide, are one of the most important uses of public-key cryptography. Currently proposed quantum digital signature schemes only allow signature verification by a small number of people, or they exhibit other impracticalities. Since one of the most useful properties of traditional digital signatures is their ability to be verified by anyone (e.g., on the Web), it is unlikely that quantum digital signatures, as currently envisioned, will meet people's need. Thus, it is likely that most organizations will still require public-key technology. Quantum cryptography does not appear to be practical, except in very restricted situations. It is practical for use between two fixed parties with a substantial amount of data to exchange, and with very high confidentiality requirements. So, it may find application in securing metropolitan area data links. In fact, it is believed that some national intelligence organizations have such systems in place to connect computers in different districts of the same city. However, despite all of its promise, for most common uses of cryptography, it is not likely to replace current practice in the foreseeable future Entrust, Inc. All rights reserved. Page 8
12 5 Conclusions Quantum cryptography may find application in certain specific applications. For example, in securing metropolitan area data links. However, the constraints upon its use do not make it a practical solution for many popular applications of cryptography at this time. If research into quantum routers and quantum digital signatures bears fruit, though, this situation might change. It will likely be at least five to 10 years before quantum cryptography can address these limitations. Even then, it is not clear that the marginal improvement in security will justify the cost. Quantum computing (if it were to become practical on a large scale) will cause some reengineering of current cryptographic systems. Symmetric ciphers will be weakened. But, in response we simply have to increase key sizes to restore the necessary level of security. Asymmetric ciphers (all the ones in common use, such as ECC, Diffie-Hellman, DSA and RSA) will be rendered insecure. While cryptographic researchers have good ideas about how to make asymmetric ciphers that are not vulnerable, there are no solutions suitable for deployment today. But, there will be adequate time to correct this. Fortunately for the security of many information systems, large-scale quantum computers aren't going to be practical any time soon. People have built 28-qubit machines. If and when there are machines with thousands of qubits, the kinds of development mentioned here will become practical. But it is unlikely that a 4,000-qubit quantum computer will appear without substantial warning. Developments like this are typically achieved by a slow, gradual process. Experts currently talk about the 20-year timeframe before suitable machines become available. Because of this, we expect that users of cryptographic techniques will transition to new schemes that resist quantum attacks well before their systems become vulnerable. For the time-being, Entrust is aware of and actively reviewing current developments. We thoroughly expect that the necessary cryptographic developments will be achieved in the required timeframe. 6 About Entrust Entrust [NASDAQ: ENTU] secures digital identities and information for consumers, enterprises and governments in more than 2,000 organizations spanning 60 countries. Leveraging a layered security approach to address growing risks, Entrust solutions help secure the most common digital identity and information protection pain points in an organization. These include SSL, authentication, fraud detection, shared data protection and security. For information, call , [email protected] or visit Entrust, Inc. All rights reserved. Page 9
Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell
Quantum Key Distribution as a Next-Generation Cryptographic Protocol Andrew Campbell Abstract Promising advances in the field of quantum computing indicate a growing threat to cryptographic protocols based
Quantum Computers vs. Computers Security. @veorq http://aumasson.jp
Quantum Computers vs. Computers Security @veorq http://aumasson.jp Schrodinger equation Entanglement Bell states EPR pairs Wave functions Uncertainty principle Tensor products Unitary matrices Hilbert
Introduction to Quantum Computing
Introduction to Quantum Computing Javier Enciso [email protected] Joint Advanced Student School 009 Technische Universität München April, 009 Abstract In this paper, a gentle introduction to Quantum Computing
24 th IEEE Annual Computer Communications Workshop (CCW)
24 th IEEE Annual Computer Communications Workshop (CCW) Exploration of Quantum Cryptography in Network Security Presented by Mehrdad S. Sharbaf Sharbaf & Associates Loyola Marymount University California
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions
A Fundamental Requirement for Internet Transactions May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University
QUANTUM COMPUTERS AND CRYPTOGRAPHY Mark Zhandry Stanford University Classical Encryption pk m c = E(pk,m) sk m = D(sk,c) m??? Quantum Computing Attack pk m aka Post-quantum Crypto c = E(pk,m) sk m = D(sk,c)
1.Context... 3. What is the problem with current cryptographic techniques?... 3. 2.Current Quantum Key Distribution (QKD)... 4
Page 2 Table of contents 1.Context... 3 What is the problem with current cryptographic techniques?... 3 2.Current Quantum Key Distribution (QKD)... 4 What is Quantum Cryptography?... 4 How does QKD improve
Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014
Quantum Safe Security Workgroup Presentation Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 ID Quantique Photon Counters Services Quantum Random Number Generators Technology
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions February 2005 All rights reserved. Page i Entrust is a registered trademark of Entrust,
The New Approach of Quantum Cryptography in Network Security
The New Approach of Quantum Cryptography in Network Security Avanindra Kumar Lal 1, Anju Rani 2, Dr. Shalini Sharma 3 (Avanindra kumar) Abstract There are multiple encryption techniques at present time
An Introduction to Cryptography and Digital Signatures
An Introduction to Cryptography and Digital Signatures Author: Ian Curry March 2001 Version 2.0 Copyright 2001-2003 Entrust. All rights reserved. Cryptography The concept of securing messages through
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was
Associate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Notes on Network Security Prof. Hemant K. Soni
Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Quantum Computing. Robert Sizemore
Quantum Computing Robert Sizemore Outline Introduction: What is quantum computing? What use is quantum computing? Overview of Quantum Systems Dirac notation & wave functions Two level systems Classical
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Network Security. Chapter 6 Random Number Generation
Network Security Chapter 6 Random Number Generation 1 Tasks of Key Management (1)! Generation:! It is crucial to security, that keys are generated with a truly random or at least a pseudo-random generation
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
SECURITY IN NETWORKS
SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Introduction. Digital Signature
Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology
Cryptography and Network Security Chapter 9
Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 9 Public Key Cryptography and RSA Every Egyptian received two names,
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
Network Security. Chapter 6 Random Number Generation. Prof. Dr.-Ing. Georg Carle
Network Security Chapter 6 Random Number Generation Prof. Dr.-Ing. Georg Carle Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science University of Tübingen http://net.informatik.uni-tuebingen.de/
A Probabilistic Quantum Key Transfer Protocol
A Probabilistic Quantum Key Transfer Protocol Abhishek Parakh Nebraska University Center for Information Assurance University of Nebraska at Omaha Omaha, NE 6818 Email: [email protected] August 9, 01
Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/
Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting [email protected] Copyright 2006 - The OWASP
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Quantum Safe Cryptography V1.0.0 (2014-10)
White Paper Quantum Safe Cryptography and Security; An introduction, benefits, enablers and challenges ISBN 979-10-92620-03-0 Disclaimer This document reflects the views of the authors. It does not necessarily
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
Public Key (asymmetric) Cryptography
Public-Key Cryptography UNIVERSITA DEGLI STUDI DI PARMA Dipartimento di Ingegneria dell Informazione Public Key (asymmetric) Cryptography Luca Veltri (mail.to: [email protected]) Course of Network Security,
White Paper. Enhancing Website Security with Algorithm Agility
ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Cryptography and Network Security
Cryptography and Network Security Fifth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared
A Question of Key Length
A Question of Key Length Does Size Really Matter When It Comes To Cryptography? White Paper December 7, 2015 By Alessio Di Mauro A Question of Key Length 2015 Yubico. All rights reserved. Page 1 of 10
A Simulation Game for Teaching Secure Data Communications Protocols
A Simulation Game for Teaching Secure Data Communications Protocols Leonard G. C. Hamey Department of Computing, Macquarie University, Sydney, Australia ABSTRACT With the widespread commercial use of the
Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
PowerKey Conditional Access System Phase 1.0. System Overview. Revision 1.0
PowerKey Conditional Access System Phase 1.0 System Overview Revision 1.0 Scientific-Atlanta, Inc, Unpublished Works of Scientific-Atlanta, Inc. Copyright 1997 Scientific-Atlanta, Inc. All Rights Reserved
Software Tool for Implementing RSA Algorithm
Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key
Chapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography
Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt 1 Lecture 11: Network Security Reference: Chapter 8 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
CS 161 Computer Security Spring 2010 Paxson/Wagner MT2
CS 161 Computer Security Spring 2010 Paxson/Wagner MT2 PRINT your name:, (last) SIGN your name: (first) PRINT your class account login: cs161- Your T s name: Your section time: Name of the person sitting
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
"in recognition of the services he rendered to the advancement of Physics by his discovery of energy quanta". h is the Planck constant he called it
1 2 "in recognition of the services he rendered to the advancement of Physics by his discovery of energy quanta". h is the Planck constant he called it the quantum of action 3 Newton believed in the corpuscular
Symmetric Key cryptosystem
SFWR C03: Computer Networks and Computer Security Mar 8-11 200 Lecturer: Kartik Krishnan Lectures 22-2 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single
Elements of Security
Elements of Security Dr. Bill Young Department of Computer Sciences University of Texas at Austin Last updated: April 15, 2015 Slideset 8: 1 Some Poetry Mary had a little key (It s all she could export)
Cryptography & Digital Signatures
Cryptography & Digital Signatures CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration Prof. Sloan s Slides, 2007, 2008 Robert H.
Overview of Public-Key Cryptography
CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows
CPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
Cryptography and Network Security Chapter 10
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 10 Other Public Key Cryptosystems Amongst the tribes of Central
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 1 (rev. 1) Professor M. J. Fischer September 3, 2008 1 Course Overview Lecture Notes 1 This course is
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary
Name: 1. CSE331: Introduction to Networks and Security Fall 2003 Dec. 12, 2003 1 /14 2 /16 3 /16 4 /10 5 /14 6 /5 7 /5 8 /20 9 /35.
Name: 1 CSE331: Introduction to Networks and Security Final Fall 2003 Dec. 12, 2003 1 /14 2 /16 3 /16 4 /10 5 /14 6 /5 7 /5 8 /20 9 /35 Total /135 Do not begin the exam until you are told to do so. You
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
How To Use Pretty Good Privacy (Pgp) For A Secure Communication
Cryptographic process for Cyber Safeguard by using PGP Bharatratna P. Gaikwad 1 Department of Computer Science and IT, Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India 1 ABSTRACT: Data security
Understanding Digital Certificates and Secure Sockets Layer (SSL)
Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Guide to Data Field Encryption
Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
1 Signatures vs. MACs
CS 120/ E-177: Introduction to Cryptography Salil Vadhan and Alon Rosen Nov. 22, 2006 Lecture Notes 17: Digital Signatures Recommended Reading. Katz-Lindell 10 1 Signatures vs. MACs Digital signatures
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg
Outline CSc 466/566 Computer Security 8 : Cryptography Digital Signatures Version: 2012/02/27 16:07:05 Department of Computer Science University of Arizona [email protected] Copyright c 2012 Christian
Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)
Understanding Digital Certificates and Wireless Transport Layer Security (WTLS) Author: Allan Macphee January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What
How To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
Princeton University Computer Science COS 432: Information Security (Fall 2013)
Princeton University Computer Science COS 432: Information Security (Fall 2013) This test has 13 questions worth a total of 50 points. That s a lot of questions. Work through the ones you re comfortable
Lecture 6 - Cryptography
Lecture 6 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07 Question 2 Setup: Assume you and I don t know anything about
Outline. Digital signature. Symmetric-key Cryptography. Caesar cipher. Cryptography basics Digital signature
Outline Digital signature Cryptography basics Digital signature Dr. László Daragó, Ph.D. Associate professor Cryptography Cryptography encryption decryption Symmetric-key Cryptography Encryption with a
IronKey Data Encryption Methods
IronKey Data Encryption Methods An IronKey Technical Brief November 2007 Information Depth:Technical Introduction IronKey is dedicated to building the world s most secure fl ash drives. Our dedication
Lukasz Pater CMMS Administrator and Developer
Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign
Network Security: Cryptography CS/SS G513 S.K. Sahay
Network Security: Cryptography CS/SS G513 S.K. Sahay BITS-Pilani, K.K. Birla Goa Campus, Goa S.K. Sahay Network Security: Cryptography 1 Introduction Network security: measure to protect data/information
