BRIEF INTRODUCTION TO CRYPTOGRAPHY. By PAGVAC. February 8, 2004



Similar documents
PayFlex FTP - Wired Commute

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

An Introduction to Cryptography and Digital Signatures

How to use PGP Encryption with iscribe

Overview Keys. Overview

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

Information Security

Savitribai Phule Pune University

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab

The Case For Secure

PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

Simple Encryption/Decryption Application

How To Protect Your From Being Hacked On A Pc Or Mac Or Ipa From Being Stolen On A Network (For A Free Download) On A Computer Or Ipo (For Free) On Your Pc Or Ipom (For An Ipo

IT Networks & Security CERT Luncheon Series: Cryptography

EDA385 Embedded Systems Design. Advanced Course

HW/Lab 1: Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am)

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

Why you need secure

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

1.2 Using the GPG Gen key Command

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

What is network security?

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Chapter 10. Network Security

Exam Papers Encryption Project PGP Universal Server Trial Progress Report

Network Security. HIT Shimrit Tzur-David

PGP Desktop Quick Start Guide version 9.6

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Cyber Security Workshop Encryption Reference Manual

Software Tool for Implementing RSA Algorithm

1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works.

SFWR ENG 4C03 - Computer Networks & Computer Security

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Security: PGP (Pretty Good Privacy) & PEM (Privacy-Enhanced Mail)

cipher: the algorithm or function used for encryption and decryption

7 Key Management and PKIs

Cryptography & Digital Signatures

Why Johnny Can't Encrypt: A Usability Study of PGP

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

TELE 301 Network Management. Lecture 18: Network Security

Taxonomy of Security Protocol

End User Encryption Key Protection Policy

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

The science of encryption: prime numbers and mod n arithmetic

RSA Encryption. Tom Davis October 10, 2003

Application Layer (1)

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

Chapter 10. e-payments

OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH

Security in Distributed Systems. Network Security

BCTextEncoder Help File

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

PGP Encryption Software

Application Layer (1)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

SECURITY IN NETWORKS

A Question of Key Length

Pretty Good Privacy (PGP)

Chapter 7: Network security

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Secure Network Communication Based on Text-to-Image Encryption

Network Security - ISA 656 Security

CSE/EE 461 Lecture 23

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Instructions on TLS/SSL Certificates on Yealink Phones

Evaluation of the RC4 Algorithm for Data Encryption

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

INTRODUCTION TO CRYPTOGRAPHY

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Content Teaching Academy at James Madison University

Symmetric Key cryptosystem

This guide will go through the common ways that a user can make their computer more secure.

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

Network Security. Network Security. Security in Computer Networks

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur

Page 1. Session Overview: Cryptography

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin.

How To Encrypt Data With Encryption

Symmetric and Public-key Crypto Due April , 11:59PM

Insight Guide. Encryption: A Guide

GPG installation and configuration

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Outline. Digital signature. Symmetric-key Cryptography. Caesar cipher. Cryptography basics Digital signature

Lecture 6 - Cryptography

Transcription:

BRIEF INTRODUCTION TO CRYPTOGRAPHY By PAGVAC February 8, 2004 What will I learn from this file? What cryptography is How encryption and decryption works Cryptography terms Symmetric cryptography Asymmetric cryptography PGP

Brief Introduction to Cryptography Cryptography is the art and science of keeping messages secure. When we say messages we could be referring to plain text files as well as any other types of files such as executable files. Basically, the point of cryptography is to allow any user to keep his data secure and not readable from not desired individuals. Before we examine how it works we need to be familiar with certain terms. In order to fully understand some cryptography-related terms, we are going to use the following example. Imagine that you were to send an attached text file by email to your boss. Suppose that the information you are sending him is quite sensitive and it is extremely important to you that only your boss gets to read the message. So, what you do is that you get the text file where that information is. This text file at this point is readable and therefore unsecured. In cryptography we call this the plaintext file. So now you need to make the plaintext file unreadable. This is called encrypting the data and the result is the ciphertext file (encrypted file). The cyphertext file cannot be read and it looks as a sequence of non-sense characters. Only if you decrypt the file you will be able to read it. After you email the cyphertext file to you boss then he would decrypt it, which means that he would convert it back to its plaintext form so he could read it. The following diagram (Figure 1) illustrates the encryption/decryption process. Figure 1

Now you must be wondering why would only your boss decrypt your ciphertext file and not someone else. How do I make sure that only my boss can decrypt the ciphertext file? Smart question. In order for only a specific person to be able to decrypt a file a key is used. This key is just like a real world door key. Only the people who own the key can open the door, and at the same time you keep you key hidden from other people so that no intruders get into your house. In cryptography, this is also called a key. This key is just a sequence of characters such as firebird or this is my key. This key should only be known by the sender and the receiver, so that if an authorized user gets access to the ciphertext file he won t be able to read it since he wouldn t know the key(see Figure 2). Key Key Figure 2 The key you choose is really up to you, although you should know that the longer your key is, the harder it will be for a cryptanalyst (a ciphertext breaker) to decrypt the file. Also, the encryption algorithm used makes a difference in how hard it is to break the encryption. There are all sorts of encryption algorithms out there, although this subject is really outside the scope of this paper. Next, we will discuss the two general types of key-based algorithms: symmetric and asymmetric. In a symmetric algorithm the key used to encrypt and decrypt a certain message is the same in both cases. Since both sides have the same key we call this a

symmetric algorithm. The example discussed at the beginning of this paper uses a symmetric algorithm to encrypt and decrypt the text file sent by email. With this type of algorithms all the security relies on only one key, so it must be kept in total secret. If anyone had access to the key, he could decrypt and encrypt the message with no problem. The second type is the asymmetric algorithm, also called public-key algorithm. As you can guess from the term asymmetric now each of the two parties have a different key. So now we have two different types of keys called public and private key. The first one is used to encrypt the message, whereas the private key is used to decrypt it. The public key can be given to anyone, since all you can do is encrypt a message but never decrypt it. However, the private key should only be known by whoever is supposed to decrypt the message. Let s use an example to illustrate asymmetric-algorithm-based cryptography. We will use your boss again. Suppose that your boss now tells you that he wants to use a different type of cryptography in which only he knows the key to decrypt the messages that he receives. So you talk to him about asymmetric cryptography and he likes the concept. So now, your boss has a private key that is only known by him. He uses this key to decrypt messages that his employees send to him. On the other hand, his employees will use the public key in order to encrypt the messages (see Figure 3). Any of his employees will be able to encrypt a message in order to send it to their boss, but only their boss will be able to decrypt it and therefore be able to read the message, since only he knows the private key. Public Key Private Key Figure 3

With this small but important background in mind you should be able to start encrypting and decrypting your own data. Which tool to choose is really up to you. There are tons of encryption/decryption tools out there, but with no doubt the most popular one is PGP (Pretty Good Privacy). You can find many different versions of PGP at http://www.pgpi.org/. If you are looking for a user-friendly version of PGP you might want to try PGP Desktop. PGP Desktop has mainly three parts: PGPkeys, PGPmail, and PGPdisk. PGPkeys allows you to create your personal key pairs (public and private keys). With PGPmail you can encrypt email messages. Finally PGPdisk allows you to encrypt portions of your hard drive so that sensitive data can only be accessed by you. There are also other secondary tasks you can perform with PGP Desktop such as securing your ICQ communications, completely deleting files (Windows by itself does not truly delete files), and create self-decrypting archives.