1. Trang chủ
  2. » Kinh Doanh - Tiếp Thị

Information systems slide introduction to encryption technologies

18 159 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 18
Dung lượng 203,5 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Example: Encrypted E-MailThe plaintext message is run through a hash algorithm to generate a “fingerprint”.. Example: Encrypted E-MailThe fingerprint is encrypted using Anne’s private ke

Trang 1

Introduction to

Encryption Technology

Mort Anvari

Trang 2

What is it?

- The conversion of data into a form that cannot

be easily understood by unauthorized people

- The opposite is decryption, that is, changing the difficult to read form back into the original

- It’s usually software, but can be hardware

Trang 3

- What does it do for me?

- Symmetric Encryption

- Asymmetric Encryption

- One Way Hash

- Example: An Encrypted E-Mail

Trang 4

What does it do for me?

Confidentiality: The data can only be read

by the intended recipients

Non-Repudiation: The data cannot be

forged If data is “signed” by a person, the data could only have come from

them No more “I didn’t send that!”

Data Integrity: The data cannot be

modified without detection

Trang 5

Symmetric Encryption

- Data is encrypted and decrypted with the same key

- Fast

- Key must be kept secret

- Key must be sent Out of Band

- DES and IDEA are symmetric

Trang 6

Asymmetric Encryption

- Uses 2 keys

- Data encrypted with one key can only be decrypted with the other

- Public key is shared with all

- Public key can be sent In Band

- Private key must be kept secret

- RSA is asymmetric

Trang 7

One Way Hash

- A “fingerprint” of data

- Any size data = same size hash

- Tiny changes in data produce

a very different hash

Trang 8

Example: Encrypted E-Mail

Anne wants to send e-mail to Bob The plaintext message compressed to make

it smaller and the ciphertext stronger

Plaintext

Trang 9

Example: Encrypted E-Mail

The plaintext message is run through a hash algorithm to generate a

“fingerprint”

Small Plaintext Hash Function Fingerprint

Trang 10

Example: Encrypted E-Mail

The fingerprint is encrypted using

Anne’s private key This makes it into a digital signature It is then appended to the plaintext

Anne’s Private

Key

Small Plaintext Signature Fingerprint

Trang 11

Example: Encrypted E-Mail

A Random key is generated and the e-mail is symmetrically encrypted using that

Small Plaintext Random Key

Ciphertext Encrypted with Random

Trang 12

Example: Encrypted E-Mail

The Random Key is Encrypted using Bob’s public key The result is called a

“Strong Box” Remember that only Bob can read the contents of the Box

Bob’s Public

Key

Random Key

Random Key

A Box for Bob

Trang 13

Random Key

A Box for Bob

Example: Encrypted E-Mail

The Box is attached to the ciphertext and they are sent over e-mail to Bob

Ciphertext

Encrypted

with

Trang 14

Example: Encrypted E-Mail

Bob decrypts his Strong Box to get the Random Key Only Bob’s private key

can open the Box which was encrypted with his public key

Bob’s Private

Random Key

A Box for Bob

Trang 15

Example: Encrypted E-Mail

Bob decrypts the ciphertext using the random key which he got from his

Strong Box

Random Key

Ciphertext

Encrypted

with Random

Small Plaintext

Trang 16

Example: Encrypted E-Mail

Bob decrypts Anne’s signature using her public key Since only Anne could have encrypted it with her private key, Bob knows the message had to come from her

Anne’s Public

Key

Trang 17

Example: Encrypted E-Mail

Bob runs the unencrypted message

through the hash function If this

fingerprint is the same as the one from the signature, the message was not

changed in transit

Small

Calculated Fingerprint

or

Trang 18

Example: Encrypted E-Mail

Finally, the message is uncompressed Bob can read the message knowing for certain that it’s from Anne, it’s what

Anne wrote and only the two of them

could have read it

Plaintext

Ngày đăng: 08/01/2018, 10:38

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

  • Đang cập nhật ...

TÀI LIỆU LIÊN QUAN