Sunteți pe pagina 1din 12

Kaizen 2006 - 2007

Unit 3- Encryption
Basics
• Definition of Terms
– Plain Text
– Encryption Key
– Cipher Text
• Public Key Encryption
• Public Key Encryption Algorithms
• Digital Signatures and Certificates
• Public Key Infrastructure (PKI)
• Public Security Issues of Strong Encryption
• The Academic Angle
MIDTERM
Kaizen 2006 - 2007

Objectives
• Define terms used in encryption
• Identify the different encryption
algorithms.
• Analyze how symmetric key
encryption and asymmetric key
encryption works.
• Determine public security issues in
encryption.
• Explain the academic angle in
encryption.
Encryption Basics
Kaizen 2006 - 2007

Encryption Basics
• A readable message is called plaintext.
• An encryption key is a formula used to make plaintext
unreadable.
• The coded message is called ciphertext.
• An encryption technique called rot-13 is used in chat
rooms and Usenet discussions.
• Symmetric key encryption algorithms are encryption
techniques that use the same key to encrypt and
decrypt a message.
• Data Encryption Standard (DES) is a commonly used
encryption system.

Encryption Basics
Kaizen 2006 - 2007

The Problem of Key


Interception
• Rot-13 is not a secure encryption
system.
• Symmetric key encryption systems are
vulnerable to key interception, or
having their key stolen.
• Banks and military agencies use a
complex encryption system called
strong encryption.

Encryption Basics
Kaizen 2006 - 2007

Public Key Encryption


• Public key encryption uses two different keys.
– Public key is the encryption key.
– Private key is the decryption key.
• They are used in e-commerce transactions.
• A secure channel for information is provided when the
keys are used.
• The encryption keys are computationally intensive,
they place a heavy burden on the CPU.
• They are vulnerable to cryptanalysis, or code
breaking.
• Key length is the length (in bits) of an encryption key.
Encryption Basics
Kaizen 2006 - 2007

Public Key Encryption


Algorithms
• Numerous public key encryption
algorithms have been developed.
– Diffie-Hellman algorithm
– RSA encryption algorithm
– Fortezza

Encryption Basics
Kaizen 2006 - 2007

Digital Signatures and


Certificates
• Digital signatures are a technique used to
guarantee that a message has not been
tampered with.
• Digital certificates are a technique used to
validate one’s identity.
• Digital signatures are used with non-
encrypted and encrypted messages.
• A hash key, a mathematical value, is used to
describe the message’s content.
• Digital certificates can be obtained from a
certificate authority (CA).
Encryption Basics
Kaizen 2006 - 2007

Public Key Infrastructure


(PKI)
• A public key infrastructure is a
uniform set of encryption
standards that specify how public
key encryption, digital signatures,
and digital certificates should be
implemented.

Encryption Basics
Kaizen 2006 - 2007

Public Security Issues of


Strong Encryption
• Encryption can be used for illegal means as
well as legitimate means.
• Encryption will devastate law enforcement’s
ability to fight crime.
• Public key encryption can also be used in
telephone conversations.
• Law enforcement agencies are asking for
laws enabling them to eavesdrop on
encrypted messages.
– Clipper Chip
– Key escrow plan
– Key recovery
Encryption Basics
Kaizen 2006 - 2007

The Academic Angle


• U.S cryptographic researchers lead the
world in cryptography.
• Companies are pressuring the researchers
to not publish their research.
• Copyright management infrastructures
(CMIs) enable vendors of digital media to
track and control the use and copying of their
products.
• The Digital Millennium Copyright Act (DMCA)
imposes stiff penalties for anyone divulging
information about how CMI works.
Encryption Basics
Kaizen 2006 - 2007

Summary
1. Public key encryption uses an
encryption key and a decryption key.
2. Security agencies fear that public
key encryption will prevent them
from detecting illegal activities.
3. The longer the key length, the
stronger the encryption.
4. A public key infrastructure is a set of
uniform encryption standards.
Encryption Basics
Kaizen 2006 - 2007

Evaluation
• Encrypt the following using shift by 5
formula:
– ETHICS
– ENCRYPTION
– TEXT
• How does encryption protects
information?
• Give at least three importance of
encryption.
Encryption Basics

S-ar putea să vă placă și