SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Network Security:   Standards and   Cryptography Jack Davis
The Absolute Minimum Every Software Developer Absolutely, Positively Must Know About Network Data Security (No Excuses!)
Too Frequent “ Bank of America says at least 1.2 million federal employee credit card accounts may be exposed to theft or hacking.”   Time, Feb 25, 2005 “ 40M credit cards hacked Breach at third party payment processor affects 22 million Visa cards and 14 million MasterCards.” CNN Money, July 27, 2005 “ Data Losses Hit Four More Another day, another security breach: In the last 48 hours, Visa, Wachovia, Equifax, and the U.S. Department of Agriculture have joined a growing list ….”   June 22, 2006   http://www.privacyrights.org/ar/ChronDataBreaches.htm
Technical Pillars of Data Security ,[object Object],[object Object],[object Object],[object Object],Data Integrity Information Protection ,[object Object],[object Object],[object Object],[object Object]
Data Integrity ,[object Object],[object Object],How can we know if data transferred across a network or stored on server hasn’t changed? Changes to data can occur either due to:
Data Integrity ,[object Object],[object Object],Checksums and CRCs Opps
Checksums and CRCs ,[object Object],[object Object],[object Object],[object Object],[object Object]
Two Types of “Hash” Functions  ,[object Object],[object Object]
Cryptographic Hash Properties ,[object Object],One Way Unique Fixed Length ,[object Object],[object Object],[object Object],[object Object]
Cryptographic Hash Examples ,[object Object],[object Object],Zero-Length Data SHA1("The quick brown fox jumps over the bog.") =  E66BEDD4 E0B96081 01F86FE8 4A9B91D2   A3EA0D14  // = 20 bytes (160 bits)   // 'b' = x62 SHA1("The quick brown fox jumps over the cog.") =  68B51796 CB6A01AF FBECA374 56C72F83   76D67BF4  // = 20 bytes (160 bits)   // 'c' = x63  1-bit change! Simple String “ Avalanche Effect”
Applications of  Cryptographic Hashes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Digital Signature using  Cryptographic Hash ,[object Object],[object Object]
Common Cryptographic Hash Algorithms MD, Message Digest SHA, Secure Hash Algorithm Hash Algorithm Hash Size bits (bytes) Date Published Collisions (Cracked) MD4 128 (16) 1990 RFC1186    MD5 128 (16) 1992 RFC1321  SHA-0 160 (20) 1993  SHA-1 160 (20) 1995 RFC3174    SHA-256 256 (32) 2002 RFC4634 SHA-512 512 (64) 2002 RFC4634
Information Protection through Data Encryption ,[object Object],[object Object],[object Object],[object Object],Symmetric-Key Encryption Asymmetric-Key Encryption Common property of encryption: Encrypted message size = Clear-text message size (There’s no size penalty for encrypting data.)
Symmetric-Key Algorithms DES, Data Encryption Standard Triple-DES, DES applied three times (key 168 bits = 3 x 56 bits) FIPS, Federal Information Processing Standard AES, Advanced Encryption Standard (more secure, 6x faster than Triple-DES) NSA rates AES-128 for “SECRET”,  AES-192 and AES-256 for “TOP SECRET”. Encryption Algorithm Key Size bits (bytes) Date Published Date Withdrawn DES 56 (7) 1976 FIPS46 1999   Triple-DES 168 (21) 1999 FIPS46-3 2005 AES 128, 192, 256 2001 FIPS197
The Problem with Symmetric-Key Encryption ,[object Object],[object Object]
Asymmetric-Key Encryption ,[object Object],[object Object],[object Object],*RSA, from last name initials of original inventors   Ron Rivest, Adi Shamir, Len Adleman.
Asymmetric-Key Creation ,[object Object],[object Object]
Sending Encrypted Data ,[object Object],[object Object],[object Object]
Encrypting Digital Signatures ,[object Object],[object Object],[object Object]
Signing a Document versus Signing a Hash ,[object Object]
The Problem with Asymmetric-Key Encryption If Asymmetric-Key Encryption is so flexible, why bother with Symmetric-Key Encryption at all? ,[object Object],[object Object]
Combining Asymmetric and Symmetric Encryption ,[object Object],[object Object],Asymmetric Encrypt Symmetric Encrypt
PGP Encryption (Pretty Good Privacy) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],RFC2440, PGP is an open standard that can be used to encrypt and decrypt data for a wide variety of uses: PGP uses a combination of Symmetric-Key cryptography together with Asymmetric-Key cryptography that use public-keys stored on publicly accessible “key servers”.
Steps in PGP Encryption/Decryption ,[object Object],[object Object],[object Object],[object Object],[object Object],(Above operations are performed automatically within PGP.)
Transport Layer Security (TLS) & Secure Sockets Layer (SSL) Protocols ,[object Object],[object Object],[object Object],[object Object],Negotiation Asymmetric Encryption Symmetric Encryption ,[object Object],[object Object],[object Object]
Security Guidelines ,[object Object],[object Object],[object Object],[object Object],[object Object]
Pillars of Data Security ,[object Object],[object Object],Data Integrity Information Protection

Weitere ähnliche Inhalte

Was ist angesagt?

Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
koolkampus
 

Was ist angesagt? (18)

Hashing Algorithm: MD5
Hashing Algorithm: MD5Hashing Algorithm: MD5
Hashing Algorithm: MD5
 
Cryptography - Simplified - Hash Functions
Cryptography - Simplified - Hash FunctionsCryptography - Simplified - Hash Functions
Cryptography - Simplified - Hash Functions
 
Survey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile CommunicationSurvey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile Communication
 
Hash Function & Analysis
Hash Function & AnalysisHash Function & Analysis
Hash Function & Analysis
 
Blind Signature Scheme
Blind Signature SchemeBlind Signature Scheme
Blind Signature Scheme
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Encryption
EncryptionEncryption
Encryption
 
Electronic Signature
Electronic SignatureElectronic Signature
Electronic Signature
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash function
 
Message Authentication: MAC, Hashes
Message Authentication: MAC, HashesMessage Authentication: MAC, Hashes
Message Authentication: MAC, Hashes
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
6.hash mac
6.hash mac6.hash mac
6.hash mac
 
Cryptographic hash function md5
Cryptographic hash function md5Cryptographic hash function md5
Cryptographic hash function md5
 
Hash Function
Hash FunctionHash Function
Hash Function
 
How does cryptography work? by Jeroen Ooms
How does cryptography work?  by Jeroen OomsHow does cryptography work?  by Jeroen Ooms
How does cryptography work? by Jeroen Ooms
 

Andere mochten auch

Grammar simply
Grammar simplyGrammar simply
Grammar simply
Gian Putra
 
Evaluation question 1[1]
Evaluation question 1[1]Evaluation question 1[1]
Evaluation question 1[1]
melvCooalge
 
Advanced-farm-management-software-farmNXT
Advanced-farm-management-software-farmNXTAdvanced-farm-management-software-farmNXT
Advanced-farm-management-software-farmNXT
Razvan Maximiuc
 
My seven questions
My seven questionsMy seven questions
My seven questions
fatzbaby
 

Andere mochten auch (20)

7 Software Development Security
7 Software Development Security7 Software Development Security
7 Software Development Security
 
Network security
Network securityNetwork security
Network security
 
Proyecto
ProyectoProyecto
Proyecto
 
Just For Kids Game
Just For Kids GameJust For Kids Game
Just For Kids Game
 
Grammar simply
Grammar simplyGrammar simply
Grammar simply
 
07 marzo 2011_sensi_feto
07 marzo 2011_sensi_feto07 marzo 2011_sensi_feto
07 marzo 2011_sensi_feto
 
07 spazio associazioni_nati_per_leggere
07 spazio associazioni_nati_per_leggere07 spazio associazioni_nati_per_leggere
07 spazio associazioni_nati_per_leggere
 
09 spazio associazioni_aibws
09 spazio associazioni_aibws09 spazio associazioni_aibws
09 spazio associazioni_aibws
 
Evaluation question 1[1]
Evaluation question 1[1]Evaluation question 1[1]
Evaluation question 1[1]
 
Advanced-farm-management-software-farmNXT
Advanced-farm-management-software-farmNXTAdvanced-farm-management-software-farmNXT
Advanced-farm-management-software-farmNXT
 
09 maggio 2011_come_mangiano_bambini
09 maggio 2011_come_mangiano_bambini09 maggio 2011_come_mangiano_bambini
09 maggio 2011_come_mangiano_bambini
 
08 aprile 2011_accudimento_mondo
08 aprile 2011_accudimento_mondo08 aprile 2011_accudimento_mondo
08 aprile 2011_accudimento_mondo
 
Naturally diamond
Naturally diamondNaturally diamond
Naturally diamond
 
09 maggio 2011_split
09 maggio 2011_split09 maggio 2011_split
09 maggio 2011_split
 
My seven questions
My seven questionsMy seven questions
My seven questions
 
Spring integration
Spring integrationSpring integration
Spring integration
 
Just For Kids Game
Just For Kids GameJust For Kids Game
Just For Kids Game
 
Just For Kids Game
Just For Kids GameJust For Kids Game
Just For Kids Game
 
Agile Project Management with Scrum (Jack Davis)
Agile Project Management with Scrum (Jack Davis)Agile Project Management with Scrum (Jack Davis)
Agile Project Management with Scrum (Jack Davis)
 
13 spazio associazione_bambiniincorso
13 spazio associazione_bambiniincorso13 spazio associazione_bambiniincorso
13 spazio associazione_bambiniincorso
 

Ähnlich wie Network Security: Standards and Cryptography

6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
 
Cryptography is the art and science of securing communication and data by con...
Cryptography is the art and science of securing communication and data by con...Cryptography is the art and science of securing communication and data by con...
Cryptography is the art and science of securing communication and data by con...
kalojo7178
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam Bowne
SecurityTube.Net
 

Ähnlich wie Network Security: Standards and Cryptography (20)

How encryption works
How encryption worksHow encryption works
How encryption works
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Security pre
Security preSecurity pre
Security pre
 
Data encryption
Data encryptionData encryption
Data encryption
 
[Wroclaw #8] TLS all the things!
[Wroclaw #8] TLS all the things![Wroclaw #8] TLS all the things!
[Wroclaw #8] TLS all the things!
 
Dnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defsDnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defs
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
Cryptography is the art and science of securing communication and data by con...
Cryptography is the art and science of securing communication and data by con...Cryptography is the art and science of securing communication and data by con...
Cryptography is the art and science of securing communication and data by con...
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
 
Information Security
Information SecurityInformation Security
Information Security
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam Bowne
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Network Security: Standards and Cryptography

  • 1. Network Security: Standards and Cryptography Jack Davis
  • 2. The Absolute Minimum Every Software Developer Absolutely, Positively Must Know About Network Data Security (No Excuses!)
  • 3. Too Frequent “ Bank of America says at least 1.2 million federal employee credit card accounts may be exposed to theft or hacking.” Time, Feb 25, 2005 “ 40M credit cards hacked Breach at third party payment processor affects 22 million Visa cards and 14 million MasterCards.” CNN Money, July 27, 2005 “ Data Losses Hit Four More Another day, another security breach: In the last 48 hours, Visa, Wachovia, Equifax, and the U.S. Department of Agriculture have joined a growing list ….” June 22, 2006 http://www.privacyrights.org/ar/ChronDataBreaches.htm
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Common Cryptographic Hash Algorithms MD, Message Digest SHA, Secure Hash Algorithm Hash Algorithm Hash Size bits (bytes) Date Published Collisions (Cracked) MD4 128 (16) 1990 RFC1186  MD5 128 (16) 1992 RFC1321  SHA-0 160 (20) 1993  SHA-1 160 (20) 1995 RFC3174  SHA-256 256 (32) 2002 RFC4634 SHA-512 512 (64) 2002 RFC4634
  • 14.
  • 15. Symmetric-Key Algorithms DES, Data Encryption Standard Triple-DES, DES applied three times (key 168 bits = 3 x 56 bits) FIPS, Federal Information Processing Standard AES, Advanced Encryption Standard (more secure, 6x faster than Triple-DES) NSA rates AES-128 for “SECRET”, AES-192 and AES-256 for “TOP SECRET”. Encryption Algorithm Key Size bits (bytes) Date Published Date Withdrawn DES 56 (7) 1976 FIPS46 1999 Triple-DES 168 (21) 1999 FIPS46-3 2005 AES 128, 192, 256 2001 FIPS197
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.

Hinweis der Redaktion

  1. Under Windows in C#, the RSA andRSACryptoServiceProvider classes provide key-pair creation and RSA encryption/decryption functionality. Symmetric encryption is supported through the DES, TripleDES, AES classes In Windows, the “sn –k <filename>” can be used to create key pairs, or programmatically through the RSA and RSACryptoProvider classes.
  2. Under Windows in C#, the RSA andRSACryptoServiceProvider classes provide key-pair creation and RSA encryption/decryption functionality. Symmetric encryption is supported through the DES, TripleDES, AES classes In Windows, the “sn –k <filename>” can be used to create key pairs, or programmatically through the RSA and RSACryptoProvider classes.
  3. Under Windows in C#, the RSA andRSACryptoServiceProvider classes provide key-pair creation and RSA encryption/decryption functionality. Symmetric encryption is supported through the DES, TripleDES, AES classes In Windows, the “sn –k <filename>” can be used to create key pairs, or programmatically through the RSA and RSACryptoProvider classes.
  4. Under Windows in C#, the RSA andRSACryptoServiceProvider classes provide key-pair creation and RSA encryption/decryption functionality. Symmetric encryption is supported through the DES, TripleDES, AES classes In Windows, the “sn –k <filename>” can be used to create key pairs, or programmatically through the RSA and RSACryptoProvider classes.
  5. Under Windows in C#, the RSA andRSACryptoServiceProvider classes provide key-pair creation and RSA encryption/decryption functionality. Symmetric encryption is supported through the DES, TripleDES, AES classes In Windows, the “sn –k <filename>” can be used to create key pairs, or programmatically through the RSA and RSACryptoProvider classes.
  6. “ Shared-Key” aka “session-key” The use of symmetric together asymmetric encryption is beneficial since symmetric encryption being 1000+ times faster than asymmetric encryption.
  7. “ Shared-Key” aka “session-key” The use of symmetric together asymmetric encryption is beneficial since symmetric encryption being 1000+ times faster than asymmetric encryption.