SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Security Systems for Digital Data Big Brother is watching YOU Bernhard Hofer 03/10/2008 CIST 3100 - Organizations, Applications & Technology
Table of contents ,[object Object],[object Object],[object Object],[object Object],[object Object]
Beginning of cryptography ,[object Object],[object Object],enlarge image
Page  H  E  L  P  M E  I  A  M  … wood cylinder strip of paper
Terminology (I) ,[object Object],kryptós, „hidden“ graphéin, „to write“ „ secret writing“
Terminology (II) Hello, this is my first english pres at UNO …  plaintext  (ordinary information) encryption  (converting plaintext) decryption  (reverse process) H?$% /&!!““=  )(/&%ded die=? 30((&% ?$$?) …  ciphertext  (unreadable plaintext) cipher key +
Table of contents ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cryptography nowadays (I) ,[object Object],[object Object]
[object Object],Cryptography nowadays (II)
[object Object],Cryptography nowadays (III)
Cryptography nowadays (IV) Key Server in a so called Trust Center Player 1 Player 2 public key private key …  delivering message !! Authentication Problem !! Player 2 doesn‘t know, who sent the message!?! Everybody knows the public key from Player 2! …  wants to deliver a SECURE message encrypting … decrypting …
Cryptography nowadays (VI) Key Server in a so called Trust Center Player 1 Player 2 public key private key …  delivering message !! Confidentiality Problem !! Player 2 knows, who sent the message! But: Everybody could decrypt the message from Player 1! continue pres. …  wants to deliver a SECURE message encrypting … decrypting …
[object Object],Cryptography nowadays (VIII)
Table of contents ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],Big Brother www (I)
[object Object],Big Brother www (II)
[object Object],Big Brother www (III)
[object Object],!! YOUR PASSWORD !! Big Brother www (IV)
cost increases per power (10.000 $, 100.000 $, 1.000.000 $, …) Key length in Bit Codebreaking timetable
Table of contents ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],Quantum cryptography (I)
[object Object],[object Object],Quantum cryptography (II)
Table of contents ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],Bernhard Hofer CIST 3100 - Organizations, Applications & Technology Thank you...

Weitere ähnliche Inhalte

Was ist angesagt?

Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
Prasad Prabhu
 
Computer network
Computer networkComputer network
Computer network
snegacmr
 
Group Presentation Slide Week13
Group Presentation Slide Week13Group Presentation Slide Week13
Group Presentation Slide Week13
Yorito Tamura
 

Was ist angesagt? (19)

Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
The des algorithm illustrated
The des algorithm illustratedThe des algorithm illustrated
The des algorithm illustrated
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
DES
DESDES
DES
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DES
 
Encryption
EncryptionEncryption
Encryption
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Computer network
Computer networkComputer network
Computer network
 
Asymmetric key
Asymmetric key Asymmetric key
Asymmetric key
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
WHAT IS CRYPTOGRAPHY - A COMPREHENSIVE GUIDE
WHAT IS CRYPTOGRAPHY - A COMPREHENSIVE GUIDEWHAT IS CRYPTOGRAPHY - A COMPREHENSIVE GUIDE
WHAT IS CRYPTOGRAPHY - A COMPREHENSIVE GUIDE
 
Network Security(Symmetric Ciphers)
Network Security(Symmetric Ciphers)Network Security(Symmetric Ciphers)
Network Security(Symmetric Ciphers)
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Group Presentation Slide Week13
Group Presentation Slide Week13Group Presentation Slide Week13
Group Presentation Slide Week13
 
Blow fish final ppt
Blow fish final pptBlow fish final ppt
Blow fish final ppt
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 

Andere mochten auch (7)

Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
ECS
ECSECS
ECS
 
Electronic clearing service (ecs)
Electronic clearing service (ecs)Electronic clearing service (ecs)
Electronic clearing service (ecs)
 
Real Time Gross Settlement
Real Time Gross SettlementReal Time Gross Settlement
Real Time Gross Settlement
 
RTGS
RTGSRTGS
RTGS
 
Neft&rtgs
Neft&rtgsNeft&rtgs
Neft&rtgs
 
Neft and rtgs
Neft and rtgsNeft and rtgs
Neft and rtgs
 

Ähnlich wie Security Systems for Digital Data

Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.SrinivasanMathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
municsaa
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
ijcisjournal
 
How encryption works
How encryption worksHow encryption works
How encryption works
Mariko Saitoh
 

Ähnlich wie Security Systems for Digital Data (20)

Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Rothke Info Security Canada 2007 Final
Rothke   Info Security Canada 2007 FinalRothke   Info Security Canada 2007 Final
Rothke Info Security Canada 2007 Final
 
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.SrinivasanMathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comHow Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Cryptography
CryptographyCryptography
Cryptography
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
 
Sw week12
Sw week12Sw week12
Sw week12
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Brucon presentation
Brucon presentationBrucon presentation
Brucon presentation
 
Evolution of information security
Evolution of information securityEvolution of information security
Evolution of information security
 
Week12
Week12Week12
Week12
 
POST-QUANTUM CRYPTOGRAPHY
POST-QUANTUM CRYPTOGRAPHYPOST-QUANTUM CRYPTOGRAPHY
POST-QUANTUM CRYPTOGRAPHY
 
A TLS Story
A TLS StoryA TLS Story
A TLS Story
 
Evolution of Network, Internet, Security and Public cryptography
Evolution of Network, Internet, Security and Public cryptographyEvolution of Network, Internet, Security and Public cryptography
Evolution of Network, Internet, Security and Public cryptography
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography works
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Security Systems for Digital Data

  • 1. Security Systems for Digital Data Big Brother is watching YOU Bernhard Hofer 03/10/2008 CIST 3100 - Organizations, Applications & Technology
  • 2.
  • 3.
  • 4. Page H E L P M E I A M … wood cylinder strip of paper
  • 5.
  • 6. Terminology (II) Hello, this is my first english pres at UNO … plaintext (ordinary information) encryption (converting plaintext) decryption (reverse process) H?$% /&!!““= )(/&%ded die=? 30((&% ?$$?) … ciphertext (unreadable plaintext) cipher key +
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Cryptography nowadays (IV) Key Server in a so called Trust Center Player 1 Player 2 public key private key … delivering message !! Authentication Problem !! Player 2 doesn‘t know, who sent the message!?! Everybody knows the public key from Player 2! … wants to deliver a SECURE message encrypting … decrypting …
  • 12. Cryptography nowadays (VI) Key Server in a so called Trust Center Player 1 Player 2 public key private key … delivering message !! Confidentiality Problem !! Player 2 knows, who sent the message! But: Everybody could decrypt the message from Player 1! continue pres. … wants to deliver a SECURE message encrypting … decrypting …
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. cost increases per power (10.000 $, 100.000 $, 1.000.000 $, …) Key length in Bit Codebreaking timetable
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.