Cryptography and the Web - PowerPoint PPT Presentation

1 / 25
About This Presentation
Title:

Cryptography and the Web

Description:

Cryptography and the Web Lincoln Stein Whitehead Institute/MIT Center for Genome Research Cryptography The art of secret message writing. Creating texts that can only ... – PowerPoint PPT presentation

Number of Views:428
Avg rating:3.0/5.0
Slides: 26
Provided by: Author301
Category:

less

Transcript and Presenter's Notes

Title: Cryptography and the Web


1
Cryptography and the Web
  • Lincoln Stein
  • Whitehead Institute/MIT Center for Genome Research

2
Cryptography
  • The art of secret message writing.
  • Creating texts that can only be read by
    authorized individuals only.

3
Simple Cryptography
Ciphertext
the romans are coming today
Plaintext
Key
4
Caesar Cipher
ABCDEFGHIJKLMNOPQRSTUVWXYZ NOPQRSTUVWXYZABCDEFGHI
JKLM
rotate 13 positions
Plaintext
THE GOTHS COMETH
Key
13
Ciphertext
FUR TAFUE PAYRFU
5
Rotating Key Cipher
ABCDEFGHIJKLMNOPQRSTUVWXYZ BCDEFGHIJKLMNOPQRSTUVWX
YZA CDEFGHIJKLMNOPQRSTUVWXYZAB DEFGHIJKLMNOPQRSTUV
WXYZABC EFGHIJKLMNOPQRSTUVWXYZABCD FGHIJKLMNOPQRST
UVWXYZABCDE GHIJKLMNOPQRSTUVWXYZABCDEF HIJKLMNOPQR
STUVWXYZABCD...
plaintext
SOUND THE RETREAT
key
DEADFED
ciphertext
VSUPC XKG UEWWEX
6
General Principles
  • Longer keys make better ciphers
  • Random keys make better ciphers
  • Good ciphers produce random ciphertext
  • Best keys are used once and thrown away

7
Symmetric (Private Key) Cryptography
  • Examples DES, RC4, RC5, IDEA, Skipjack
  • Advantages fast, ciphertext secure
  • Disadvantages must distribute key in advance,
    key must not be divulged

8
DES Data Encryption Standard
  • Widely published used - federal standard
  • Complex series of bit substitutions, permutations
    and recombinations
  • Basic DES 56-bit keys
  • Crackable in about a day using specialized
    hardware
  • Triple DES effective 112-bit key
  • Uncrackable by known techniques

9
Asymmetric (Public Key) Cryptography
  • Examples RSA, Diffie-Hellman, ElGamal
  • Advantages public key widely distributable, does
    digital signatures
  • Disadvantages slow, key distribution

10
RSA
  • Algorithm patented by RSA Data Security
  • Uses special properties of modular arithmetic
  • C Pe (mod n)
  • P Cd (mod n)
  • e, d, and n all hundreds of digits long and
    derived from a pair of large prime numbers
  • Keys lengths from 512 to 1024 bits

11
Public Key Encryption The Frills
Frill Technique Fast encryption/decryption Digita
l envelopes Authentication of sender Digital
signature Verification of message
integrity Message digests Safe distribution of
public keys Certifying authorities
12
Digital Envelopes
13
Digital Signatures
8
8
14
Message Digests
15
Certifying Authorities
16
Hierarchy of Trust
17
Secure, Verifiable Transmission
18
Public Key Cryptography on the Web
  • Secure Socket Layer (SSL)
  • Netscape Communications Corporation
  • Secure HTTP (SHTTP)
  • Commerce Net

19
SSL and SHTTP, similarities
  • RSA public key cryptography
  • MD5 message digests
  • Variety of private key systems
  • Strong cryptography for use in U.S.
  • Weakened cryptography for export.

20
SSL and SHTTP, differences
HTTP
FTP
SHTTP
TELNET
NNTP
Application
SSL
Transport
Internet
Network interface
Physical Layer
21
Using SSL
22
Signed Certificate
23
Applying for a Server Certificate
24
Filling out Certificate Request
25
URLs
  • SSL Protocol
  • http//home.netscape.com/newsref/std/SSL.html
  • SHTTP Protocol
  • http//www.eit.com/projects/s-http/
  • Verisign
  • http//www.verisign.com/
  • RSA Data Security
  • http//www.rsa.com/
Write a Comment
User Comments (0)
About PowerShow.com