11
Computer encryption is… Computer encryption is… Based on the Based on the science of science of cryptography cryptography

Computer encryption is… Based on the science of cryptography

Embed Size (px)

Citation preview

Page 1: Computer encryption is… Based on the science of cryptography

Computer encryption is…Computer encryption is…

Based on the Based on the science of science of

cryptographycryptography

Page 2: Computer encryption is… Based on the science of cryptography

Encryption Padlock AnalogyEncryption Padlock Analogy

Anybody can lock a padlock…

but, it takes a key to unlock it!

Page 3: Computer encryption is… Based on the science of cryptography

Symmetric key encryptionSymmetric key encryption

In In encryptionencryption, the word , the word symmetricsymmetric means means those cases where those cases where the same the same keykey both both

encrypts and encrypts and decrypts. decrypts.

Page 4: Computer encryption is… Based on the science of cryptography

Asymmetric key encryptionAsymmetric key encryption

Type of encryption in Type of encryption in which an encryption which an encryption

key (the public key) is key (the public key) is used to encrypt a used to encrypt a

message, and message, and another encryption another encryption

key (the private key) key (the private key) is used to decrypt the is used to decrypt the

message. message.

Page 5: Computer encryption is… Based on the science of cryptography

Public Key SecurityPublic Key Security

SSLSSL TLSTLS (Secure Sockets Layer) (Transport Layer Security)(Secure Sockets Layer) (Transport Layer Security)

Page 6: Computer encryption is… Based on the science of cryptography

Other Security ToolsOther Security Tools Checksum Checksum CRC (Cyclic Redundancy Check)CRC (Cyclic Redundancy Check)

If a single character in the data is changed, If a single character in the data is changed, then the data has been corrupted.then the data has been corrupted.

Checksum or CRC e4d909c290d0fb1ca068ffaddf22cbd0

35d91262b3c3ec8841b54169588c97f7

Not identical

Checksum or CRC

Page 7: Computer encryption is… Based on the science of cryptography

Ciphers or codes = algorithms.Ciphers or codes = algorithms.

Most cryptography used today Most cryptography used today relies on computers relies on computers

because of thebecause of the

speed and securityspeed and security

computers providecomputers provide

in cracking codes. in cracking codes.

Page 8: Computer encryption is… Based on the science of cryptography

Hashing AlgorithmHashing Algorithm

Alice

Bob

Alice

Bob

Alice

Bob

Alice

Bob

Bob

Alice

+

+

= Different Color

= Different Color

+

+

+

+ = Same Color

= Same Color

One-way function*

*Example of two- way mathematical function = light switch.

Page 9: Computer encryption is… Based on the science of cryptography

Encryption + AuthenticationEncryption + Authentication

PasswordsPasswordsPass cardsPass cardsDigital SignaturesDigital SignaturesFingerprint scan Fingerprint scan Retina scan Retina scan Face Scan Face Scan Voice identification Voice identification

Page 10: Computer encryption is… Based on the science of cryptography

Why do we need encryption?Why do we need encryption?

•Credit-card information •Social Security numbers •Private correspondence •Personal details •Sensitive school information •Bank-account information

Page 11: Computer encryption is… Based on the science of cryptography

But wait…there’s more!But wait…there’s more!

http://btwikilmc.pbworks.com/Encryption

http://www.aptv.org/aptplus/