Cryptography & Network Security
Dakota State University
Distance Education Grant
Dr. Bill Figg
Introduction
The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable.
—The Art of War, Sun Tzu
Bill Figg
2
Security Services
Bill Figg
3
Security Services (X.800)
Bill Figg
4
Security Mechanisms (X.800)
Bill Figg
5
Classify Security Attacks
Bill Figg
6
Types of Attacks
Bill Figg
7
Classical Encryption�Techniques
Many savages at the present day regard their names as vital parts of themselves, and therefore take great pains to conceal their real names, lest these should give to evil-disposed persons a handle by which to injure their owners. —The Golden Bough, Sir James George Frazer
Bill Figg
8
Symmetric Encryption
Bill Figg
9
Symmetric Cipher Model
Bill Figg
10
Cryptography
Bill Figg
11
Types of Cryptanalytic Attacks
Bill Figg
12
Caesar Cipher
meet me after the toga party
PHHW PH DIWHU WKH WRJD SDUWB
Bill Figg
13
Cryptanalysis of Caesar Cipher
Bill Figg
14
Language Redundancy and Cryptanalysis
Bill Figg
15
Encrypting and Decrypting
Bill Figg
16
Polyalphabetic Ciphers
Bill Figg
17
One-Time Pad
Bill Figg
18
Transposition Ciphers
Bill Figg
19
Row Transposition Ciphers
Key: 3 4 2 1 5 6 7
Plaintext: a t t a c k p
o s t p o n e
d u n t i l t
w o a m x y z
Ciphertext: TTNAAPTMTSUOAODWCOIXKNLYPETZ
Bill Figg
20
Steganography
Bill Figg
21
Block vs Stream Ciphers
Bill Figg
22
Confusion and Diffusion
Bill Figg
23
Feistel Cipher Structure
Bill Figg
24
Differential Cryptanalysis
Bill Figg
25
Linear Cryptanalysis
Bill Figg
26
Electronic Codebook Book (ECB)
Ci = DESK1 (Pi)
Bill Figg
27
AES Evaluation Criteria
Bill Figg
28
The AES Cipher - Rijndael
Bill Figg
29
AES Decryption
Bill Figg
30
Triple-DES with Two-Keys
Bill Figg
31
Triple-DES with Three-Keys
Bill Figg
32
Confidentiality using Symmetric Encryption
Bill Figg
33
Placement of Encryption
Bill Figg
34
Key Distribution
Bill Figg
35
Key Distribution
Bill Figg
36
Key Distribution Scenario
Bill Figg
37
Key Distribution Issues
Bill Figg
38
Random Numbers
Bill Figg
39
Private-Key Cryptography
Bill Figg
40
Public-Key Cryptography
Bill Figg
41
Public-Key Cryptography
Bill Figg
42
Public-Key Cryptography
Bill Figg
43
Public-Key Characteristics
Bill Figg
44
Key Management
Bill Figg
45
Public-Key Certificates
Bill Figg
46
Message Authentication Code (MAC)
Bill Figg
47
Hash Functions
Bill Figg
48
Keyed Hash Functions as MACs
KeyedHash = Hash(Key|Message)
Bill Figg
49
Digital Signature Properties
Bill Figg
50
Arbitrated Digital Signatures
Bill Figg
51
Authentication Protocols
Bill Figg
52
Digital Signature Standard (DSS)
Bill Figg
53
DSA Signature Creation
r = (gk(mod p))(mod q)
s = (k-1.SHA(M)+ x.r)(mod q)
Bill Figg
54
Web Security
Bill Figg
55
SSL (Secure Socket Layer)
Bill Figg
56
SSL Handshake Protocol
Bill Figg
57
What is a Firewall?
Bill Figg
58
Firewalls – Packet Filters
Bill Figg
59
Firewalls – Packet Filters
Bill Figg
60
Firewall Configurations
Bill Figg
61
Trusted Computer Systems
Bill Figg
62
Summary
Bill Figg
63