Professional Documents
Culture Documents
Cryptography: Securing The Information Age: Source: WWW - Aep.ie/product/ Technical - HTML
Cryptography: Securing The Information Age: Source: WWW - Aep.ie/product/ Technical - HTML
Agenda
Definitions Why cryptography is important? Available technologies Benefits & problems Future of cryptography Houston resources
Information Systems Research Center
Essential Terms
Cryptography Encryption
Plain text Cipher text
Decryption
Cipher text Plain text
Cryptanalysis Cryptology
October 17, 2002
Source: http://www.unmuseum.org/enigma.jpg
Information Systems Research Center
Steganography
Cryptography
Steganography
Steganography covered writing is an art of hiding information Popular contemporary steganographic technologies hide information in images
October 17, 2002
http://www.cl.cam.ac.uk/~fapp2/steganography/image_downgrading
October 17, 2002
Recreated image
/
Information Systems Research Center
Digital Watermarks
Source: http://www.digimarc.com
October 17, 2002 Future Technology Briefing
Steganography Substitution
Cipher
Information Systems Research Center
Digital Signatures
Made by encrypting a message digest (cryptographic checksum) with the senders private key Receiver decrypts with the senders public key (roles of private and public keys are flipped)
Information Systems Research Center
PKI and CA
Digital signature does not confirm identity Public Key Infrastructure provides a trusted third partys confirmation of a senders identity Certification Authority is a trusted third party that issues identity certificates
Information Systems Research Center
</PaymentInfo>
October 17, 2002 Future Technology Briefing
(Source: http://www-106.ibm.com/developerworks/xml/library/s-xmlsec.html/index.html)
(Source: http://www-106.ibm.com/developerworks/xml/library/s-xmlsec.html/index.html)
Source: http://www.tudor-portraits.com/Mary%20Scots%20B.jpg
$250,000 machine cracks 56 bit key DES code in 56 hours IDEA, RC5, RSA, etc. resist complex attacks when properly implemented
distributed.net cracked 64 bit RC5 key (1,757 days and 331,252 people) in July, 2002
A computer that breaks DES in 1 second will take 149 trillion years to break AES! Algorithms are not theoretically unbreakable: successful attacks in the future are possible
October 17, 2002 Future Technology Briefing
What is to be done?
The Gartner Group recommends:
Houston Resources
University of Houston
Crypto courses Ernst Leiss
Companies
EDS RSA Security Schlumberger SANS Institute
Information Systems Research Center