+ All Categories
Home > Documents > Cryptography and the Web

Cryptography and the Web

Date post: 31-Dec-2015
Category:
Upload: winter-cook
View: 21 times
Download: 1 times
Share this document with a friend
Description:
Cryptography and the Web. Lincoln Stein Whitehead Institute/MIT Center for Genome Research. Cryptography. The art of secret message writing. Creating texts that can only be read by authorized individuals only. Simple Cryptography. Ciphertext. the romans are coming today. Plaintext. Key. - PowerPoint PPT Presentation
Popular Tags:
25
Cryptography and the Web Lincoln Stein Whitehead Institute/MIT Center for Genome Research
Transcript
Page 1: Cryptography and the Web

Cryptography and the Web

Lincoln Stein

Whitehead Institute/MIT Center for Genome Research

Page 2: Cryptography and the Web

Cryptography

The art of secret message writing. Creating texts that can only be read by

authorized individuals only.

Page 3: Cryptography and the Web

Simple Cryptography

Plaintext

Key

Ciphertext

Page 4: Cryptography and the Web

Caesar Cipher

ABCDEFGHIJKLMNOPQRSTUVWXYZ

NOPQRSTUVWXYZABCDEFGHIJKLM

THE GOTHS COMETH

rotate 13 positions

FUR TAFUE PAYRFU

Plaintext

Key

Ciphertext

13

Page 5: Cryptography and the Web

ABCDEFGHIJKLMNOPQRSTUVWXYZBCDEFGHIJKLMNOPQRSTUVWXYZACDEFGHIJKLMNOPQRSTUVWXYZABDEFGHIJKLMNOPQRSTUVWXYZABCEFGHIJKLMNOPQRSTUVWXYZABCDFGHIJKLMNOPQRSTUVWXYZABCDEGHIJKLMNOPQRSTUVWXYZABCDEFHIJKLMNOPQRSTUVWXYZABCD...

Rotating Key Cipher

SOUND THE RETREAT

DEADFED

VSUPC XKG UEWWEX

plaintext

key

ciphertext

Page 6: Cryptography and the Web

General Principles

Longer keys make better ciphers Random keys make better ciphers Good ciphers produce “random” ciphertext Best keys are used once and thrown away

Page 7: Cryptography and the Web

Symmetric (Private Key) Cryptography

Examples: DES, RC4, RC5, IDEA, Skipjack Advantages: fast, ciphertext secure Disadvantages: must distribute key in

advance, key must not be divulged

Page 8: Cryptography and the Web

DES: Data Encryption Standard

Widely published & used - federal standard Complex series of bit substitutions,

permutations and recombinations Basic DES: 56-bit keys

– Crackable in about a day using specialized hardware

Triple DES: effective 112-bit key– Uncrackable by known techniques

Page 9: Cryptography and the Web

Asymmetric (Public Key) Cryptography

Examples: RSA, Diffie-Hellman, ElGamal Advantages: public key widely

distributable, does digital signatures Disadvantages: slow, key distribution

Page 10: Cryptography and the Web

RSA

Algorithm patented by RSA Data Security Uses special properties of modular

arithmetic– C = Pe (mod n)– P = Cd (mod n)– e, d, and n all hundreds of digits long and

derived from a pair of large prime numbers Keys lengths from 512 to 1024 bits

Page 11: Cryptography and the Web

Public Key Encryption: The Frills

Frill Technique

Fast encryption/decryption Digital envelopesAuthentication of sender Digital signatureVerification of message integrity Message digestsSafe distribution of public keys Certifying authorities

Page 12: Cryptography and the Web

Digital Envelopes

Page 13: Cryptography and the Web

Digital Signatures

Page 14: Cryptography and the Web

Message Digests

Page 15: Cryptography and the Web

Certifying Authorities

Page 16: Cryptography and the Web

Hierarchy of Trust

Page 17: Cryptography and the Web

Secure, Verifiable Transmission

Page 18: Cryptography and the Web

Public Key Cryptography on the Web

Secure Socket Layer (SSL)– Netscape Communications Corporation

Secure HTTP (SHTTP)– Commerce Net

Page 19: Cryptography and the Web

SSL and SHTTP, similarities

RSA public key cryptography MD5 message digests Variety of private key systems

– Strong cryptography for use in U.S.– Weakened cryptography for export.

Page 20: Cryptography and the Web

SSL and SHTTP, differences

Physical Layer

Network interface

Internet

Transport

Application

SSL

HTTP

TELNET NNTP

FTP

SHTTP

Page 21: Cryptography and the Web

Using SSL

Page 22: Cryptography and the Web

Signed Certificate

Page 23: Cryptography and the Web

Applying for a Server Certificate

Page 24: Cryptography and the Web

Filling out Certificate Request

Page 25: Cryptography and the Web

URLs

SSL Protocol– http://home.netscape.com/newsref/std/SSL.html

SHTTP Protocol– http://www.eit.com/projects/s-http/

Verisign– http://www.verisign.com/

RSA Data Security– http://www.rsa.com/


Recommended