1 / 15

Using Cryptography to Protect Data in Computer Networks: case study

Using Cryptography to Protect Data in Computer Networks: case study. Vsevolod Ievgiienko National Taras Shevchenko University of Kiev Faculty of Cybernetics Ukraine. Introduction. Information security Business Banks Online payments Individual persons. Introduction.

nevan
Download Presentation

Using Cryptography to Protect Data in Computer Networks: case study

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Using Cryptography to Protect Data in Computer Networks: case study Vsevolod Ievgiienko National Taras Shevchenko University of Kiev Faculty of Cybernetics Ukraine

  2. Introduction Information security • Business • Banks • Online payments • Individual persons

  3. Introduction Computer System Reliability Security Safety … Cryptography … …

  4. Security • Security is considered as a part of reliability and survivability problem • “Who watches the watchmen?”

  5. Safety Optimization problem • x - system configuration • C - system cost • R - system reliability index • S - system safety index

  6. Information security problems Types of violations • Disconnection • Interception • Modification • Falsification

  7. Information security problems Violations Active Passive - imitation - stream analysis - recreation - modification - hindering in service

  8. Information security problems System security services • Confidentiality • Authentication • Integrity • Impossibility ofrefuse

  9. Algorithms Symmetric (DES, AES, Blowfish, Serpent, Twofish) • E – encryption • D – decryption • К – secret key • М – message • С – encrypted message

  10. Algorithms Asymmetric (RSA, Elgamal, Elliptic Curves Cryptography) • E – encryption • D – decryption • КUx – public key (user X) • КRx – private key (user X) • М – message • С – encrypted message

  11. Principles of planning Principle of different types Use a few algorithms of one type that have a different structure

  12. Encryption software solution Remoteencrypted file system Secret messaging

  13. Encryption algorithms • RSA with up to 4096-bit keys • Digital signatures based on RSA • Trustedtimestamping • X.509 3-steps authentication • Blowfish with 448-bit keys • SHA-256 and SHA-512 hash functions • HMAC-SHA-256 • modified ANSI X9.17 pseudo-random numbers generator • PKCS5 for making keys from passwords • Deflate compression algorithm • CRC32 checksums • DoD-5220.22-M for data wiping

  14. Sources • “Reliability: past, present, future”, I. Ushakov • “Applied Cryptography”, B. Schneier • “Handbook of Applied Cryptography”, A. Menezes, P. van Oorschot, S. Vanstone • www.wasm.ru/forum • www.pgpru.com • www.pgp.com • www.gnupg.org • www.cipherwall.com • http://www.financialcryptography.com • http://www.schneier.com

  15. THE END Questions? Contacts: E-mail:admin@rest-company.kiev.ua Tel: +38050-3-555-999 ICQ: 333269

More Related