1 / 17

Network Encryption

Network Encryption. Vince Ceccarelli Group 7 TC 200. What is Encryption?. Encryption – a process that hides the content of a message in such a way that it can be revealed through a decryption process Encryption and decryption are processes of Cryptography

deniseclark
Download Presentation

Network Encryption

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Network Encryption Vince Ceccarelli Group 7 TC 200

  2. What is Encryption? • Encryption – a process that hides the content of a message in such a way that it can be revealed through a decryption process • Encryption and decryption are processes of Cryptography • Cryptography - study of techniques using secret writing as codes or ciphers

  3. How is it done? • The cryptography process uses encryption/decryption algorithms • The algorithms use a key - a long sequence of bits (1s, 0s) • The key is used to alter the original message mathematically to create a new encrypted/decrypted message

  4. Keys • The keys provide the necessary means of protection • They must be kept secret or anyone with knowledge of them would be able to crack the decryption process with the right algorithm • In some cases two keys are used, one for encryption and one for decryption • This can make the encryption key public and the decryption key private

  5. Keys and Bits • Keys are determined by the amount of bits they have (amount of numbers) • All the possibilities of a 2-bit key: 00,01,10,11 • A 3-bit key has 8 possible values • Possible values formula • 2^n (n being the number of bits) • 40-bit key has 1.099511628E12(2^40)

  6. Types of Encryption Algorithms • RSA • DES/3DES • BLOWFISH • IDEA • SEAL • RC4

  7. RSA • Created in 1977 by Ron Rivest, Adi Shamir, and Len Adleman • Uses public and private key • Starts with 2 large prime numbers • Goes through long math process • Results in a public and private key

  8. DES/3DES • Data Encryption Standard • Developed by U.S. Government in 1977 • Uses a 56-bit key • Used in ATMs • 3DES is the same thing except it encrypts the data 3 times and uses a different key for at least one of the passes • This creates a cumulative key size of 112-168 bits

  9. BLOWFISH • Designed by Bruce Schneider in 1993 • Uses keys from 32 to 448 bits • It was a fast, free alternative to encryption algorithms when it came out

  10. IDEA • Developed by Dr. X. Lai and Prof. J. Massey in Switzerland in early 1900s • Replaced the DES standard • Uses a 128 bit key • Said to be impossible to break by checking every key • No other means of attack is known

  11. SEAL • Software-optimized Encryption Algorithm • Designed by Rogaway and Coppersmith in 1993 • Uses a 160 bit key • Is a Stream-Cipher – data is encrypted continuously as opposed to Block Ciphers (DES, BLOWFISH, and IDEA)

  12. RC4 • Invented by Ron Rivest, Co-Producer of RSA • Used in Lotus Notes and Netscape • Uses up to a 2048-bit key • Useful in situations in which a new key can be used for each message

  13. SOURCES • http://compnetworking.about.com/od/networksecurityprivacy/l/aa011303a.htm • http://www.mycrypto.net/encryption/crypto_algorithms.html • http://www.cohn-family.com/images/cert-rsa-encryption.jpg • http://gnrt.terena.org/gfx/book/ProtectingUsers/public-key-encryption_smaller.gif • http://gnrt.terena.org/gfx/book/ProtectingUsers/single-key-encryption_smaller.gif • http://www.skilldrive.com/book/DOTNET%20in%20Samples_soubory/image042.gif

More Related