80 likes | 95 Views
Learn about the encryption and decryption methods in cryptology for private communication. Explore symmetric and asymmetric keys, RSA and DH algorithms, and extra security measures.
E N D
Asynchronous Cryptology:Implementations andApplications Tim Ransom ransomts@email.appstate.edu James Corsi corsijn@email.appstate.edu Summer Bridge 2013 August 2, 2013
Overview What is Cryptology? Symmetric vs. Asymmetric Public vs. Private Keys What makes them secure? Acknowledgements
What is Cryptology? The encryption and decryption of a message to ensure a secret communication Has become very prominent after WWI with the introduction of computers Combines the fields of applied mathematics, computer science and electrical engineering
Symmetric vs. Asymmetric Symmetric Advantages: Higher rates of throughput Keys are relatively short Simple symmetric keys can be composed to create a stronger cipher Public Key Advantages: Same keys can be used for long periods of time Public keys reduce the total number of keys needed, making management much simpler Only the private key must be kept secret Symmetric Disadvantages: For two parties, both keys must be kept secret Digital signature verifications typically require large keys for public validation Public Key Disadvantages: Throughput speeds can be very slow No public scheme has been proven secure
Public vs. Private Keys Private keys are usually used to decrypt messages encrypted with the related public key They can be used for encryption to verify the author of the message Public keys are freely available and usually encrypt data Public keys can decrypt data to publicly announce information
What makes them secure? RSA Algorithms DH Algorithms Extra security measures: • Trusted Third Party (TTP) • Digital Signature
Acknowledgements Dr. Tashakkori Dr. Norris Appalachian State The National Science Foundation STEP program
References Menezes, Alfred J., Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. Boca Raton: CRC, 1997. Print. Pfleeger, Charles P., and Shari L. Pfleeger. Security in Computing. 3rd ed. Upper Saddle River: Prentice Hall, 2003. Print. Pieprzyk, Josef, Thomas Hardjono, and Jennifer Seberry. Fundamentals of Computer Security. New York: Springer-Verlag Berlin Heidelberg, 2003. Print. Garrett, Paul, and Daniel Lieman. Public-key Cryptography: American Mathematical Society Short Course, January 13-14, 2003, Baltimore, Maryland. Vol. 62. Providence, RI: American Mathematical Society, 2005. Print Abhishek. “Symmetric and Asymmetric Encryption.” Drawing. Cryptocats.com 27 August 2008. <http://cryptocrats.com/digital-rights-management/drm-technologies-drm-part-2/> “Public-key-crypto-1” by KohanX - CC: BY “Public key shared secret” by David Gothberg - CC: BY “Diffie-Hellman Key Exchange” by Flugaal - CC: BY