160 likes | 264 Views
Using Cryptography to Protect Data in Computer Networks: case study. Vsevolod Ievgiienko National Taras Shevchenko University of Kiev Faculty of Cybernetics Ukraine. Introduction. Information security Business Banks Online payments Individual persons. Introduction.
E N D
Using Cryptography to Protect Data in Computer Networks: case study Vsevolod Ievgiienko National Taras Shevchenko University of Kiev Faculty of Cybernetics Ukraine
Introduction Information security • Business • Banks • Online payments • Individual persons
Introduction Computer System Reliability Security Safety … Cryptography … …
Security • Security is considered as a part of reliability and survivability problem • “Who watches the watchmen?”
Safety Optimization problem • x - system configuration • C - system cost • R - system reliability index • S - system safety index
Information security problems Types of violations • Disconnection • Interception • Modification • Falsification
Information security problems Violations Active Passive - imitation - stream analysis - recreation - modification - hindering in service
Information security problems System security services • Confidentiality • Authentication • Integrity • Impossibility ofrefuse
Algorithms Symmetric (DES, AES, Blowfish, Serpent, Twofish) • E – encryption • D – decryption • К – secret key • М – message • С – encrypted message
Algorithms Asymmetric (RSA, Elgamal, Elliptic Curves Cryptography) • E – encryption • D – decryption • КUx – public key (user X) • КRx – private key (user X) • М – message • С – encrypted message
Principles of planning Principle of different types Use a few algorithms of one type that have a different structure
Encryption software solution Remoteencrypted file system Secret messaging
Encryption algorithms • RSA with up to 4096-bit keys • Digital signatures based on RSA • Trustedtimestamping • X.509 3-steps authentication • Blowfish with 448-bit keys • SHA-256 and SHA-512 hash functions • HMAC-SHA-256 • modified ANSI X9.17 pseudo-random numbers generator • PKCS5 for making keys from passwords • Deflate compression algorithm • CRC32 checksums • DoD-5220.22-M for data wiping
Sources • “Reliability: past, present, future”, I. Ushakov • “Applied Cryptography”, B. Schneier • “Handbook of Applied Cryptography”, A. Menezes, P. van Oorschot, S. Vanstone • www.wasm.ru/forum • www.pgpru.com • www.pgp.com • www.gnupg.org • www.cipherwall.com • http://www.financialcryptography.com • http://www.schneier.com
THE END Questions? Contacts: E-mail:admin@rest-company.kiev.ua Tel: +38050-3-555-999 ICQ: 333269