1 / 24

Team 6 Decrypting Encryption

Team 6 Decrypting Encryption. Jeffrey Vordick , Charles Sheefel , and Shyam Rasaily. Encryption. Encryption. Encryption (!@#$%^&) Convert data into scramble data (cipher text) Information privacy Assurances Data not modified Viewed by intended recipient

sonja
Download Presentation

Team 6 Decrypting Encryption

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Team 6 Decrypting Encryption Jeffrey Vordick, Charles Sheefel, and ShyamRasaily

  2. Encryption

  3. Encryption Encryption (!@#$%^&) • Convert data into scramble data (cipher text) • Information privacy Assurances • Data not modified • Viewed by intended recipient • Received at intended destination

  4. Key Encryption

  5. Key Encryption Key Encryption • Random string of character

  6. Private and Public Key Encryption

  7. Private Key Encryption Private Key Encryption Private Key Yo Alice Yo Alice #dasf^&* #dasf^&* Encrypt Decrypt ALICE BOB BOB Private Key Private Key

  8. Public Key Encryption Public Key Encryption Use two Keys • Private key • Public Key

  9. Public Key Encryption Public Key Encryption Public Key Yo Alice Yo Alice #dasf^&* #dasf^&* Encrypt Decrypt ALICE BOB BOB Public Key Private Key

  10. PGP (Pretty Good Privacy)

  11. Pretty Good Privacy Sign file with private key Encrypt file with public key Raw file Verify signature with public key Decrypt file with private key Encrypted and signed file Email

  12. SSL (Secure Sockets Layer)

  13. Secure Socket Layer

  14. SSH (Secure Shell)

  15. Secure Shell • Commonly used for remote access like VPN Public keys are placed on the computers that should allow access. (So its more like a lock) Private key allows access to computers locked with the public keys

  16. SCP (Secure CoPy) & SFTP (Secure File Transfer Protocol)

  17. SCP (Secure CoPy) • Extension of OpenSSH • Replaces insecure FTP • Uses TCP Port 22 • Included on UNIX, Linux, and Macintosh OS X operating systems Below is a conversion between lsu’s server and my MAC Charless-MacBook-Pro:~ csheefel3$ scp csheefel@lsu.edu:geog2250 test The authenticity of host 'lsu.edu (130.39.253.217)' can't be established. RSA key fingerprint is 52:fd:fa:74:40:a7:c4:03:8f:04:7b:78:c8:ea:e8:68. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added 'lsu.edu,130.39.253.217' (RSA) to the list of known hosts. \033[H\033[2J NOTICE: This is the Louisiana State University computer system, which may be accessed and used only by authorized persons. LSU reserves the right to review and/or monitor system transactions for compliance with its policies and/or applicable law. Upon reasonable cause, LSU may disclose such transactions to authorized persons for official purposes, including criminal and other investigations, and permit the monitoring of system transactions by law enforcement agencies. Access or use of this computer system by any person, whether authorized or unauthorized, constitutes consent to these terms. csheefel@lsu.edu's password: 

  18. SCP (Secure CoPy) • Using SCP • Ideal for quick transfer of single files. • Syntax is similar to the Unix copy command. For demonstration purposes, we'll use two computers (Kari’s desktop and CEBALab001) with the usernames Kari and kwalters scppath/to/file kwalters@remote.computer:path/to/destination If Kari wanted to transfer the a file called example.txt from Kari’s home directory on Kari’s desktop to Kari’s home directory on CEBALab001, the command might look like this: scp /home/Kari/example.txt kwalters@CEBALab001.lsu.edu:/home/kwalters/ If Kari wanted to transfer a file from CEBALab001 to Kari’s desktop, she could type something like this: scpkwalters@CEBALab001.lsu.edu:/home/kwalters/example.txt /home/Kari/ If Kari needed to copy an entire directory, Kari would need to use the recursive flag, like this: scp -r Karidirectory kwalters@CEBALab001.lsu.edu:/home/kwalters/

  19. SFTP (Secure File Transfer Protocol) • Uses Propriety SSH • Connects like FTP • Not as widely supported • Five main commands: ls, get, put, cd, and lcd. • Designed by IETF • Used to transport multiple files • Latest Version 6*

  20. IPSec (Internet Protocol Security)

  21. IPSec(Internet Protocol Security) • Operates at Network Layer • Adds information to headers of IP packets • Designed by IETF • Works on any TCP/IP Transmission • Native IPv6 Standard • Authentication • Phase 1 Key Management: IKE on port 500 • Phase 2 Encryption: AH and ESP

  22. IPSec(Internet Protocol Security) VPN concentrator • Establish VPN Connection • Authenticates VPN Clients • Location: edge of private network

  23. IPSec(Internet Protocol Security) • Modes • Transport Mode- Encapsulated Header Intact • Tunnel Mode – New Encapsulated Header

  24. Any Questions?

More Related