SlideShare a Scribd company logo
Dissemination of knowledge
on
Secure Systems Engineering
JAI GANESH S
Asst.Professor – Dept. of ECE
RMKCET
Topics Overview
• What is Cryptography
• Zero Knowledge proof
• Digital Signatures
• BIT Coins & Block Chains
• Architectural aid to secure systems
• Z-cash
• Garbled Circuits
• Canaries & Confinement
Cryptography – Art of Keeping Secret
Cryptography
• Practice of Studying / Developing Algorithms
to keep the data secret.
• Or in other words “ constructing protocols
that prevents the third parties from reading
private messages”
• Or in other words “Enabling the exchange of
confidential data in the presence of
adversaries”
Simple science behind cryptography
When Julius Caesar sent messages to his
generals, he didn't trust his messengers. So he
replaced every A in his messages with a D,
every B with an E, and so on through the
alphabet. Only someone who knew the "shift
by 3" rule could decipher his messages.
How Cryptography Works?
•Plain Text
•Cipher Text
•Encryption
•Decryption
•Key
Aspects of Cryptography
• Confidentiality – Keeping the Secret
• Integrity – Maintaining the Accuracy and
Consistency of the data
• Authentication - the process or action of
proving or showing something to be true,
genuine, or valid.
Types of cryptography
Symmetric Key Encryption
• Secret key cryptography methods employ a
single key for both encryption and decryption.
• the sender uses the key to encrypt the
plaintext and sends the cipher text to the
receiver
• The receiver applies the same key to decrypt
the message and recover the plaintext.
Sub categories of Symmetric
Cryptography - DES
• Stream ciphers – Bit by Bit Encryption
– Caesar Cipher and Substitution Cipher
• Block ciphers – Group of bits Encryption
– Feistel Cipher, Lai–Massey ciphers, Blowfish
Asymmetric Key Encryption
• Uses pairs of Keys
– Public Key - which may be disseminated widely
– Private Key - which are known only to the owner
“where the public key verifies a holder of the paired
private key sent the message, and encryption,
where only the paired private key holder can
decrypt the message encrypted with the public
key.”
Sub categories of Asymmetric
Cryptography - AES
• RSA Algorithm
• Diffie-Hellman
• Digital Signature Algorithm (DSA)
• ElGamal
• Elliptic Curve Cryptography
Digital Signatures
How it works?
• Step 1 – Calculate Message Digest
• Step 2: Calculate the Digital Signature
hash-value of the message (the message digest)
is encrypted with the private key of the person
who signs the message called digital signature
Verifying Digital Signatures
• Step 1: Calculate the Current Hash-Value
– the same hashing algorithm is used as was used during the
signing process. The obtained hash-value is called the
current hash-value
• Step 2: Calculate the Original Hash-Value
– The decryption is done by the public key that corresponds
to the private key used during the signing of the message.
As a result, we obtain the original hash-value
• Step 3: Compare the Current and the Original Hash-
Values
– we compare the current hash-value obtained in the first
step with the original hash-value obtained in the second
step. If the two values are identical, the verification if
successful
Verifying Digital Signatures
Applications of Digital Signatures
• Electronic mail
• Data storage
• Electronics fund transfer
• Software distribution
• Smart cards
• Time stamped signatures (To check Validity)
Zero Knowledge Proof
• zero-knowledge protocol is a method by which
one party (the prover) can prove to another
party (the verifier) that a given statement is
true, without conveying any information apart
from the fact that the statement is indeed true.
• zero-knowledge proofs require interaction
between the individual (or computer system)
proving their knowledge and the individual
validating the proof.
Understanding Zero Knowledge
Peggy randomly takes
either path A or B, while
Victor waits outside
Victor chooses an
exit path
Peggy reliably appears
at the exit Victor names
Properties of ZKP
• A zero-knowledge proof must satisfy three
properties
– Completeness: if the statement is true, the honest
verifier (that is, one following the protocol properly)
will be convinced of this fact by an honest prover.
– Soundness: if the statement is false, no cheating
prover can convince the honest verifier that it is true,
except with some small probability.
– Zero-knowledge: if the statement is true, no cheating
verifier learns anything other than the fact that the
statement is true. In other words, just knowing the
statement (not the secret) is sufficient to imagine a
scenario showing that the prover knows the secret.
Variants of zero-knowledge
• Perfect zero-knowledge
• Statistical zero-knowledge
• computational zero-knowledge
Applications
• Authentication systems
– one party wants to prove its identity to a second party
via some secret information (such as a password) but
doesn't want the second party to learn anything about
this secret.
• Ethical behavior
– the idea is to force a user to prove, using a zero-
knowledge proof, that its behavior is correct according
to the protocol
• Blockchains
– ZKPs can be used to guarantee that transactions are
valid
Dissemination of knowledge on Secure Systems Engineering
Bit Coins
• Satoshi nakamoto invented the bit coins.
• Mined over 2 crore bit coins. Person or
community who solves a hash function will
get one bit coin.
• As on 2017 - 1 crore bit coins have been
identified
Bit Coins
• It’s a kind of cryptocurrency – Meaning it is
encrypted and cannot be copied
• Peer to peer electronic cash system
• Virtual money to buy and sell things online
• Transactions of the bit coins are recorded in a
block chain
• Will be the future of economics in digital
world
Block Chains
Block Chains
• Block chains are the chain of blocks that
contains information
• Originally introduced in 1991 for
timestamping digital documents
• Later in 2009 used by satoshi nakamoto used
this to create digital ledger of bitcoins
• Once the data recorded in the ledger it
becomes very difficult to change it.
Contents of a block in block chain
Data – contains the details of the
transaction
Hash – Equal to the Message Digest
if there is any change in the content then the hash
changes
Hash of the previous block – which
actually makes the blockchain more
secure
Example
If there is any tampering in any block
that eventually affects all other
remaining blocks
Computers now a days have high computational power to calculate the hash
for remaining blocks to accept the tampering – overcome by Proof of Work
Other Exposures
• Z Cash – an alternative to Bit coins introduced in
2016
• Garbled Circuits – New Technology that talks
about Secure Multi Party Computation
• Canaries – Technology that talks about running a
Vulnerable program in a Secure System
• Confinement – An Alternative to Canaries
• Architectural Aid to Secure Systems – Hardware
perspective of secure systems (CISC and RISC
Architectures)

More Related Content

PPTX
Data Encryption : A Powerful and an Approachable Technology!
PPT
Encryption technology
PDF
PPTX
10 system.security.cryptography
PPTX
Blockchain Smart Contract v5
PDF
Blockchain and Cryptography - A Primer
PPTX
PPTX
20 security
Data Encryption : A Powerful and an Approachable Technology!
Encryption technology
10 system.security.cryptography
Blockchain Smart Contract v5
Blockchain and Cryptography - A Primer
20 security

What's hot (19)

PPTX
Smart contract honeypots for profit (and fun) - bha
PDF
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
PPTX
Cyber security crypto blockchain Version 3.2
PPTX
Hashing vs Encryption vs Encoding
PPTX
Dark Side of the Net Lecture 2 Cryptography
PPTX
Ethereum
PPTX
Data encryption
PDF
Introduction to Ethereum Blockchain & Smart Contract
PDF
Week 12 slide
PDF
The Ethereum Experience
PDF
Privacy Preserving Paradigms of Blockchain Technology
PDF
Ethereum-Cryptocurrency (All about Ethereum)
PPTX
Cryptography
PPT
Cryptography intro
PDF
s117
PPTX
Understanding blockchain
PDF
How AI benefits from Blockchain and Game Theory with Scalable Censorship-resi...
PPTX
Quantum Secured Blockchain
PPTX
Encryption
Smart contract honeypots for profit (and fun) - bha
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
Cyber security crypto blockchain Version 3.2
Hashing vs Encryption vs Encoding
Dark Side of the Net Lecture 2 Cryptography
Ethereum
Data encryption
Introduction to Ethereum Blockchain & Smart Contract
Week 12 slide
The Ethereum Experience
Privacy Preserving Paradigms of Blockchain Technology
Ethereum-Cryptocurrency (All about Ethereum)
Cryptography
Cryptography intro
s117
Understanding blockchain
How AI benefits from Blockchain and Game Theory with Scalable Censorship-resi...
Quantum Secured Blockchain
Encryption
Ad

Similar to Dissemination of knowledge on Secure Systems Engineering (20)

PDF
Tutorial on Cryptography
PDF
The Mathematics Behind Bitcoin
PDF
Intro to Cryptography
PDF
Blockchain Technology Introduction and Basics
PPTX
Crypto & Crpyocurrencies Intro
PPTX
What is The zero knowledge Proofs Protocol System
PDF
Zero knowledge proof.pdf
PDF
Cryptology - The practice and study of hiding information
PDF
How Do Zero-Knowledge Proofs Keep Blockchain Transactions Private.pdf
PPTX
Cryptography chap#6.pptx
PDF
Cryptography Algorithms - 2nd Edition (Early Release) Massimo Bertaccini
PPT
Cryptography - An Overview
PDF
Privacy-preserving techniques using zero knowledge proof in public Ethereum
PPTX
Blockchain Corporate Style
PPTX
Introduction to Cryptography for btech cse
PPS
Itt project
PPTX
Blockchain privacy approaches in hyperledger indy
PPTX
Demystifying Zero Knowledge Proofs [FINAL].pptx
Tutorial on Cryptography
The Mathematics Behind Bitcoin
Intro to Cryptography
Blockchain Technology Introduction and Basics
Crypto & Crpyocurrencies Intro
What is The zero knowledge Proofs Protocol System
Zero knowledge proof.pdf
Cryptology - The practice and study of hiding information
How Do Zero-Knowledge Proofs Keep Blockchain Transactions Private.pdf
Cryptography chap#6.pptx
Cryptography Algorithms - 2nd Edition (Early Release) Massimo Bertaccini
Cryptography - An Overview
Privacy-preserving techniques using zero knowledge proof in public Ethereum
Blockchain Corporate Style
Introduction to Cryptography for btech cse
Itt project
Blockchain privacy approaches in hyperledger indy
Demystifying Zero Knowledge Proofs [FINAL].pptx
Ad

More from JAIGANESH SEKAR (20)

PDF
Ec8551 communication networks mcq question bank
PDF
2.3b access control random access methods - part 3 - csma ca
PDF
2.10b network layer services i pv4 - variable length subnetting
PDF
2.10a network layer services i pv4 - fixed length subnetting
PDF
2.10 network layer services i pv4
PDF
2.9 network layer services packet switching
PDF
2.8 bluetooth ieee 802.15
PDF
2.7 wlan ieee 802.11
PDF
2.6 ethernet ieee 802.3
PDF
2.5 access control channelization methods
PDF
2.4 access control controlled access methods
PDF
2.3a access control random access methods - part 2 - csma cd
PDF
2.3 access control random access methods - part 1
PDF
2.2 flow control
PDF
2.1 framing
PDF
9. data link layer error correction codes - hamming code
PDF
8. data link layer error detection and correction codes - crc
PDF
7. data link layer error detection and correction codes - parity and checksum
PDF
6. data link layer physical addressing
PDF
5. protocol layering
Ec8551 communication networks mcq question bank
2.3b access control random access methods - part 3 - csma ca
2.10b network layer services i pv4 - variable length subnetting
2.10a network layer services i pv4 - fixed length subnetting
2.10 network layer services i pv4
2.9 network layer services packet switching
2.8 bluetooth ieee 802.15
2.7 wlan ieee 802.11
2.6 ethernet ieee 802.3
2.5 access control channelization methods
2.4 access control controlled access methods
2.3a access control random access methods - part 2 - csma cd
2.3 access control random access methods - part 1
2.2 flow control
2.1 framing
9. data link layer error correction codes - hamming code
8. data link layer error detection and correction codes - crc
7. data link layer error detection and correction codes - parity and checksum
6. data link layer physical addressing
5. protocol layering

Recently uploaded (20)

PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Pharma ospi slides which help in ospi learning
PDF
Complications of Minimal Access Surgery at WLH
PDF
01-Introduction-to-Information-Management.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Lesson notes of climatology university.
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
master seminar digital applications in india
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Microbial disease of the cardiovascular and lymphatic systems
PPH.pptx obstetrics and gynecology in nursing
TR - Agricultural Crops Production NC III.pdf
Renaissance Architecture: A Journey from Faith to Humanism
Pharma ospi slides which help in ospi learning
Complications of Minimal Access Surgery at WLH
01-Introduction-to-Information-Management.pdf
O7-L3 Supply Chain Operations - ICLT Program
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
O5-L3 Freight Transport Ops (International) V1.pdf
Lesson notes of climatology university.
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
VCE English Exam - Section C Student Revision Booklet
Anesthesia in Laparoscopic Surgery in India
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Microbial diseases, their pathogenesis and prophylaxis
master seminar digital applications in india
2.FourierTransform-ShortQuestionswithAnswers.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student

Dissemination of knowledge on Secure Systems Engineering

  • 1. Dissemination of knowledge on Secure Systems Engineering JAI GANESH S Asst.Professor – Dept. of ECE RMKCET
  • 2. Topics Overview • What is Cryptography • Zero Knowledge proof • Digital Signatures • BIT Coins & Block Chains • Architectural aid to secure systems • Z-cash • Garbled Circuits • Canaries & Confinement
  • 3. Cryptography – Art of Keeping Secret
  • 4. Cryptography • Practice of Studying / Developing Algorithms to keep the data secret. • Or in other words “ constructing protocols that prevents the third parties from reading private messages” • Or in other words “Enabling the exchange of confidential data in the presence of adversaries”
  • 5. Simple science behind cryptography When Julius Caesar sent messages to his generals, he didn't trust his messengers. So he replaced every A in his messages with a D, every B with an E, and so on through the alphabet. Only someone who knew the "shift by 3" rule could decipher his messages.
  • 6. How Cryptography Works? •Plain Text •Cipher Text •Encryption •Decryption •Key
  • 7. Aspects of Cryptography • Confidentiality – Keeping the Secret • Integrity – Maintaining the Accuracy and Consistency of the data • Authentication - the process or action of proving or showing something to be true, genuine, or valid.
  • 9. Symmetric Key Encryption • Secret key cryptography methods employ a single key for both encryption and decryption. • the sender uses the key to encrypt the plaintext and sends the cipher text to the receiver • The receiver applies the same key to decrypt the message and recover the plaintext.
  • 10. Sub categories of Symmetric Cryptography - DES • Stream ciphers – Bit by Bit Encryption – Caesar Cipher and Substitution Cipher • Block ciphers – Group of bits Encryption – Feistel Cipher, Lai–Massey ciphers, Blowfish
  • 11. Asymmetric Key Encryption • Uses pairs of Keys – Public Key - which may be disseminated widely – Private Key - which are known only to the owner “where the public key verifies a holder of the paired private key sent the message, and encryption, where only the paired private key holder can decrypt the message encrypted with the public key.”
  • 12. Sub categories of Asymmetric Cryptography - AES • RSA Algorithm • Diffie-Hellman • Digital Signature Algorithm (DSA) • ElGamal • Elliptic Curve Cryptography
  • 14. How it works? • Step 1 – Calculate Message Digest
  • 15. • Step 2: Calculate the Digital Signature hash-value of the message (the message digest) is encrypted with the private key of the person who signs the message called digital signature
  • 16. Verifying Digital Signatures • Step 1: Calculate the Current Hash-Value – the same hashing algorithm is used as was used during the signing process. The obtained hash-value is called the current hash-value • Step 2: Calculate the Original Hash-Value – The decryption is done by the public key that corresponds to the private key used during the signing of the message. As a result, we obtain the original hash-value • Step 3: Compare the Current and the Original Hash- Values – we compare the current hash-value obtained in the first step with the original hash-value obtained in the second step. If the two values are identical, the verification if successful
  • 18. Applications of Digital Signatures • Electronic mail • Data storage • Electronics fund transfer • Software distribution • Smart cards • Time stamped signatures (To check Validity)
  • 19. Zero Knowledge Proof • zero-knowledge protocol is a method by which one party (the prover) can prove to another party (the verifier) that a given statement is true, without conveying any information apart from the fact that the statement is indeed true. • zero-knowledge proofs require interaction between the individual (or computer system) proving their knowledge and the individual validating the proof.
  • 20. Understanding Zero Knowledge Peggy randomly takes either path A or B, while Victor waits outside
  • 22. Peggy reliably appears at the exit Victor names
  • 23. Properties of ZKP • A zero-knowledge proof must satisfy three properties – Completeness: if the statement is true, the honest verifier (that is, one following the protocol properly) will be convinced of this fact by an honest prover. – Soundness: if the statement is false, no cheating prover can convince the honest verifier that it is true, except with some small probability. – Zero-knowledge: if the statement is true, no cheating verifier learns anything other than the fact that the statement is true. In other words, just knowing the statement (not the secret) is sufficient to imagine a scenario showing that the prover knows the secret.
  • 24. Variants of zero-knowledge • Perfect zero-knowledge • Statistical zero-knowledge • computational zero-knowledge
  • 25. Applications • Authentication systems – one party wants to prove its identity to a second party via some secret information (such as a password) but doesn't want the second party to learn anything about this secret. • Ethical behavior – the idea is to force a user to prove, using a zero- knowledge proof, that its behavior is correct according to the protocol • Blockchains – ZKPs can be used to guarantee that transactions are valid
  • 27. Bit Coins • Satoshi nakamoto invented the bit coins. • Mined over 2 crore bit coins. Person or community who solves a hash function will get one bit coin. • As on 2017 - 1 crore bit coins have been identified
  • 28. Bit Coins • It’s a kind of cryptocurrency – Meaning it is encrypted and cannot be copied • Peer to peer electronic cash system • Virtual money to buy and sell things online • Transactions of the bit coins are recorded in a block chain • Will be the future of economics in digital world
  • 30. Block Chains • Block chains are the chain of blocks that contains information • Originally introduced in 1991 for timestamping digital documents • Later in 2009 used by satoshi nakamoto used this to create digital ledger of bitcoins • Once the data recorded in the ledger it becomes very difficult to change it.
  • 31. Contents of a block in block chain
  • 32. Data – contains the details of the transaction
  • 33. Hash – Equal to the Message Digest if there is any change in the content then the hash changes
  • 34. Hash of the previous block – which actually makes the blockchain more secure
  • 36. If there is any tampering in any block that eventually affects all other remaining blocks Computers now a days have high computational power to calculate the hash for remaining blocks to accept the tampering – overcome by Proof of Work
  • 37. Other Exposures • Z Cash – an alternative to Bit coins introduced in 2016 • Garbled Circuits – New Technology that talks about Secure Multi Party Computation • Canaries – Technology that talks about running a Vulnerable program in a Secure System • Confinement – An Alternative to Canaries • Architectural Aid to Secure Systems – Hardware perspective of secure systems (CISC and RISC Architectures)