SlideShare a Scribd company logo
Security Systems for Digital Data Big Brother is watching YOU Bernhard Hofer 03/10/2008 CIST 3100 - Organizations, Applications & Technology
Table of contents History  and  Terminology Cryptography nowadays  and Encrypting Digital Data Big Brother www The Future (quantum cryptography) Question time
Beginning of cryptography Egypt‘s Old Kingdom   (4500+ years ago) non-standard hieroglyphs The Greeks of Classical times The SCYTALE, used by Spartan military enlarge image
Page  H  E  L  P  M E  I  A  M  … wood cylinder strip of paper
Terminology (I) c r y p t o g r a p h y kryptós, „hidden“ graphéin, „to write“ „ secret writing“
Terminology (II) Hello, this is my first english pres at UNO …  plaintext  (ordinary information) encryption  (converting plaintext) decryption  (reverse process) H?$% /&!!““=  )(/&%ded die=? 30((&% ?$$?) …  ciphertext  (unreadable plaintext) cipher key +
Table of contents History  and  Terminology Cryptography nowadays  and Encrypting Digital Data Big Brother www The Future (quantum cryptography) Question time
Cryptography nowadays (I) “ Cryptography is about communication in the presence of adversaries.” Ronald Rivest ,  "Cryptography" From the Handbook of Theoretical Computer Science, edited by J. van Leeuwen, Elsevier Science Publishers B.V., 1990
Symmetric key system  (private key) … sender and receiver share the same key   (for encryption and decryption) … like the wind   (very fast) … 2 different kinds   (block and stream ciphers) …  Examples:  D(A)ES, RC4, MD5, hash Cryptography nowadays (II)
Asymmetric key system   (public key) … founded  1976  by Diffie and Hellman … 2 keys  (same lenght) : 1 public and 1 private … both are different but related  … slower than symmetric key methods Cryptography nowadays (III)
Cryptography nowadays (IV) Key Server in a so called Trust Center Player 1 Player 2 public key private key …  delivering message !! Authentication Problem !! Player 2 doesn‘t know, who sent the message!?! Everybody knows the public key from Player 2! …  wants to deliver a SECURE message encrypting … decrypting …
Cryptography nowadays (VI) Key Server in a so called Trust Center Player 1 Player 2 public key private key …  delivering message !! Confidentiality Problem !! Player 2 knows, who sent the message! But: Everybody could decrypt the message from Player 1! continue pres. …  wants to deliver a SECURE message encrypting … decrypting …
Asymmetric key system   (public key) … full security, if process repeated twice …  operational area :   Combination of the symmetric and asymmectric …  Examples:  RSA, DSA, SSL, SSL2, … Cryptography nowadays (VIII)
Table of contents History  and  Terminology Cryptography nowadays  and Encrypting Digital Data Big Brother www The Future (quantum cryptography) Question time
The internet … local structure … none secure, open information system … private, public and economic player …  cryptography  is the only way for privacy  protection over the world wide web!  Big Brother www (I)
Requirements for secure interaction … availability … authentification … confidentiality … integrity … commitment Big Brother www (II)
Useful applications …  PGP   (Pretty Good Privacy) RSA, IDEA    founded 1991 by Phil Zimmermann …  confidential certificates  digital signature for online banking …  SSL  (Secure Socket Layer … https://)   founded by Netscape, cryptography for web pages Big Brother www (III)
The one and only security hole is Nothing and/ore nobody could save you against Brute Force Attacks ;-) !! YOUR PASSWORD !! Big Brother www (IV)
cost increases per power (10.000 $, 100.000 $, 1.000.000 $, …) Key length in Bit Codebreaking timetable
Table of contents History  and  Terminology Cryptography nowadays  and Encrypting Digital Data Big Brother www The Future (quantum cryptography) Question time
In princible … … it is a old school symmetric encryption … nothing else as a key distributer … it isn‘t based on mathematical … but on the physics of information Quantum cryptography (I)
In action … … first implemented between the BA CA and the Vienna City-Hall over a 1.500m FDDA (fibre optics) cabel in April 2004   by Anton Zeilinger … Quantum cryptography (II)
Table of contents History  and  Terminology Cryptography nowadays  and Encrypting Digital Data Big Brother www The Future (quantum cryptography) Question time
…  for your attention!! Bernhard Hofer CIST 3100 - Organizations, Applications & Technology Thank you...

More Related Content

PDF
Security Systems for Digital Data - Paper
PPSX
Cryptography
PPT
History of cryptography
PPTX
My cryptography
PPT
Fundamentals of cryptography
DOC
Cryptography saurabh
PDF
Data Encryption Standard
PDF
Network security jeni corrected 1
Security Systems for Digital Data - Paper
Cryptography
History of cryptography
My cryptography
Fundamentals of cryptography
Cryptography saurabh
Data Encryption Standard
Network security jeni corrected 1

What's hot (19)

DOCX
Data encryption standard
PDF
The des algorithm illustrated
PPTX
Cryptography
PPT
Cryptography Intro
PPSX
Overview Of Cryptography
PPT
Data encryption, Description, DES
PPTX
Encryption
PPTX
Intro to modern cryptography
PPTX
Computer network
PPTX
Asymmetric key
PPTX
PDF
WHAT IS CRYPTOGRAPHY - A COMPREHENSIVE GUIDE
PPTX
Network Security(Symmetric Ciphers)
PPT
Cryptography
PPTX
Cryptography ppt
PDF
Group Presentation Slide Week13
PPTX
Blow fish final ppt
PPT
DES (Data Encryption Standard) pressentation
Data encryption standard
The des algorithm illustrated
Cryptography
Cryptography Intro
Overview Of Cryptography
Data encryption, Description, DES
Encryption
Intro to modern cryptography
Computer network
Asymmetric key
WHAT IS CRYPTOGRAPHY - A COMPREHENSIVE GUIDE
Network Security(Symmetric Ciphers)
Cryptography
Cryptography ppt
Group Presentation Slide Week13
Blow fish final ppt
DES (Data Encryption Standard) pressentation
Ad

Viewers also liked (7)

PPTX
Digital Signature
PPTX
ECS
PPTX
Electronic clearing service (ecs)
PPTX
Real Time Gross Settlement
PPTX
PPT
Neft&rtgs
PPT
Neft and rtgs
Digital Signature
ECS
Electronic clearing service (ecs)
Real Time Gross Settlement
Neft&rtgs
Neft and rtgs
Ad

Similar to Security Systems for Digital Data (20)

PPTX
Cryptography and Network Security
PPT
Cryptography - An Overview
ODP
CISSP Week 16
PPSX
5 Cryptography Part1
PPTX
20 security
PPT
Cryptography
PPT
What is Encryption
PPTX
CISSP - Chapter 3 - Cryptography
PDF
s117
PPTX
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
PPS
Itt project
PPT
Introduction To PKI Technology
PPT
Rothke Info Security Canada 2007 Final
PPTX
IEDA 3302 e-commerce_secure-communications.pptx
PDF
CNIT 125 Ch 4. Security Engineering (Part 2)
PPTX
Encryption techniques
PDF
CNIT 123 12: Cryptography
PPT
Cryptography
PPTX
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
DOCX
Cryptography- "A Black Art"
Cryptography and Network Security
Cryptography - An Overview
CISSP Week 16
5 Cryptography Part1
20 security
Cryptography
What is Encryption
CISSP - Chapter 3 - Cryptography
s117
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Itt project
Introduction To PKI Technology
Rothke Info Security Canada 2007 Final
IEDA 3302 e-commerce_secure-communications.pptx
CNIT 125 Ch 4. Security Engineering (Part 2)
Encryption techniques
CNIT 123 12: Cryptography
Cryptography
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Cryptography- "A Black Art"

Recently uploaded (20)

PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Machine learning based COVID-19 study performance prediction
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Approach and Philosophy of On baking technology
PDF
KodekX | Application Modernization Development
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Electronic commerce courselecture one. Pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPT
Teaching material agriculture food technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
MIND Revenue Release Quarter 2 2025 Press Release
Machine learning based COVID-19 study performance prediction
Mobile App Security Testing_ A Comprehensive Guide.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Building Integrated photovoltaic BIPV_UPV.pdf
Approach and Philosophy of On baking technology
KodekX | Application Modernization Development
Unlocking AI with Model Context Protocol (MCP)
MYSQL Presentation for SQL database connectivity
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Electronic commerce courselecture one. Pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Encapsulation theory and applications.pdf
Spectral efficient network and resource selection model in 5G networks
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Teaching material agriculture food technology
Per capita expenditure prediction using model stacking based on satellite ima...
Dropbox Q2 2025 Financial Results & Investor Presentation
“AI and Expert System Decision Support & Business Intelligence Systems”

Security Systems for Digital Data

  • 1. Security Systems for Digital Data Big Brother is watching YOU Bernhard Hofer 03/10/2008 CIST 3100 - Organizations, Applications & Technology
  • 2. Table of contents History and Terminology Cryptography nowadays and Encrypting Digital Data Big Brother www The Future (quantum cryptography) Question time
  • 3. Beginning of cryptography Egypt‘s Old Kingdom (4500+ years ago) non-standard hieroglyphs The Greeks of Classical times The SCYTALE, used by Spartan military enlarge image
  • 4. Page H E L P M E I A M … wood cylinder strip of paper
  • 5. Terminology (I) c r y p t o g r a p h y kryptós, „hidden“ graphéin, „to write“ „ secret writing“
  • 6. Terminology (II) Hello, this is my first english pres at UNO … plaintext (ordinary information) encryption (converting plaintext) decryption (reverse process) H?$% /&!!““= )(/&%ded die=? 30((&% ?$$?) … ciphertext (unreadable plaintext) cipher key +
  • 7. Table of contents History and Terminology Cryptography nowadays and Encrypting Digital Data Big Brother www The Future (quantum cryptography) Question time
  • 8. Cryptography nowadays (I) “ Cryptography is about communication in the presence of adversaries.” Ronald Rivest , "Cryptography" From the Handbook of Theoretical Computer Science, edited by J. van Leeuwen, Elsevier Science Publishers B.V., 1990
  • 9. Symmetric key system (private key) … sender and receiver share the same key (for encryption and decryption) … like the wind (very fast) … 2 different kinds (block and stream ciphers) … Examples: D(A)ES, RC4, MD5, hash Cryptography nowadays (II)
  • 10. Asymmetric key system (public key) … founded 1976 by Diffie and Hellman … 2 keys (same lenght) : 1 public and 1 private … both are different but related … slower than symmetric key methods Cryptography nowadays (III)
  • 11. Cryptography nowadays (IV) Key Server in a so called Trust Center Player 1 Player 2 public key private key … delivering message !! Authentication Problem !! Player 2 doesn‘t know, who sent the message!?! Everybody knows the public key from Player 2! … wants to deliver a SECURE message encrypting … decrypting …
  • 12. Cryptography nowadays (VI) Key Server in a so called Trust Center Player 1 Player 2 public key private key … delivering message !! Confidentiality Problem !! Player 2 knows, who sent the message! But: Everybody could decrypt the message from Player 1! continue pres. … wants to deliver a SECURE message encrypting … decrypting …
  • 13. Asymmetric key system (public key) … full security, if process repeated twice … operational area : Combination of the symmetric and asymmectric … Examples: RSA, DSA, SSL, SSL2, … Cryptography nowadays (VIII)
  • 14. Table of contents History and Terminology Cryptography nowadays and Encrypting Digital Data Big Brother www The Future (quantum cryptography) Question time
  • 15. The internet … local structure … none secure, open information system … private, public and economic player … cryptography is the only way for privacy protection over the world wide web! Big Brother www (I)
  • 16. Requirements for secure interaction … availability … authentification … confidentiality … integrity … commitment Big Brother www (II)
  • 17. Useful applications … PGP (Pretty Good Privacy) RSA, IDEA founded 1991 by Phil Zimmermann … confidential certificates digital signature for online banking … SSL (Secure Socket Layer … https://) founded by Netscape, cryptography for web pages Big Brother www (III)
  • 18. The one and only security hole is Nothing and/ore nobody could save you against Brute Force Attacks ;-) !! YOUR PASSWORD !! Big Brother www (IV)
  • 19. cost increases per power (10.000 $, 100.000 $, 1.000.000 $, …) Key length in Bit Codebreaking timetable
  • 20. Table of contents History and Terminology Cryptography nowadays and Encrypting Digital Data Big Brother www The Future (quantum cryptography) Question time
  • 21. In princible … … it is a old school symmetric encryption … nothing else as a key distributer … it isn‘t based on mathematical … but on the physics of information Quantum cryptography (I)
  • 22. In action … … first implemented between the BA CA and the Vienna City-Hall over a 1.500m FDDA (fibre optics) cabel in April 2004 by Anton Zeilinger … Quantum cryptography (II)
  • 23. Table of contents History and Terminology Cryptography nowadays and Encrypting Digital Data Big Brother www The Future (quantum cryptography) Question time
  • 24. … for your attention!! Bernhard Hofer CIST 3100 - Organizations, Applications & Technology Thank you...