Security - PowerPoint PPT Presentation

About This Presentation
Title:

Security

Description:

... and a public key that is announced to the public (i.e. via the internet). The most common public-key algorithm is named after its inventors: Rivest-Shamir ... – PowerPoint PPT presentation

Number of Views:14
Avg rating:3.0/5.0
Slides: 16
Provided by: meredith98
Learn more at: http://www.cs.loyola.edu
Category:

less

Transcript and Presenter's Notes

Title: Security


1
Security
  • Meredith Friedman
  • CS 111.01

2
Aspects of Security
3
Privacy
  • The concept of confidentiality Only sender and
    receiver should have access to contents of a
    transmission.

4
Authentication
  • Assures the recipient knows who the sender is,
    and where the information is coming from.

5
Integrity
  • The idea that a transmission is received in
    exactly the same way it was sent.

6
Nonrepudiation
  • A guarantee that the sender is aware of what they
    are doing, and takes full responsibility. A
    secure server is able to prove who sent a
    message.

7
(No Transcript)
8
Encryption
  • Privacy requires that a message be encrypted at
    the sender site and decrypted at the receiver
    site so that a potential intruder cannot
    understand its contents.

9
Types of Encryption
  • Secret Key Encryption
  • Public Key Encryption
  • Combination (Secret and Public Key)

10
Secret Key Encryption
  • When the sender uses a secret key, an encryption
    algorithm encrypts the data.
  • The receiver uses the same key with a decryption
    algorithm to decrypt the data.
  • Data, when not encrypted, are called plaintext,
    encrypted data are called ciphertext
  • Secret Key Encryption algorithms are also called
    Symmetric Encryption Algorithms because the same
    secret key is used in both directions of
    communication.

11
Pros and Cons
  • More efficient than Public Key Encryption
  • Each pair of users must have a secret key so if
    1 million people want to communicate, they need
    to have a half-trillion secret keys.
  • Distribution of keys between parties can be
    difficult

12
Public Key Encryption
  • This method uses 2 keys a private key kept by
    the receiver, and a public key that is announced
    to the public (i.e. via the internet).
  • The most common public-key algorithm is named
    after its inventors Rivest-Shamir-Adleman (RSA)
    Ecryption.

13
Pros and Cons
  • Less keys needed- using Public Key Encryption, it
    would only take 2 million keys for 1 million
    people to communicate.
  • The algorithm for a public key usually has very
    large numbers, so converting plain text from
    cipher text can take a long time.
  • For this reason Public Key Encryption is not
    usually used for large amounts of text.

14
Combining the Two
  • You can combine the advantages of Secret Key
    (effciency) and Public Key (easy distribution of
    keys) algorithms.
  • The public key is used to encrypt the secret key,
    while the secret key is used to encrypt the
    message.

15
Any Questions?
Write a Comment
User Comments (0)
About PowerShow.com