Using Cryptography to Protect Data in Computer Networks: case study PowerPoint PPT Presentation

presentation player overlay
1 / 15
About This Presentation
Transcript and Presenter's Notes

Title: Using Cryptography to Protect Data in Computer Networks: case study


1
Using Cryptography to Protect Data in
Computer Networks case study
  • Vsevolod Ievgiienko
  • National Taras Shevchenko University of Kiev
  • Faculty of Cybernetics
  • Ukraine

2
Introduction
  • Information security
  • Business
  • Banks
  • Online payments
  • Individual persons

3
Introduction
  • Computer System
  • Reliability
  • Security Safety
  • Cryptography

4
Security
  • Security is considered as a part of reliability
    and survivability problem
  • Who watches the watchmen?

5
Safety
  • Optimization problem
  • x - system configuration
  • C - system cost
  • R - system reliability index
  • S - system safety index

6
Information security problems
  • Types of violations
  • Disconnection
  • Interception
  • Modification
  • Falsification

7
Information security problems
  • Violations
  • Active Passive
  • - imitation - stream analysis
  • - recreation
  • - modification
  • - hindering in service

8
Information security problems
  • System security services
  • Confidentiality
  • Authentication
  • Integrity
  • Impossibility of refuse

9
Algorithms
  • Symmetric
  • (DES, AES, Blowfish, Serpent, Twofish)
  • E encryption
  • D decryption
  • ? secret key
  • ? message
  • ? encrypted message

10
Algorithms
  • Asymmetric
  • (RSA, Elgamal, Elliptic Curves Cryptography)
  • E encryption
  • D decryption
  • ?Ux public key (user X)
  • ?Rx private key (user X)
  • ? message
  • ? encrypted message

11
Principles of planning
  • Principle of different types
  • Use a few algorithms of one type that have a
    different structure

12
Encryption software solution
  • Remote encrypted file system
  • Secret messaging

13
Encryption algorithms
  • RSA with up to 4096-bit keys
  • Digital signatures based on RSA
  • Trusted timestamping
  • X.509 3-steps authentication
  • Blowfish with 448-bit keys
  • SHA-256 and SHA-512 hash functions
  • HMAC-SHA-256
  • modified ANSI X9.17 pseudo-random numbers
    generator
  • PKCS5 for making keys from passwords
  • Deflate compression algorithm
  • CRC32 checksums
  • DoD-5220.22-M for data wiping

14
Sources
  • Reliability past, present, future, I. Ushakov
  • Applied Cryptography, B. Schneier
  • Handbook of Applied Cryptography, A. Menezes,
    P. van Oorschot, S. Vanstone
  • www.wasm.ru/forum
  • www.pgpru.com
  • www.pgp.com
  • www.gnupg.org
  • www.cipherwall.com
  • http//www.financialcryptography.com
  • http//www.schneier.com

15
THE END
  • Questions?
  • Contacts
  • E-mail admin_at_rest-company.kiev.ua
  • Tel 38050-3-555-999
  • ICQ 333269
Write a Comment
User Comments (0)
About PowerShow.com