160 likes | 272 Vues
This case study by Vsevolod Ievgiienko from the National Taras Shevchenko University of Kiev explores the critical role of cryptography in safeguarding data across computer networks. It discusses various types of information security violations, including disconnection, interception, and modification, and highlights key security services such as confidentiality, authentication, and integrity. Additionally, the study examines symmetric and asymmetric encryption algorithms, including RSA, AES, and Blowfish, emphasizing their importance in business, banking, and online transactions.
E N D
Using Cryptography to Protect Data in Computer Networks: case study Vsevolod Ievgiienko National Taras Shevchenko University of Kiev Faculty of Cybernetics Ukraine
Introduction Information security • Business • Banks • Online payments • Individual persons
Introduction Computer System Reliability Security Safety … Cryptography … …
Security • Security is considered as a part of reliability and survivability problem • “Who watches the watchmen?”
Safety Optimization problem • x - system configuration • C - system cost • R - system reliability index • S - system safety index
Information security problems Types of violations • Disconnection • Interception • Modification • Falsification
Information security problems Violations Active Passive - imitation - stream analysis - recreation - modification - hindering in service
Information security problems System security services • Confidentiality • Authentication • Integrity • Impossibility ofrefuse
Algorithms Symmetric (DES, AES, Blowfish, Serpent, Twofish) • E – encryption • D – decryption • К – secret key • М – message • С – encrypted message
Algorithms Asymmetric (RSA, Elgamal, Elliptic Curves Cryptography) • E – encryption • D – decryption • КUx – public key (user X) • КRx – private key (user X) • М – message • С – encrypted message
Principles of planning Principle of different types Use a few algorithms of one type that have a different structure
Encryption software solution Remoteencrypted file system Secret messaging
Encryption algorithms • RSA with up to 4096-bit keys • Digital signatures based on RSA • Trustedtimestamping • X.509 3-steps authentication • Blowfish with 448-bit keys • SHA-256 and SHA-512 hash functions • HMAC-SHA-256 • modified ANSI X9.17 pseudo-random numbers generator • PKCS5 for making keys from passwords • Deflate compression algorithm • CRC32 checksums • DoD-5220.22-M for data wiping
Sources • “Reliability: past, present, future”, I. Ushakov • “Applied Cryptography”, B. Schneier • “Handbook of Applied Cryptography”, A. Menezes, P. van Oorschot, S. Vanstone • www.wasm.ru/forum • www.pgpru.com • www.pgp.com • www.gnupg.org • www.cipherwall.com • http://www.financialcryptography.com • http://www.schneier.com
THE END Questions? Contacts: E-mail:admin@rest-company.kiev.ua Tel: +38050-3-555-999 ICQ: 333269