1 / 15

Using Cryptography to Protect Data in Computer Networks: case study

This case study by Vsevolod Ievgiienko from the National Taras Shevchenko University of Kiev explores the critical role of cryptography in safeguarding data across computer networks. It discusses various types of information security violations, including disconnection, interception, and modification, and highlights key security services such as confidentiality, authentication, and integrity. Additionally, the study examines symmetric and asymmetric encryption algorithms, including RSA, AES, and Blowfish, emphasizing their importance in business, banking, and online transactions.

nevan
Télécharger la présentation

Using Cryptography to Protect Data in Computer Networks: case study

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Using Cryptography to Protect Data in Computer Networks: case study Vsevolod Ievgiienko National Taras Shevchenko University of Kiev Faculty of Cybernetics Ukraine

  2. Introduction Information security • Business • Banks • Online payments • Individual persons

  3. Introduction Computer System Reliability Security Safety … Cryptography … …

  4. Security • Security is considered as a part of reliability and survivability problem • “Who watches the watchmen?”

  5. Safety Optimization problem • x - system configuration • C - system cost • R - system reliability index • S - system safety index

  6. Information security problems Types of violations • Disconnection • Interception • Modification • Falsification

  7. Information security problems Violations Active Passive - imitation - stream analysis - recreation - modification - hindering in service

  8. Information security problems System security services • Confidentiality • Authentication • Integrity • Impossibility ofrefuse

  9. Algorithms Symmetric (DES, AES, Blowfish, Serpent, Twofish) • E – encryption • D – decryption • К – secret key • М – message • С – encrypted message

  10. Algorithms Asymmetric (RSA, Elgamal, Elliptic Curves Cryptography) • E – encryption • D – decryption • КUx – public key (user X) • КRx – private key (user X) • М – message • С – encrypted message

  11. Principles of planning Principle of different types Use a few algorithms of one type that have a different structure

  12. Encryption software solution Remoteencrypted file system Secret messaging

  13. Encryption algorithms • RSA with up to 4096-bit keys • Digital signatures based on RSA • Trustedtimestamping • X.509 3-steps authentication • Blowfish with 448-bit keys • SHA-256 and SHA-512 hash functions • HMAC-SHA-256 • modified ANSI X9.17 pseudo-random numbers generator • PKCS5 for making keys from passwords • Deflate compression algorithm • CRC32 checksums • DoD-5220.22-M for data wiping

  14. Sources • “Reliability: past, present, future”, I. Ushakov • “Applied Cryptography”, B. Schneier • “Handbook of Applied Cryptography”, A. Menezes, P. van Oorschot, S. Vanstone • www.wasm.ru/forum • www.pgpru.com • www.pgp.com • www.gnupg.org • www.cipherwall.com • http://www.financialcryptography.com • http://www.schneier.com

  15. THE END Questions? Contacts: E-mail:admin@rest-company.kiev.ua Tel: +38050-3-555-999 ICQ: 333269

More Related