Upload
edmund-wilcox
View
215
Download
0
Tags:
Embed Size (px)
Citation preview
CryptographyFundamentalsAmmar Hasayen
Back in time
SPARTANS MILITARY (GREEKS)
kryptos gráphōhidden writingCryptography
Before and after
How things worked before
Face to Face
Corporate walls Badges Paper
work
TrustConfidentiality
Authenticity Delivery
How things working Now
Virtual Team
World is the limit Digital ID
Digital Collaboratio
n
WirelessAnywhere BYOD E-transactions
C.I.A
Confidentiality
Integrity
Authenticity
ConfidentialityEncryption
….
Encryption – via Key
Encryption
AlgorithmMessage
Key (K)
EncryptedMessage
SymmetricEncryption
Encryption – Current Standards
DES3DES AES
IntegrityHashing
….
Changing Content
Encryption
Algorithm
Message
Key (K)
EncryptedMessage
Hack
2 aspirin /day
20 aspirin /day
Integrity via HashHash
AlgorithmMessage Unique
Hash Value
Hash Algorithm
001001001
Hash Algorithm
111001110
We are allMoath
Wee are allMoath
Complete SolutionEncryption
Algorithm
MessageKey (K)
EncryptedMessage
HashAlgorithm
Unique Hash Value
Encryption
AlgorithmEncryptedMessage
Key (K)
Message
Unique Hash Value
Hash Algorithm
Unique Hash Value
Hash – Current StandardsMD5
SHA1SHA-2
Thank You
….