Professional Documents
Culture Documents
Cryptography: Securing The Information Age: Made By: Mansi Sharma
Cryptography: Securing The Information Age: Made By: Mansi Sharma
Cryptography: Securing The Information Age: Made By: Mansi Sharma
Made by:
Mansi Sharma
• Encryption
Plain text Cipher text
• Decryption
Cipher text Plain text
Information Security for…
• Defending against external/internal hackers
• Defending against industrial espionage
• Securing E-commerce
• Securing bank accounts/electronic transfers
• Securing intellectual property
• Avoiding liability
Threats to Information Security
Pervasiveness of email/networks
The sender uses this key and an encription algorithm to encrypt data ; receiver
uses the same key and the corresponding decription algorithm to decrypt the data.
• Data secrecy
• Data integrity
• Authentication of
message originator
• Electronic certification
and digital signature
• Non-repudiation
Source: http://www.princeton.edu/~hos/h398/matrix.j
Potential Problems with Cryptographic
Technologies?
• False sense of security if
badly implemented
• Government regulation of
cryptographic
technologies/export
restrictions
• Encryption prohibited in
some countries Source: http://www.tudor-portraits.com/Mary%20Scots%20
How Secure are Today’s Technologies?
• $250,000 machine cracks 56 bit key DES code in 56
hours
• IDEA, RC5, RSA, etc. resist complex attacks when
properly implemented
• distributed.net cracked 64 bit RC5 key (1,757
days and 331,252 people) in July, 2002
• A computer that breaks DES in 1 second will take 149
trillion years to break AES!
• Algorithms are not theoretically unbreakable:
successful attacks in the future are possible
How Secure are Today’s Technologies?