Introduction to Cryptography at Mustansiriyah University Engineering College

mustansiriyah university engineering college n.w
1 / 4
Embed
Share

Explore the Data Encryption course at Mustansiriyah University Engineering College, delving into the art and science of cryptography. Covering key terms, basic cryptographic systems, security services, and attacks, this overview provides insights into data protection strategies in computer engineering. Learn about encryption, decryption, security mechanisms, services like authentication and access control, and the importance of data confidentiality and integrity in safeguarding information. Join the journey into the world of cryptography led by Lecturer Fatimah Al-Ubaidy.

  • Cryptography
  • Data Encryption
  • Computer Engineering
  • Mustansiriyah University
  • Security

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Mustansiriyah University Engineering College Introduction to Cryptography Course name: Data Encryption Computer Engineering Dep. Introduction to Cryptography Lecturer: Fatimah Al-Ubaidy Introduction to Cryptography Class: Third Year Cryptography: is the art and science of keeping messages secure. *The whole point of cryptography is to keep the plaintext (or the key, or both) secret from eavesdroppers (also called adversaries, attackers, interceptors, intruders, opponents). Basic Cryptographic System 1

  2. Mustansiriyah University Engineering College Introduction to Cryptography Course name: Data Encryption Computer Engineering Dep. Introduction to Cryptography Lecturer: Fatimah Al-Ubaidy Introduction to Cryptography Class: Third Year Key Terms Key: The piece of information that allows you to either encrypt or decrypt your data. Plaintext: The information that you want to keep hidden, in its unencrypted form. The plaintext can be any data at all: a picture, a spreadsheet, .etc. Ciphertext: The information in encrypted form. Cipher: The algorithm that converts plaintext to ciphertext and vice-versa. Cryptanalysis: is the science of recovering the plaintext of a message with/without access to the key. Security attack: Any action that compromises the security of information owned by an organization. It can be divided into passive and active attacks Security mechanism: A process that is designed to detect, prevent, or recover from a security attack such as encryption algorithms, digital signatures, and authentication protocols.. Security service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization such as access control. Key management: allows to negotiate, setup and maintain keys between communicating entities. 2

  3. Mustansiriyah University Engineering College Introduction to Cryptography Course name: Data Encryption Computer Engineering Dep. Introduction to Cryptography Lecturer: Fatimah Al-Ubaidy Introduction to Cryptography Class: Third Year Security Services Authentication: The assurance that the communicating entity is the one that it claims to be. Access Control: The prevention of unauthorized use of a resource (i.e., this service controls who can have access to a resource, under what conditions access can occur, and what those accessing the resource are allowed to do). Data confidentiality: The protection of data from unauthorized disclosure. Data integrity: The assurance that data received are exactly as sent by an authorized entity (i.e., contain no modification, insertion, deletion, or replay). Nonrepudiation: Provides protection against denial by one of the entities involved in a communication of having participated in all or part of the communication. Availability: guarantees that the system services are always available when needed. 3

  4. Mustansiriyah University Engineering College Introduction to Cryptography Course name: Data Encryption Computer Engineering Dep. Introduction to Cryptography Lecturer: Fatimah Al-Ubaidy Introduction to Cryptography Class: Third Year Security Attack (1) Passive attack is in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent is to obtain information that is being transmitted. Two types of passive attacks are release of message contents and traffic analysis. 4

More Related Content