Akademik Bilişim Konferansları Kurs Öneri Formu, V2.1 (Formun Sonundaki Notlar Bölümünü Lütfen Okuyunuz) B

Total Page:16

File Type:pdf, Size:1020Kb

Akademik Bilişim Konferansları Kurs Öneri Formu, V2.1 (Formun Sonundaki Notlar Bölümünü Lütfen Okuyunuz) B Akademik Bilişim Konferansları www.ab.org.tr Kurs Öneri Formu, v2.1 (Formun Sonundaki Notlar Bölümünü Lütfen Okuyunuz) Bölüm 1: Öneri Sahibi Eğitmene Ait Bilgiler 1. Adı, Soyadı Pınar Çomak Varsa, diğer eğitmenlerin ad ve soyadları 2. Ünvanı/Görevi Araştırma Görevlisi 3. Kurum/Kuruluş Orta Doğu Teknik Üniversitesi 4. E-posta [email protected] 5. Telefonları, iş ve/veya cep 0312 210 2987 6. Varsa, web sayfası URL 7. Eğitmenin Kısa Biyografisi Lisans eğitimini 2009 yılında ODTÜ Matematik bölümünde, yüksek lisans eğitimini 2012 yılında ODTÜ Uygulamalı Matematik Enstütüsü Kriptografi programında tamamladı. 2012 yılından bu yana Kriptografi programında doktora eğitimini sürdürmekte. 2011 yılından bu yana ODTÜ Matematik Bölümde araştırma görevilisi olarak çalışmakta. Çalışma alanı açık anahtarlı kriptografik sistemler ve kriptografik fonksiyonlardır. 8. Eğitmenin Banka Hesap Numarası (tercihan IBAN olarak) 9. Tarih 11.11.2016 Bölüm 1: Öneri Sahibi Eğitmene Ait Bilgiler 10. Adı, Soyadı Halil Kemal Taşkın Varsa, diğer eğitmenlerin ad ve soyadları 11. Ünvanı/Görevi 12. Kurum/Kuruluş Orta Doğu Teknik Üniversitesi 13. E-posta [email protected] 14. Telefonları, iş ve/veya cep 05057941029 15. Varsa, web sayfası URL 16. Eğitmenin Kısa Biyografisi 2011 yılında ODTÜ UME Kriptografi Yüksek Lisans programından mezun oldu. Halen aynı bölümde doktora eğitimine devam etmektedir. 2013 yılından beri Bilgi Güvenliği Uzmanı olarak Oran Teknoloji bünyesinde çalışmalarını sürdürmektedir. Çalışma alanları arasında eliptik eğri kriptografi, kriptografik protocol tasarımı bulunmaktadır. 17. Eğitmenin Banka Hesap Numarası (tercihan IBAN: TR690006400000142291106513 IBAN olarak) 18. Tarih 11.11.2016 Bölüm 1: Öneri Sahibi Eğitmene Ait Bilgiler 19. Adı, Soyadı Oğuz Yayla AB-Kurs-Vermek-Icin-Talep-Formu-2015-11-18-v2.1.docx Sayfa 1/ 2 Varsa, diğer eğitmenlerin ad ve soyadları 20. Ünvanı/Görevi Yrd Doç Dr 21. Kurum/Kuruluş Hacettepe Üniversitesi 22. E-posta [email protected] 23. Telefonları, iş ve/veya cep 24. Varsa, web sayfası URL 25. Eğitmenin Kısa Biyografisi Lisans eğitimini 2004 yılında ODTÜ Matematik Bölümü, yüksek lisans ve doktora eğitimini 2006 ve 2011 yıllarında ODTÜ Uygulamalı Matematik Enstitüsü Kriptografi Programı’nda tamamlamıştır. Hacettepe Üniversitesi Matematik Bölümü’nde Yrd. Doç. Dr. olarak görev yapmaktadır. İlgi alanları arasında sayılar teorisi, kombinatorik, kodlama teorisi, kriptoloji ve diziler bulunmaktadır. 26. Eğitmenin Banka Hesap Numarası TR820001200154500001101839 (tercihan IBAN olarak) 27. Tarih 11.11.2016 Bölüm 1: Öneri Sahibi Eğitmene Ait Bilgiler 1. Adı, Soyadı Sedat Akleylek Varsa, diğer eğitmenlerin ad ve soyadları 2. Ünvanı/Görevi Doç. Dr. 3. Kurum/Kuruluş Ondokuz Mayıs Üniversitesi, Bilgisayar Mühenedisliği Bölümü 4. E-posta sedat.akleylek @bill.omu.edu.tr 5. Telefonları, iş ve/veya cep 0 542 8209563 6. Varsa, web sayfası URL sites.google.com/a/bil.omu.edu.tr/akleylek/home 7. Eğitmenin Kısa Biyografisi Sedat Akleylek, lisans eğitimini 2004 yılında Ege Üniversitesi Matematik Bölümü, yüksek lisans ve doktora eğitimini 2008 ve 2010 yıllarında ODTÜ Uygulamalı Matematik Enstitüsü Kriptografi Programı’nda tamamlamıştır. Ondokuz Mayıs Üniversitesi Bilgisayar Mühendisliği Bölümü’nde Yrd. Doç. Dr. olarak görev yapmaktadır. İlgi alanları arasında, bilgi güvenliği ve kriptoloji, verimli kriptografik hesaplamalar, kuantum sonrası kriptografi bulunmaktadır. 8. Eğitmenin Banka Hesap Numarası İş Bankası, Ankara ODTÜ Şubesi (tercihan IBAN olarak) IBAN: TR210006400000142290861579 9. Tarih 11.11.2016 Bölüm 1: Öneri Sahibi Eğitmene Ait Bilgiler 10. Adı, Soyadı Murat Demircioğlu Varsa, diğer eğitmenlerin ad ve soyadları 11. Ünvanı/Görevi Doktora Öğrencisi 12. Kurum/Kuruluş ODTÜ 13. E-posta [email protected] 14. Telefonları, iş ve/veya cep 0 312 210 2987 15. Varsa, web sayfası URL 16. Eğitmenin Kısa Biyografisi 2011 yılında ODTÜ UME Kriptografi Yüksek Lisans programından mezun oldu. Halen aynı bölümde doktora AB-Kurs-Vermek-Icin-Talep-Formu-2015-11-18-v2.1.docx Sayfa 2/ 2 eğitimine devam etmektedir. 2013 yılından beri Bilgi Güvenliği Uzmanı olarak Oran Teknoloji bünyesinde çalışmalarını sürdürmektedir. Çalışma alanları arasında eliptik eğri kriptografi, kriptografik protocol tasarımı bulunmaktadır. 17. Eğitmenin Banka Hesap Numarası (tercihan IBAN olarak) 18. Tarih 25.11.2015 Bölüm 1: Öneri Sahibi Eğitmene Ait Bilgiler 19. Adı, Soyadı Emre Yüce Varsa, diğer eğitmenlerin ad ve soyadları 20. Ünvanı/Görevi 21. Kurum/Kuruluş Havelsan 22. E-posta [email protected] 23. Telefonları, iş ve/veya cep 03122102987 24. Varsa, web sayfası URL 25. Eğitmenin Kısa Biyografisi 2011 yılında ODTÜ UME Kriptografi Yüksek Lisans programından mezun oldu. Aynı bölümde 2016 yılında doktora programından mezun oldu. 2015 yılından beri Bilgi Güvenliği Uzmanı olarak Havelsan bünyesinde çalışmalarını sürdürmektedir. Çalışma alanları arasında block şifreler, siber güvenlik, kriptografik protocol tasarımı bulunmaktadır. 26. Eğitmenin Banka Hesap Numarası (tercihan IBAN olarak) 27. Tarih 11.11.2016 Bölüm 1: Öneri Sahibi Eğitmene Ait Bilgiler 28. Adı, Soyadı Hamdi Murat Yıldırım Varsa, diğer eğitmenlerin ad ve soyadları 29. Ünvanı/Görevi Dr./Öğretim Görevlisi 30. Kurum/Kuruluş Bilkent Üniversitesi 31. E-posta [email protected] 32. Telefonları, iş ve/veya cep 03122102987 33. Varsa, web sayfası URL 34. Eğitmenin Kısa Biyografisi 2008 yılında ODTÜ Matematik Doktora programından mezun oldu. 2009 yılından beri Bilkent Üniversitesinde çalışmalarını sürdürmektedir. Çalışma alanları arasında eliptik eğri kriptografi, kriptografik protocol tasarımı bulunmaktadır. 35. Eğitmenin Banka Hesap Numarası (tercihan IBAN olarak) 36. Tarih 11.11.2016 Bölüm 1: Öneri Sahibi Eğitmene Ait Bilgiler 37. Adı, Soyadı Zülfükar Saygı Varsa, diğer eğitmenlerin ad ve soyadları 38. Ünvanı/Görevi Doç. Dr. 39. Kurum/Kuruluş TOBB-ETÜ 40. E-posta AB-Kurs-Vermek-Icin-Talep-Formu-2015-11-18-v2.1.docx Sayfa 3/ 2 41. Telefonları, iş ve/veya cep 03122102987 42. Varsa, web sayfası URL 43. Eğitmenin Kısa Biyografisi Sedat Akleylek, lisans eğitimini 2002 yılında ODTÜ Matematik Bölümü, yüksek lisans ve doktora eğitimini 2004 ve 2007 yıllarında ODTÜ Uygulamalı Matematik Enstitüsü Kriptografi Programı’nda tamamlamıştır. TOBB-ETÜ Matematik Bölümü’nde Doç. Dr. olarak görev yapmaktadır. İlgi alanları arasında, bilgi güvenliği ve kriptoloji, verimli kriptografik hesaplamalar, kuantum sonrası kriptografi bulunmaktadır. 44. Eğitmenin Banka Hesap Numarası (tercihan IBAN olarak) 45. Tarih 11.11.2016 Bölüm 1: Öneri Sahibi Eğitmene Ait Bilgiler 46. Adı, Soyadı Aycan USLU Varsa, diğer eğitmenlerin ad ve soyadları 47. Ünvanı/Görevi Yüksek Lisans Öğrencisi 48. Kurum/Kuruluş Orta Doğu Teknik Üniversitesi 49. E-posta [email protected] 50. Telefonları, iş ve/veya cep 05056512328 51. Varsa, web sayfası URL 52. Eğitmenin Kısa Biyografisi Lisans eğitimini 2010 yılında ODTÜ Matematik bölümünde, 2010 yılından bu yana Kriptografi programında yüksek lisans eğitimini sürdürmekte. Çalışma alanı simetrik kriptografik sistemler ve kriptografik fonksiyonlardır. 53. Eğitmenin Banka Hesap Numarası (tercihan IBAN olarak) 54. Tarih 11.11.2016 Bölüm 2: Kursa Ait Bilgiler 1. Kurs Adı Kriptoloji 1: Kriptoloji’ye Giriş ve Uygulamaları 2. Kursun Süresi (en az yarım gün bazında, 4 gün, 3 gün, 2 gün, 1.5 gün vb, her yarım 4 gün gün= en az net 2.5 saat) 3. Kurs yarım ya da bir gün süreli ise, konferans sırasında eğitim semineri olarak sunmak ister misiniz? 4. 5. Kursun hedefi Bilgi güvenliği ve kriptografinin temelleri; modern kriptografik algoritmaları (AES, RSA, SHA-2 ve SHA-3 vb.) ve kullanım AB-Kurs-Vermek-Icin-Talep-Formu-2015-11-18-v2.1.docx Sayfa 4/ 2 alanları (rastgele sayı üreteçleri, X.509 sertifikaları ve Açık Anahtar Altyapısı, elektronik imza, Kayıtlı Elektronik Posta (KEP), kriptografik protokoller: SSL/TLS, PGP vb.); gerçek hayat uygulamaları için standartların tavsiye ettiği kriptografik algoritmaların parametreleri ve gerçekleştirme önerileri; kriptografik protokol güvenliği ve Kriptografi kullanan uygulamalar ile ilgili kurs katılımcılarına gerekli yönlendirmelere değinilerek konu ile ilgili farkındalığı artırmak amaçlanmaktadır. 6. Kursa kimler katılabilir? Başta Üniversite öğrencileri, akademisyenler, kamu ve özel kurum çalışanları olmak üzere kurs konusuna ilgi duyan herkes katılabilir. 7. Katılımcılar için ön-şartlar (varsa) Başvuru sayısına bağlı olarak, sınav yapılabilir. Sınavda orta düzeyde başarı yakalayanlar kursa katılabilir. 8. Katılımcıların kursa getirmesi gereken -Dizüstü bilgisayar. donanım/yazılım (varsa) -Eğitimin belli aşamalarında konuları örnekler ile sunmak adına kriptoloji eğitim yazılımı Cryptool (https://www.cryptool.org), openssl ve Sage matematik yazılımı (http://www.sagemath.org/doc/reference/cryptography/index.html) kullanılacaktır. 9. Azami katılımcı sayısı (varsa) Kursun verileceği anfi veya sınıfın kapasitesi ile sınırlıdır. 10. Kapsanacak Konular: 1. Yarım Gün Eğitmen: Oğuz Yayla-Pınar Çomak (her bir saat için en az bir konu başlığı) A) Temel Kavramlar (3 SAAT) Eğitmen: Oğuz Yayla-Halil Kemal i. Güvenlik Hedefleri (Gizlilik, bütünlük, kimlik Taşkın denetimi, inkar edememe ii. Kriptografi, kriptoloji, kriptanaliz kavramları iii. Şifreleme, şifre çözme, açık metin, kapalı metin iv. Klasik Şifreleme Sistemlerinden örnekler v. Anahtar uzunlukları vi. Saldırı çeşitleri (Aktif/Pasif) vii. X.800 Standardı 11. Kapsanacak Konular: 2. Yarım Gün Eğitmen: Oğuz Yayla-Zülfükar Saygı (her bir saat için en az bir konu başlığı) B) Simetrik Kriptografi (3 SAAT) i. Blok şifreler AES Blok şifre
Recommended publications
  • Implementation and Didactical Visualization of the Chacha Cipher Family in Cryptool 2
    Implementation and Didactical Visualization of the ChaCha Cipher Family in CrypTool 2 Bachelor’s Thesis Ramdip Gill Supervisor Priv.-Doz. Dr. Wolfgang Merkle Second Supervisor Prof. Dr. Frederik Armknecht Heidelberg, December 11, 2020 Faculty of Mathematics and Computer Science Heidelberg University ABSTRACT This thesis is about the implementation of the ChaCha plug-in in CrypTool 2. The thesis introduces the ChaCha cipher family, explains what the plug-in is capa- ble of, and gives insight into the development process of the plug-in. ChaCha is used in the Transport Layer Security protocol (TLS) since 2014 and so very relevant for applied modern cryptography. Because of the importance of ChaCha its internal design should be made more accessible to the broader public. This is the actual goal of the plug-in. The goal is achieved by focusing on an in-depth but easy to understand visualiza- tion of the encryption process. CrypTool 2 is the most popular e-learning platform in the field of cryptology, used in schools, universities, and companies. Incorporat- ing this plug-in into CrypTool 2 helps to reach a broad audience. iii ZUSAMMENFASSUNG Diese Bachelorarbeit befasst sich mit der Implementierung des ChaCha Plugins für CrypTool 2. Die Arbeit stellt die Familie der ChaCha-Chiffren vor; erklärt, wozu das Plugin in der Lage ist; und gibt Einblick in den Entwicklungsprozess des Plugins. ChaCha wird seit 2014 im Transport Layer Security-Protokoll (TLS) verwendet und ist daher für die angewandte moderne Kryptographie sehr relevant. Aufgrund der Bedeutung von ChaCha sollte sein internes Design der breiten Öffentlichkeit zu- gänglicher gemacht werden.
    [Show full text]
  • Cryptology with Jcryptool V1.0
    www.cryptool.org Cryptology with JCrypTool (JCT) A Practical Introduction to Cryptography and Cryptanalysis Prof Bernhard Esslinger and the CrypTool team Nov 24th, 2020 JCrypTool 1.0 Cryptology with JCrypTool Agenda Introduction to the e-learning software JCrypTool 2 Applications within JCT – a selection 22 How to participate 87 JCrypTool 1.0 Page 2 / 92 Introduction to the software JCrypTool (JCT) Overview JCrypTool – A cryptographic e-learning platform Page 4 What is cryptology? Page 5 The Default Perspective of JCT Page 6 Typical usage of JCT in the Default Perspective Page 7 The Algorithm Perspective of JCT Page 9 The Crypto Explorer Page 10 Algorithms in the Crypto Explorer view Page 11 The Analysis tools Page 13 Visuals & Games Page 14 General operation instructions Page 15 User settings Page 20 Command line parameters Page 21 JCrypTool 1.0 Page 3 / 92 JCrypTool – A cryptographic e-learning platform The project Overview . JCrypTool – abbreviated as JCT – is a free e-learning software for classical and modern cryptology. JCT is platform independent, i.e. it is executable on Windows, MacOS and Linux. It has a modern pure-plugin architecture. JCT is developed within the open-source project CrypTool (www.cryptool.org). The CrypTool project aims to explain and visualize cryptography and cryptanalysis in an easy and understandable way while still being correct from a scientific point of view. The target audience of JCT are mainly: ‐ Pupils and students ‐ Teachers and lecturers/professors ‐ Employees in awareness campaigns ‐ People interested in cryptology. As JCT is open-source software, everyone is capable of implementing his own plugins.
    [Show full text]
  • Visualization of the Avalanche Effect in CT2
    University of Mannheim Faculty for Business Informatics & Business Mathematics Theoretical Computer Science and IT Security Group Bachelor's Thesis Visualization of the Avalanche Effect in CT2 as part of the degree program Bachelor of Science Wirtschaftsinformatik submitted by Camilo Echeverri [email protected] on October 31, 2016 (2nd revised public version, Apr 18, 2017) Supervisors: Prof. Dr. Frederik Armknecht Prof. Bernhard Esslinger Visualization of the Avalanche Effect in CT2 Abstract Cryptographic algorithms must fulfill certain properties concerning their security. This thesis aims at providing insights into the importance of the avalanche effect property by introducing a new plugin for the cryptography and cryptanalysis platform CrypTool 2. The thesis addresses some of the desired properties, discusses the implementation of the plugin for modern and classic ciphers, guides the reader on how to use it, applies the proposed tool in order to test the avalanche effect of different cryptographic ciphers and hash functions, and interprets the results obtained. 2 Contents Abstract .......................................... 2 Contents .......................................... 3 List of Abbreviations .................................. 5 List of Figures ...................................... 6 List of Tables ....................................... 7 1 Introduction ..................................... 8 1.1 CrypTool 2 . 8 1.2 Outline of the Thesis . 9 2 Properties of Secure Block Ciphers ....................... 10 2.1 Avalanche Effect . 10 2.2 Completeness . 10 3 Related Work ..................................... 11 4 Plugin Design and Implementation ....................... 12 4.1 General Description of the Plugin . 12 4.2 Prepared Methods . 14 4.2.1 AES and DES . 14 4.3 Unprepared Methods . 20 4.3.1 Classic Ciphers, Modern Ciphers, and Hash Functions . 20 4.4 Architecture of the Code . 22 4.5 Limitations and Future Work .
    [Show full text]
  • CEH: Certified Ethical Hacker Course Content
    CEH: Certified Ethical Hacker Course ID #: 1275-100-ZZ-W Hours: 35 Course Content Course Description: The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in. The CEH, is the first part of a 3 part EC-Council Information Security Track which helps you master hacking technologies. You will become a hacker, but an ethical one! As the security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment. This course was designed to provide you with the tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. It puts you in the driver’s seat of a hands-on environment with a systematic ethical hacking process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be thought the Five Phases of Ethical Hacking and thought how you can approach your target and succeed at breaking in every time! The ve phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks. The tools and techniques in each of these five phases are provided in detail in an encyclopedic approach to help you identify when an attack has been used against your own targets.
    [Show full text]
  • Cryptool 2 in Teaching Cryptography
    Journal of Computations & Modelling, vol.4, no.1, 2014, 349-358 ISSN: 1792-7625 (print), 1792-8850 (online) Scienpress Ltd, 2014 Cryptool 2 in Teaching Cryptography Major Konstantinos Loussios1 Abstract. Considering the value it had in the past, has continued to the present and will continue to have, perhaps to an even greater extent in the future concealing information during transmission or transport, leads automatically to attempt to discover the importance and the value of the means, methods and techniques used to implement the concealment. Cryptography is a branch of computer science attracts the attention with its great utility that has nowadays. Given therefore deemed necessary to standardize, analyze and present the encryption algorithms to learning and training on the operation with as efficiently and easily as possible. Having in mind that the theory must be accompanied by practice and examples that help to consolidate the syllabi material, we felt that the analytical presentation of an educational tool on learning algorithms of cryptography is a way of learning while embedding. The learning tool cryptool 2 is an implementation of all the above, and through this we will try to show, those essential functions, which help the user with visual and practical way, to see in detail all the properties and functional details of the algorithms contained, will present representative examples of functioning algorithms, we proceed to create digital signatures and will implement the cryptanalysis algorithms. The above is an object of study and teaching in the professional area of land, in the field of communications and transmissions-service systems. Knowing, however, that historically since the antiquity, first we Greeks, we use encryption in a simple form, for military purposes, but later down through the years and fighting wars around the world, the art encryption and decryption evolved and became object of all armies and weapons.
    [Show full text]
  • Network Security (NS) Subject Code: 3640004
    GUJARAT TECHNOLOGICAL UNIVERSITY Master in Computer Applications Year IV – (Semester-VI) (W.E.F. Dec 2016) Subject Name: Network Security (NS) Subject Code: 3640004 1. Learning Objectives: After completion of this course student will be able to: Understand OSI security architecture, threats, vulnerabilities and various types of attacks. Understand and apply the various symmetric key algorithms. Understand and apply the various asymmetric key algorithms. Understand the concepts of hashing with algorithms and apply them. Understand and use the message authentication and its requirement. Understand the concepts of digital signature and digital certificates. Analyze the use of Authentication applications, Web, IP and Email security. Evaluate the need of Intrusion Detection and Firewalls. 2. Prerequisites: Fundamentals of Networking, Mathematical Concepts: Number theory, finite fields and Random number. 3. Contents: Unit Chapter Details Weightage No. of No. Lecture 1 Introduction 05% 2 Computer Security Concepts, The OSI Security Architecture, Security Attacks, Security Services, Security Mechanisms, A Model for Network Security. 2 Cryptography: Symmetric Encryption, Message 25% 10 Confidentiality, Public-Key Cryptography and Message Authentication Symmetric Encryption Principles, Symmetric Block Encryption Algorithms, Random and Pseudorandom Numbers, Stream Ciphers and RC4,Cipher Block Modes of Operation. Approaches to Message Authentication, Secure Hash Functions, Message Authentication Codes, Public-Key Cryptography Principles, Public-Key Cryptography Algorithms, Digital Signatures. 3. Key Distribution and User Authentication, Transport- 25% 10 Level Security, HTTPS and SSH Symmetric Key Distribution Using Symmetric Encryption, Kerberos, Key Distribution Using Asymmetric Encryption, X.509 Certificates,Public-Key Infrastructure. Web Security Considerations, Secure Socket Layer and Transport Layer Security, Transport Layer Security, HTTPS, Secure Shell (SSH) .
    [Show full text]
  • Multicast Routing Over Computer Networks: Secure Performance Designs
    Digital Forensics in the Cloud: Encrypted Data Evidence Tracking ZHUANG TIAN, BSc (Hons) a thesis submitted to the graduate faculty of design and creative technologies Auckland University of Technology in partial fulfilment of the requirements for the degree of Master of Forensic Information Technology School of Computer and Mathematical Sciences Auckland, New Zealand 2014 ii Declaration I hereby declare that this submission is my own work and that, to the best of my knowledge and belief, it contains no material previously published or written by another person nor material which to a substantial extent has been accepted for the qualification of any other degree or diploma of a University or other institution of higher learning, except where due acknowledgement is made in the acknowledgements. ........................... Zhuang Tian iii Acknowledgements This thesis was completed at the Faculty of Design and Creative Technologies in the school of Computing and Mathematical Sciences at Auckland University of Technology, New Zealand. While conducting the research project I received support from many people in one way or another, without whose support, this thesis would not have been completed in its present form. It is my pleasure to take this opportunity to thank all of you, without the intention or possibility to be complete. I would like to apologize to those who I did not mention by name here; however, I highly value your kind support. Firstly, I would like to deeply thank my thesis supervisor Prof. Brian Cusack for the exceptional support given during the thesis project. He provided me with the freedom to explore research directions and to choose the routes that I wanted to investigate.
    [Show full text]
  • Enhancing the Security of AES Algorithm Using Quantum Three-Pass Protocol
    International Journal of Security and Its Application Vol.11, No.1 (2017), pp.219-232 http://dx.doi.org/10.14257/ijsia.2017.11.1.18 Enhancing the Security of AES Algorithm using Quantum Three-Pass Protocol Rajeev Kumar Gupta*, R. K. Pateriya and Ankita Patil MANIT Bhopal, 462003, India [email protected], [email protected], [email protected] Abstract In this paper, a hybrid cryptosystem is presented combining classical cryptography with quantum cryptography, in which the secure key distribution between the parties utilizing AES cipher is performed using quantum three-pass protocol. This protocol guarantees the absolutely secure key transmission whose security relies on the no-cloning theorem of quantum mechanics. The key is transmitted in the form of polarized photons, which is further encrypted by rotating each photon by a certain angle. This key is utilized by AES (Advance encryption Standard) cryptosystem which is a symmetric block cipher whose strength relies on the substitution box (S-box) that introduces non linearity into the cryptosystem. The S-box used in the existing AES is fixed which may pose security threats if scrutinized by an attacker. Hence, in this paper, a key-dependent S-box is also proposed which is tested to satisfy the properties such as avalanche effect, strict avalanche criteria and confusion property. The results show that the proposed algorithm is effective for generating a key-dependent S-box and since the S-box is not pre-calculated, it can strengthen the AES cryptosystem against attacks launched by the fixed S-box analysis. Keywords: AES, Avalanche effect, Quantum key distribution, Quantum three-pass protocol, S-box.
    [Show full text]
  • Lecture 15: Encryption and Anonymity
    1 CS-340 Introduction to Computer Networking Lecture 15: Encryption and Anonymity Steve Tarzia Last Lecture: Ethernet Link Layer 2 • Link layer handles error detection and correction: Parity, Checksum, and Cyclic Redandancy Check (CRC). • Ethernet adds MAC addresses to identify src/dst on a shared link. • ARP uses Ethernet broadcast to find IP address → MAC address mapping • DHCP requests are sent by Ethernet broadcast (to FF:FF:FF:FF:FF:FF) • Old Ethernet hubs broadcasted data to all ports. • Ethernet switches learn/remember which MAC addresses are reachable on each port and relay traffic only to the appropriate ports. • Reduce broadcast traffic and eliminate collisions. • VLANs create multiple isolated LANs/subnets on one switch. • Data Centers & Supercomputers demand fast local networks. Network Security Overview 3 STOP Why is the STOP How would you and and define "network THINK Internet difficult THINK Goals security?" Challenges to secure? • Confidentiality: • Internet messages travel through Keep message private/secret. untrusted, 3rd-party links and routers. • Routers must see all bits of the packet to • Reliability: copy it to the next hop. Deliver message to the intended recipient. Don't drop it! • Local networks use shared media. • Nearby Ethernet or WiFi hosts can often • Integrity: see your packets. Deliver message without alteration. • DNS may be poisoned, sending you to the • Authentication: wrong IP address. Verify the identity of the endpoint I’m communicating with. • Individual attackers, corporations, and governments all wish to violate your • Anonymity: network security. Conceal relationship between two Internet hosts. Conceal who I am talking to. • IP packets must be addressed to reach destination.
    [Show full text]
  • Draft Version
    Zurich of University the at Security IT on lecture the for reading complementary as ISBN: 978-1-63081-846-3 used be can This text is extracted from the book “Cryptography 101: From Theory to Practice” that was writtentext by Rolf Oppliger and published by Artech House in June 2021 (in its Information Security and Privacy book series). This Zurich of Chapter 1 University the at Introduction Security In this chapter, we pitch the field and introduce the topicIT of the book, namely cryp- tography, at a high operating altitude and level ofon abstraction. More specifically, we elaborate on cryptology (including cryptography) in Section 1.1, address crypto- graphic systems (or cryptosystems for short) in Section 1.2, provide some historical background information in Section 1.3, andlecture outline the rest of the book in Section 1.4. The aim is to lay the basics to understand and put into proper perspective the the contents of the book. for 1.1 CRYPTOLOGY reading The term cryptology is derived from the Greek words “krypt´os,” meaning “hidden,” and “l´ogos,” meaning “word.” Consequently, the term cryptology can be paraphrased as “hidden word.” This refers to the original intent of cryptology, namely to hide the meaning of words and to protect the confidentiality and secrecy of the respective data accordingly. As will (hopefully) become clear throughout the book, this viewpoint is too narrow,complementary and the term cryptology is currently used for many other security- related purposesas and applications in addition to the protection of the confidentiality and secrecy of data. More specifically, cryptology refers to the mathematical science and field of used study that comprises cryptography and cryptanalysis.
    [Show full text]
  • Solving Classical Ciphers with Cryptool 2
    Solving Classical Ciphers with CrypTool 2 Nils Kopal Applied Information Security – University of Kassel Pfannkuchstr. 1, 34121 Kassel, Germany [email protected] Abstract torians. In such cases, cryptanalysts and image- processing experts are needed to support decipher- The difficulty of solving classical ciphers ing the books, thus, enabling the historians to con- varies between very easy and very hard. tinue their research. For example, monoalphabetic substitution The ciphers used in historical books (from ciphers can be solved easily by hand. the early antiquity over the Middle Ages to the More complex ciphers like the polyalpha- early modern times) include simple monoalpha- betic Vigenere` cipher, are harder to solve betic substitution and transposition ciphers, code- and the solution by hand takes much more books and homophone ciphers. time. Machine ciphers like the Enigma With the open-source tool CrypTool 2 (CT2) rotor machine, are nearly impossible to (Kopal et al., 2014) historians and cryptanalysts be solved only by hand. To support have a powerful tool for the analysis as well as researchers, cryptanalysts, and historians for the (automatic) decryption of encrypted texts. analyzing ciphers, the open-source soft- Throughout this paper, we present how CT2 can ware CrypTool 2 (CT2) was implemented. be used to actually break real world ciphertexts. It contains a broad set of tools and meth- The following parts of this paper are structured ods to automate the cryptanalysis of dif- as follows: The next section gives a short introduc- ferent (classical and modern) ciphers. In tion to classical ciphers, as well as an overview of this paper, we present a step-by-step ap- cryptanalysis.
    [Show full text]
  • Introduction to Cryptool 2
    Workshop: Introduction to CrypTool 2 Workshop – Prague October 2018 CrypTool – A Wide-Spread and Free Program to Help Raising Crypto Awareness Prof. Bernhard Esslinger Introduction During this workshop you will learn how to apply CrypTool 2 (CT2) to encrypt and decrypt texts using different ciphers. We will briefly present some attacks on the ciphers as well as a basic introduction to password (in-)security. You will touch the understanding of the importance of some cryptographic concepts like randomness. This exercise material can also be used as an instruction manual for CT2. Structure of this workshop 1. Symmetric Cryptography ................................................................................................................ 2 a. Classic Cipher (Caesar) ................................................................................................................ 2 b. Modern Cipher (AES) .................................................................................................................. 5 2. Asymmetric Cryptography (RSA Cipher) ........................................................................................ 9 3. Password Security ......................................................................................................................... 15 Appendix 1: Introduction to the CrypTool 2 Application .................................................................... 17 Appendix 2: Task Overview .................................................................................................................
    [Show full text]