TeleTrusT (TTT Förderpreis) NRW (IT Security Award NRW) RSA Europe (Finalist of European Information Security Award 2004) “Selected Landmark” in initiative “Germany – Land of Ideas" NET version and Java version – Hosted by University of Duisburg (Prof. Weis) and SourceForge Origin in awareness program of a bank (in‐firm training) Æ Awareness for employees Developed in co‐operation with universities (improving education) Æ Media didactic approach and standard oriented 1998 Project start – effort more than 17 man‐years since then 2000 CrypTool available as freeware 2002 CrypTool on Citizen‐CD‐ROM from BSI (German Information Security Agency) 2003 CrypTool becomes Open‐Source – Hosting by University of Darmstadt (Prof. Eckert) 2007 CrypTool available in German, English, Polish und Spanish 2008. Non‐Repudiation – The principle that, afterwards, it can be proven that the participants of a transaction did really authorize the transaction and that they have no means to deny their participation.
Integrity – Integrity ensures that data has not been altered or destroyed in an unauthorized manner. Authentication – Authentication ensures that users are identified and those identities are appropriately verified. Breakthrough for cryptography started with the broad use of the Internet For companies and governments it is important that systems are secure and … users (clients, employees) have a certain understanding and awareness for IT security! CrypTool 1.4.30Ĭryptography – Objectives Confidentiality – Information can practically not be made available or disclosed to unauthorized individuals, entities or processes. Cryptography is a modern, mathematically characterised science. Cryptography is no longer limited to agents, diplomats or the military. Phone cards, cell phones, remote controls Cash machines, money transfer between banks Electronic cash, online banking, secure eMail Satellite TV, Pay TV Immobiliser systems in cars Digital Rights Management (DRM) Relevance of Cryptography Examples for Cryptography Usage Source: Britannica (A similar definition can be found on Wikipedia: CrypTool 1.4.30 Its principles apply equally well, however, to securing data flow between computers or to encrypting television signals. . Today the modern (mathematical) science of cryptology contains not only mechanisms for encryption but also for integrity, electronic signatures, random numbers, secure key exchange, secure containers, electronic voting and electronic money, and has achieved to render a broad range of applications in modern life. Project / Outlook / Contactĭefinition Cryptology and Cryptography Cryptology (from the Greek kryptós, "hidden," and lógos, "word") is the science of secure (generally secret) communications. This security obtains from legitimate users, the transmitter and the receiver, being able to transform information into a cipher by virtue of a key ‐‐ i.e., a piece of information known only to them. Although the cipher is inscrutable and often unforgeable to anyone without this secret key, the authorized receiver can either decrypt the cipher to recover the hidden information or verify that it was sent in all likelihood by someone possessing the key.Ĭryptography was concerned initially with providing secrecy for written messages. Password quality mete (PQM) and password entropy 22. Learning tool for number theory and asymmetric encryption 20. Generation of a message authentication code (MAC) 18. Visualisation of symmetric encryption methods using ANIMAL 15. Implementation of CRT in astronomy (solving linear modular equation systems) 14. Secret Sharing using the Chinese Remainder Theorem (CRT) and Shamir 13. Random analysis with 3‐D visualisation 12. Challenges for developersĮncryption with RSA / Prime number test / Hybrid encryption and digital certificates / SSL Digital signature visualised Attack on RSA encryption (modul N too short) Analysis of encryption in PSION 5 Weak DES keys Locating key material (“NSA Key”) Attack on digital signature through hash collision search Authentication in a client‐server environment Demonstration of a side channel attack (on hybrid encryption protocol) (…)Ĭontent (II) III. 4.ĭefinition and relevance of cryptology The CrypTool project Examples of classical encryption methods Insights from cryptography development
Prof. Bernhard Esslinger and CrypTool‐Team, Feb. 2009Ĭontent (I) I. Scope, Technology and Future of CrypTool CrypTool 1.4.30 Introduction to Cryptography und Cryptanalysis