We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byPhebe McDaniel
Modified over 2 years ago
Part One: Review of the Knowledge in Textbook goals, issues, solutions Part Two: Current Application X509.V3 Part Three: Future Work
goals Issues solutions
Goals: Secrecy Integrity Availability Reliability Safety
Issues: Access authorization discretionary access control mandatory access control Message Security cryptography Mutual Authentication cryptography
Cryptography: private key system public key system protocol: Kerberos, X.509
DES RSA MD5
Certificate ◦ Version ◦ Serial Number ◦ Signature Algorithm ◦ Issuer ◦ Validity Subject ◦ Subject Public Key Info Public Key Algorithm Subject Public Key ◦ Issuer Unique Identifier (Optional) ◦ Subject Unique Identifier (Optional) ◦ Extensions (Optional) Certificate Signature Algorithm Certificate Signature (http://en.wikipedia.org/wiki/X.509)
Customer Kc-private Kb-public Bank Kb-private Kc-public 1. A = RSA(Information, Kb-public) 2. B = RSA(A, Kc-private) 3. Send A,B
Customer Kc-private Kb-public Bank Kb-private Kc-public 1.Signature: (1). A = MD5(information) (2). B = RSA(A, Kc-private) 2. Encrypt: (1). Generate 128bits DES Key (2). C = DES(information, K-des) (3). D = RSA(K-des, Kb-public) 3. Send B, C, D
Customer Kc-private Kb-public Kca-public Bank Kb-private Kc-public Certificate Authority: Kca-private Kb-public RSA( MD5(Kb-public), Kca-private)
A new kind of private key
Randy Chow, Theodore Johnson. Distributed Operating Systems& Algorithms. Addison Wesley, 1997 X.509. http://en.wikipedia.org/wiki/X.509http://en.wikipedia.org/wiki/X.509 Public key certificate. http://en.wikipedia.org/wiki/Digital_Certificate http://en.wikipedia.org/wiki/Digital_Certificate Introduction to the digital certificates. http://hi.baidu.com/chenxu321/blog/item/783d100834aa50 d862d986ca.html http://hi.baidu.com/chenxu321/blog/item/783d100834aa50 d862d986ca.html Principles of digital certificates. http://blog.csdn.net/liukeforever/archive/2009/07/31/4396 521.aspx
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Security CNS 4650 Fall 2004 Rev. 2 SSL, SASL, PKI.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
PIS: Unit III Digital Signature & Authentication Sanjay Rawat PIS Unit 3 Digital Sign Auth Sanjay Rawat1 Based on the slides of Lawrie.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
1 Certification Issue : how do we confidently know the public key of a given user? Authentication : a process for confirming or refuting a claim of identity.
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Cryptography Why Cryptography Symmetric Encryption Key exchange Public-Key Cryptography Key exchange Certification.
AUTHENTICATION AND KEY DISTRIBUTION
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Digital Signatures. Anononymity and the Internet.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Secure Socket Layer (SSL)
Chapter 14 – Authentication Applications
Secure Electronic Transaction (SET)
Security Chapter 8.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
An In-Depth Examination of PKI Strengths, Weaknesses and Recommendations.
KERBEROS. Introduction trusted key server system from MIT.Part of project Athena (MIT).Developed in mid 1980s. provides centralised private-key third-party.
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Elliptic Curve Cryptography
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Distribution and X.509 Wade Trappe. Distribution of Public Keys There are several techniques proposed for the distribution of public keys:
Chapter 31 Network Security
Attribute Certificate By Ganesh Godavari. Talk About An Internet Attribute Certificate for Authorization -- RFC 3281.
CS5204 – Operating Systems 1 Authentication. CS 5204 – Operating Systems2 Authentication Digital signature validation proves: message was not altered.
Galileo - Knowledge Testing Service e-MSoft Artur Majuch.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 30 Message Security, User Authentication, and Key Management.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
GRID-FR French CA Alice de Bignicourt.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key in the first place? Solutions: Deffie-Hellman trusted key distribution.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Introduction to Secure Sockets Layer (SSL) Protocol Based on: https://developer.mozilla.org/En/Introduction_to_SSL#The_SSL_Protocol.
Information Security Fundamentals Major Information Security Problems and Solutions Department of Computer Science Southern Illinois University Edwardsville.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
Stacey Levine. History of cryptography Why cryptography? Private Key Systems Public Key Systems Comparisons and PEM (not) The future - Quantum Cryptography.
© 2017 SlidePlayer.com Inc. All rights reserved.