Security Through Encryption. Different ways to achieve security of communication data Keep things under lock and key – Physical Encryption Through password.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

CP3397 ECommerce.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
Digital Signatures. Anononymity and the Internet.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Class on Security Raghu. Current state of Security Cracks appear all the time Band Aid solutions Applications are not designed properly OS designs are.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Topic 11: Key Distribution and Agreement 1 Information Security CS 526 Topic 11: Key Distribution & Agreement, Secure Communication.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Computer Science Public Key Management Lecture 5.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
How HTTPS Works J. David Giese. Hyper Text Transfer Protocol BrowserHTTP Server GET / HTTP/1.1 HOST: edge-effect.github.io HEADERS BODY HTTP/ OK.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
May 2002Patroklos Argyroudis1 A crash course in cryptography and network security Patroklos Argyroudis CITY Liberal Studies.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Security+ All-In-One Edition Chapter 14 – and Instant Messaging Brian E. Brzezicki.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
David Evans CS200: Computer Science University of Virginia Computer Science Class 36: Public-Key Cryptography If you want.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Public Key Encryption.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Digital Signatures, Message Digest and Authentication Week-9.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
1 Thuy, Le Huu | Pentalog VN Web Services Security.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Topic 14: Secure Communication1 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication.
Electronic Banking & Security Electronic Banking & Security.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Digital Signatures.
Computer Communication & Networks
Public Key Encryption Systems
Uses Uses of cryptography Lab today on RSA
Protocol ap1.0: Alice says “I am Alice”
Electronic Payment Security Technologies
Fluency with Information Technology Lawrence Snyder
Public Key Encryption Systems
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

Security Through Encryption

Different ways to achieve security of communication data Keep things under lock and key – Physical Encryption Through password protection

Sender, Listener, Eavesdropper

What is the most frequent concern you have about browsing and security? A.Someone might steal my password, credit card etc. B.I might get viruses on my machine C.My privacy might be compromised by eavesdropping to determine what I view, buy etc. D.All E.None

Encryption, Authentication, Non- repudiation Encryption – Make sure that a message, once encrypted, cannot be read by anyone. Perhaps your grades are mailed to you in this way, and accessible only with a password. – Without a password, message is visible, but looks like junk.

Encryption, Authentication, Non- Repudiation Authentication – Ensure that a message is sent by authentic person. – For example, ensure that is actually Bank of America’s website. – Ensure that is indeed from your friend.

Encryption, Authentication, Non- Repudiation Non-repudiation – Ensure that the sender cannot claim not to have sent a message that he/she sent. – For example, if you signed an agreement or tax return online, later you cannot claim that it was sent by someone else pretending to be you. – Similar to putting your thumbprint on a document.

What is https? Secure way of browsing – Ensures authenticity of web server that ‘serves’ the web page to the user, or ‘client’. – Encrypts the data so that the data transmissions, in both directions, cannot be read by eavesdropping.

Public Key Cryptography Symmetric key algorithm – Both sender and receiver have the same key – If I send you my password by SMS, and you use it to access my , that is the equivalent of a symmetric key algorithm Public key cryptography is an asymmetric key algorithm, where 1 public key is used to lock (encrypt) and another private to unlock (decrypt)

Some public key algorithms provide key distribution and secrecy (e.g., Diffie–Hellman key exchange), some provide digital signatures (e.g., Digital Signature Algorithm), and some provide both (e.g., RSA).

Asymmetric Key and Encryption Encryption: Anyone can encrypt a message using a public key. Only Alice can retrieve it. It is like a mailbox whose location is the public key. Anyone can drop stuff in, but only the owner can retrieve the message. Security depends on the secrecy of the private key. Knowing the public key is not enough to compute the private key.

Diffie-Hellman Key Exchange Can be used for authentication Can be used for a digital signature. Digital signature is like a wax seal on an envelop. Anyone can open the envelop, but the seal means that the sender was the original person – authentication and non-repudiation.

Using a key Shared secret can be the key used to encrypt transmission. – This symmetric key is faster to use than asymmetric keys – Keys can be discarded after each session, and new ones calculated for each fresh sessions

How it worksHow it works -- RSA Difficulty of factoring a large number – Given a large number, say 1219, it is time- consuming to factor it. – Have to go through prime numbers one by one, checking each to see if it is a factor. – But easy to verify that 23 and 53 are the two (prime) factors. Just multiply them together. Publicly described in 1977

RSA (Rivest, Shamir, Adleman) Cook had come up with it in 1973, 4 years earlier, but it was classified. – Is it right that RSA should get credit? Patent granted in the USA, but not elsewhere, due to earlier publication Bob uses Alice's public key to encrypt message to Alice, and Alice uses her private key to decrypt it. How would Alice know that it was Bob who sent that message? – Authentication?

Authentication To digitally sign the message: – Alice calculates a hash value of the message using a standard calculation. – She does the same operation as she would do to decrypt a message, using her private key, and generates a signature. – She attaches it to the message and sends it to Bob. – Bob does the same operation as he would do to encrypt the message, using Alice's public key. – If he gets back the message's hash value, he confirms that it has been signed by Alice.

How to ensure that the public key does belong to Alice? Certificate authority – When you go to a website, the browser has built- in software to check the public key supplied by the site against the key in a registry. – Registry maintained by Symantec etc. (Used to be Verisign) – Once you have a public key of the website, you can create a private key, and generate a shared secret key. Each private key is valid only for one session.

SSL Certificates SSL Certificates are small data files that digitally bind a cryptographic key to an organization’s details. SSL Certificates Vendor applies for SSL certificate to certificate authority Certificate authority, such as GlobalSign, checks out vendor's credentials in real life – Issues certificate Vendor installs certificate on web server Browsers such as Firefox and Chrome will inspect and accept the certificate from reputed certificate authorities

Heartbleed

What is the Heartbleed bug? Exploits a vulnerability in OpenSSL software library, used to implement the Transport Layer Security protocol used in web, instant messaging etc. Exposes user’s passwords, cookies and other data to the attacker. Not a virus.

Why heartbleed? The TLS protocol involves establishing a connection (a session) between two entities A and B, like initiating a phone call. When connection is idle, one entity can ask the other ‘Are you alive? If so, send me the 4- letter word blah.’ Like checking the heartbeat.

Buffer over-read bug The extra data that is sent back is fetched from the server’s memory, due to the bug. It could include passwords and private keys. Like if someone you had called in to fix your plumbing were to look through your closets for information.

When was this bug introduced discovered, and fixed? Introduced in Dec. 2011, by one of the authors (Seggelmann) of the (open-source) software team. Discovered on April 1, by Neel Mehta of Google, and Codenomicon. Fixed right away, but servers have to use the new software.

What data is vulnerable? Servers carry users’ passwords, cookies, and session keys. Servers might also yield private SSL keys. Servers have to reissue their SSL certificates.

Which servers are vulnerable? Anyone using certain versions of OpenSSL – 17% of all servers – Most banks don’t use OpenSSL

What can a user do? Check websites on tester site to see if vulnerability has been fixed. Change passwords for those sites.

Did NSA know about this before? April 11, 2014 NSA was not aware of the recently identified vulnerability in OpenSSL, the so-called Heartbleed vulnerability, until it was made public in a private sector cybersecurity report. Reports that say otherwise are wrong. From bloomberg-news-story-that-nsa-knew

Which is true? 1.Heartbleed is a kind of virus that spreads through machines. 2.Heartbleed is a weakness in commonly used software that allows peeking into a server’s memory. 3.Heartbleed is easily fixed by fixing software on servers such as those owned by Amazon.com. 4.Heartbleed can be stopped by updating your web browser. A: 1, 2, 3, 4C: 2, 3, 4 B: 2, 3D: 1, 2, 4

Your worry? A: I don’t care; we all have to go some day! B: I am worried enough to change my passwords, but doubt if I will lose anything. C: I am very worried -- this could be the beginning of bigger stuff.