Copyright © 2003 Pearson Education, Inc. Slide 11-1.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
Using Matrices in Real Life
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
1 Copyright © 2002 Pearson Education, Inc.. 2 Chapter 2 Getting Started.
Copyright © 2003 Pearson Education, Inc.
Copyright © 2003 Pearson Education, Inc. Slide 9-1.
Copyright © 2003 Pearson Education, Inc. Slide 10-1.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Copyright © 2003 Pearson Education, Inc. Slide 7-1 Created by Cheryl M. Hughes The Web Wizards Guide to XML by Cheryl M. Hughes.
Copyright © 2003 Pearson Education, Inc. Slide 1.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 3 CPUs.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
1 Pretty Good Privacy (PGP) Security for Electronic .
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.
1 Social / Ethics NCDesk Societal and Ethical Issues.
Chapter 11: Models of Computation
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 The OSI Model and the TCP/IP.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
Public Key Infrastructure Alex Bardas. What is Cryptography ? Cryptography is a mathematical method of protecting information –Cryptography is part of,
Analyzing Genes and Genomes
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Essential Cell Biology
PSSA Preparation.
Essential Cell Biology
Energy Generation in Mitochondria and Chlorplasts
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Benchmark Series Microsoft Excel 2013 Level 2
© Paradigm Publishing, Inc Excel 2013 Level 2 Unit 2Managing and Integrating Data and the Excel Environment Chapter 6Protecting and Sharing Workbooks.
Profile. 1.Open an Internet web browser and type into the web browser address bar. 2.You will see a web page similar to the one on.
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Copyright © 2007 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Web 101 Third Edition by Wendy G. Lehnert & Richard L. Kopec Modified by.
Confidentiality and Privacy Controls
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Masud Hasan Secue VS Hushmail Project 2.
Security+ All-In-One Edition Chapter 14 – and Instant Messaging Brian E. Brzezicki.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Digital Signatures and Digital Certificates Monil Adhikari.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Key management issues in PGP
12. Encryption on the Internet
Presentation transcript:

Copyright © 2003 Pearson Education, Inc. Slide 11-1

Copyright © 2003 Pearson Education, Inc. Slide 11-2 Created by, Stephanie Ludi, Rochester Institute of TechnologyNY Encryption and the Internet Chapter 11

Copyright © 2003 Pearson Education, Inc. Slide 11-3 Understand how private-key and public key encryption work. Learn how digital signatures protect document integrity. Understand why key authentication is needed to protect people from counterfeit keys. See how the web-of-trust approach to key authentication works. Learning Objectives

Copyright © 2003 Pearson Education, Inc. Slide 11-4 Find out how digital certificates and certificate authorities solve the problem of key authentication. Understand the difference between strong and weak encryption. Learning Objectives

Copyright © 2003 Pearson Education, Inc. Slide 11-5 Taking Charge Cryptography is the study of secret codes associated with classified information and intelligence gathering. The National Security Agency (NSA) is responsible for developing and applying secure communication technologies in the service of national security. Cryptography used to be only of interest to the military. As digital communication is more widespread, it is of interest to more of us.

Copyright © 2003 Pearson Education, Inc. Slide 11-6 Taking Charge Cryptography is of interest to: Client/server software developers Anyone interested in digital commerce All Internet users who want to keep their communications private Without safeguards, our sensitive information is at risk. Cryptography offers protection.

Copyright © 2003 Pearson Education, Inc. Slide 11-7 Taking Charge When the Internet was started, secure communications were not a high priority. The technologies that enabled the access to the Internet was never designed to protect data. The military has always understood the need to secure data. Large corporations followed suit by opting for intranet connectivity, as an alternative to Internet access.

Copyright © 2003 Pearson Education, Inc. Slide 11-8 An intranet is an internal computer network that is carefully segregated from all external networks such as the Internet. Internet access from an intranet is possible. Such access is only available through a firewall. The firewall keeps the sensitive data within the organizations network. Taking Charge

Copyright © 2003 Pearson Education, Inc. Slide 11-9 We dont all work for the military or a large organization, but we want privacy safeguards too. This chapter will introduce the basic concepts for encryption. Taking Charge

Copyright © 2003 Pearson Education, Inc. Slide Encoding and decoding information is key to encryption. A key for a simple substitution code is just a map that tells you how to substitute one character for another. When you receive a coded message, you trade each character for a new one according to the instructions on the key. Private-Key Encryption

Copyright © 2003 Pearson Education, Inc. Slide Encoding is the process of creating the coded message. Decoding is the process of unscrambling the coded message. To encode a message, you must use the same key when decoding (though you have to reverse the key). Private-key encryption is the use of the same key for encoding and decoding messages. Private-Key Encryption

Copyright © 2003 Pearson Education, Inc. Slide Private-Key Encryption

Copyright © 2003 Pearson Education, Inc. Slide If you have the key for the code, it is easy to decode messages. If you dont have the key, then You can try and break the code Or try and figure out the key if you have several messages To figure out such a key, Try and find commonly used letters The letter e is the most common Try and decipher common words (e.g.the) Private-Key Encryption

Copyright © 2003 Pearson Education, Inc. Slide An effective code is one that only reaches the intended recipients. Every effort should be made to confound code breakers. A substitution code is the easiest to break. (this is the one mentioned earlier) Private-Key Encryption

Copyright © 2003 Pearson Education, Inc. Slide Private-key encryption is risky since many people share the same key. Each time the key is passed from person to person, it may be intercepted. If the information that you are sharing is not critical, then you can evaluate the risk. Private-Key Encryption

Copyright © 2003 Pearson Education, Inc. Slide If your information is more important, then you may choose to use public-key encryption. Public-key encryption uses 2 keys, which is more secure than private-key encryption. If one of the keys is lost, the other key is useless by itself. These 2 keys are generated as a special key pair that works together. Public-Key Encryption

Copyright © 2003 Pearson Education, Inc. Slide The 2 keys consist of: A public key that can be freely distributed to anyone and everyone A private key is held by only the owner of the key pair Although both keys are needed, having the public key available does not make it possible to decipher the private key. Public-Key Encryption

Copyright © 2003 Pearson Education, Inc. Slide Public-Key Encryption If you want to receive encrypted messages You create a pair of keys You can give copies of the public key to anyone (but you keep your private key) The public keys are used to encode messages Your private key is used to decode messages Only your private key can decode messages encoded by your public key.

Copyright © 2003 Pearson Education, Inc. Slide Public-Key Encryption

Copyright © 2003 Pearson Education, Inc. Slide Public-Key Encryption If you want to send an encrypted message to someone else, another pair of keys is needed. You can share encrypted messages with others, you all just need to share your public keys with one another. A growing community of users uses PGP for secure communication. Many mail clients can be configured to use a PGP plug-in for sending, receiving and PGP key management.

Copyright © 2003 Pearson Education, Inc. Slide Public-key infrastructure (PKI) is the establishment and maintenance of a system of public-key servers. All of the overhead involved in locating public keys and encoding outgoing can be handled by the PKI software running quietly behind the scenes. Public-Key Encryption

Copyright © 2003 Pearson Education, Inc. Slide Digital Signatures Like signatures on paper, when a document is signed you know who wrote it or approved its contents. Written signatures can be forged Digital signatures need to be resistant to forgery. Public-key encryption is used to make digital signatures forgery-resistant. Digital signatures are important for e- commerce and other sensitive communication.

Copyright © 2003 Pearson Education, Inc. Slide A clear signature is a digital signature that is attached to a plain-text file. A clear-signed document is a document signed with a clear signature. The process of generating and verifying a digital signature is similar to the process of encrypting and decrypting a file. Digital Signatures

Copyright © 2003 Pearson Education, Inc. Slide Digital Signatures

Copyright © 2003 Pearson Education, Inc. Slide Digital signatures change from document to document. A digital signature contains information about the person behind the signature about the document being signed So one digital signature cannot be copied from one document to another PGP not only verifies the signature, but also that the contents of the message has not been altered. Digital Signatures

Copyright © 2003 Pearson Education, Inc. Slide Key Management Public-key encryption makes it easier to keep a private key private. If you store a private key, you must be able to protect that key. Protecting your private-key with a passphrase helps secure your key. Whenever you create a key pair, you enter a passphrase. Whenever you need to use your private- key to decode a message, you must enter your passphrase.

Copyright © 2003 Pearson Education, Inc. Slide Key Management You need to choose a good passphrase in order for your signature to be well protected. Although your passphrase is stored on your computer, it is protected by a hash code. A hash code is an encoding algorithm that converts an input string into a numerical signature for that string.

Copyright © 2003 Pearson Education, Inc. Slide A security hole remains where a hacker can generate a key pair under your name and intercept messages. This is called the Man-in-the-Middle attach. Counterfeit Keys

Copyright © 2003 Pearson Education, Inc. Slide Counterfeit Keys

Copyright © 2003 Pearson Education, Inc. Slide The interception of encrypted takes work. Besides the technical skill involved, the willingness to break several laws is needed. It can happen though. Some organizations require reliable communication channels in order to minimize misinformation and disinformation. Counterfeit Keys

Copyright © 2003 Pearson Education, Inc. Slide Counterfeit Keys Public-keys are subject to scrutiny. You need to know who owns the keys that you use to encrypt information. You need to trust that the information you receive is from the sender of the message. A public-key is said to be a trusted key when you are certain that the key is not counterfeit. The process of identifying a person as the legitimate owner of a public key is called key authentication.

Copyright © 2003 Pearson Education, Inc. Slide A system of key certification is needed to help people decide how much risk is associated with any given pubic-key. Key certification is the process through which someone can vouch for the legitimacy of a pubic key. When a key is certified by a trusted friend, that person can add his or her digital signature to the public key being certified. Then if the key is sent to you, you can verify the digital signature with confidence Key Certification

Copyright © 2003 Pearson Education, Inc. Slide Key Certification The model for key certification based on friends (and their friends) is called the Web of Trust Public keys are passed among friends, accumulating certification as they go. This model works well in small worlds. When communities become large, this model is not viable.

Copyright © 2003 Pearson Education, Inc. Slide Key Certification A digital fingerprint for a key pair is a unique sequence of integers associated with that key pair. Digital fingerprints are generated when a key pair is created, based on random conditions The fingerprint cannot be tampered with. Fingerprint verification is an alternative to the Web of Trust, but its still not good for large communities (e.g. for e-commerce)

Copyright © 2003 Pearson Education, Inc. Slide The problem of key authentication had to be solved before public-key encryption could be used for e-commerce. Without a system for certifying valid public keys, counterfeit pages could masquerade as legitimate e-stores. A digital certificate is a digital signature attached to a public key. The purpose of the certificate is to reassure users that the public-key is the authentic key. Digital Certificates

Copyright © 2003 Pearson Education, Inc. Slide Digital Certificates In the Certificate Authority (CA) model of key authentication, there are only a few trusted institutions that can generate digital certificates. Any key generated by a trusted CA can be immediately trusted without question. All the user has to do is decide which CAs can be trusted.

Copyright © 2003 Pearson Education, Inc. Slide If you placed a credit card order online, your browser probably checked server certificates for you and you didnt know it. Your browser has a list of trusted Cas built into it. Your browser will then accept any public- key certified by a recognized CA. You can check the settings in your browser. Digital Certificates

Copyright © 2003 Pearson Education, Inc. Slide Digital Certificates

Copyright © 2003 Pearson Education, Inc. Slide When people worry about whether they can trust encryption, they generally are concerned about how hard it is to crack. The amount of time needed to crack a code is important. 40-bit keys can be broken by run-of-the- mill personal computers in minutes. Any key that can stand up to thousands of years of computing time on the fastest computers is safe enough. Strong and Weak Encryption

Copyright © 2003 Pearson Education, Inc. Slide Strong encryption refers to encryption methods that are safe in this sense. A code that can be broken in a practical time frame is called weak encryption. Strong encryption steadily becomes weaker over time. Taking Moores law into consideration 64-bit encryption will be weak by bit encryption will be weak by 2107 Strong and Weak Encryption