1 TCP/IP Applications. 2 NNTP: Network News Transport Protocol NNTP is a TCP/IP protocol based upon text strings sent bidirectionally over 7 bit ASCII.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
CP3397 ECommerce.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Cryptography and Network Security
J. Wang. Computer Network Security Theory and Practice. Springer 2009 Chapter 5 Network Security Protocols in Practice Part II.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Lecture 5: security: PGP Anish Arora CSE 5473 Introduction to Network Security.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
Principles of Information Security, 2nd edition1 Cryptography.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Henric Johnson1 Electronic mail security Henric Johnson Blekinge Institute of Technology, Sweden
Chapter 8 Web Security.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
ECE Prof. John A. Copeland fax Office: Klaus 3362.
Secure Socket Layer (SSL) and Secure Electronic Transactions (SET) Network Security Fall Dr. Faisal Kakar
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
1 Electronic Mail Security Outline Pretty good privacy S/MIME Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
8.4 – 8.5 Securing & Securing TCP connections with SSL By: Amanda Porter.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
CIS-325: Data Communications1 CIS-325 Data Communications Dr. L. G. Williams, Instructor.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Chapter 7 : Web Security Lecture #1-Week 12 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
Chapter 7 - Secure Socket Layer (SSL)
Cryptography and Network Security
BY GAWARE S.R. DEPT.OF COMP.SCI
NET 536 Network Security Networks and Communication Department
Cryptography and Network Security
Cryptography and Network Security
Network Security 4/21/2019 Raj Rajarajan.
Unit 8 Network Security.
Electronic Payment Security Technologies
Module 4 System and Application Security
Cryptography and Network Security
Presentation transcript:

1 TCP/IP Applications

2 NNTP: Network News Transport Protocol NNTP is a TCP/IP protocol based upon text strings sent bidirectionally over 7 bit ASCII TCP channels. It is used to transfer articles between servers as well as to read and post articles.

3 TCP/IP Today Multipurpose Internet Mail Extension World Wide Web

4 Emerging Internet Standards Secure Electronic Transactions Secure, Authenticated Mail Packet- level Security

5 Other TCP/IP Security Features Secure Electronic Transactions Secure, Authenticated Mail Packet- level Security Secure Web Transfers

6 Secure Sockets Layer Can encrypt everything above TCP Security is on a session basis: –Client authenticates server, gets public key –Client generates symmetric master key –Key is encrypted with servers public key –exchange begins All transmissions then use the master key

7 S/WAN -- IPSec Standard IP Security Protocol Working Group (IPSEC) A security protocol in the network layer Authentication, integrity, access control, and confidentiality preliminary goals: –host-to-host security followed by –subnet-to-subnet and host-to-subnet Submitted as draft standard 7/97

8 Secure-HTTP Application layer, like HTTP Negotiates many parameters –Encryption –Authentication –Digital Signature Methods –Key Exchange Algorithm Can use X.509 certificates Can be used on top of SSL

9 SET - Secure Electronic Transactions Uses RSA and DES Secures only the financial info –Payment authorization and transport –Confirmation and delivery –Merchant reimbursement

10 SET Certificates Certificates are X.509 –Cardholder needs certificate from CCA –Merchant needs two certificates from MCA –Financial institution gets two certificates from CA

11 Purchase Request

12 MIME Multi-purpose Internet Mail Extension Follows ad hoc encoding schemes –BINHEX –UUEncode Extensible, define file extension, handling program Basic algorithm converts 3 x 8-bit bytes to 4 x 6-bit ASCII characters

13 S-MIME Secure MIME Prevent interception and forgery of Uses RSA’s Public-Key Cryptography Standards (PKCS) Beyond –EDI software –Internet push products such as software distribution –on-line electronic commerce services

14 Pretty Good Privacy Phil Zimmerman Public key system for encryption and authentication Is used like S/MIME PGP won export battle for banks: Nov 4th: “ The U.S. Department of Commerce has granted Pretty Good Privacy, Inc., (PGP) approval to export PGP's and message encryption software to banks worldwide. ”

15 E-Cash Independence Security Privacy Off-Line Payment Transferability Divisibility

16 Secure Net Commerce SSL S/WAN -- IPSec S-MIME S-HTTP SET PGP E-Cash