Public Key Encryption.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CP3397 ECommerce.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Digital Signatures. Anononymity and the Internet.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Electronic Transaction Security (E-Commerce)
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Network Security Secure hypertext transfer protocol (https) Cookies Public Key Cryptography.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
How HTTPS Works J. David Giese. Hyper Text Transfer Protocol BrowserHTTP Server GET / HTTP/1.1 HOST: edge-effect.github.io HEADERS BODY HTTP/ OK.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
Computer encryption is… Based on the science of cryptography.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Learning Aid Type Text Page 206 MGS GROUP C Svitlana Panasik.
Material being covered 3/9 Remainder of Text Chapter 6 (Q5, 6) Text Chapter 6A Material Posted 3/9 Midterm Information Introduction to Text Chapter 7.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Network Encryption Vince Ceccarelli Group 7 TC 200.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
April 20023CSG11 Electronic Commerce Encryption John Wordsworth Department of Computer Science The University of Reading Room.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Secure Sockets Layer (SSL)
E-Commerce Security.
The Secure Sockets Layer (SSL) Protocol
Presentation transcript:

Public Key Encryption

Introduction The Problem Network security Public Key Encryption Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language Conclusion Questions and Comments

The Problem Trough the Internet, people can: Buy products online Buy services online Do bank transactions online

The Problem Threats to network security include: Data diddling Salami attack Piggybacking Denial of Service (DoS) Distributed Denial of Service (DDoS)

The Problem Several network security schemes have been developed and used throughout the years

Network Security Protection alternatives include: Use of passwords Use of security modems Encryption/decryption methods

Encryption / Decryption Network Security The most secure protection methods are those which use Encryption / Decryption

History Network Security Used since Roman Empire Used by governments for military purposes Nowadays it is being performed by computers

Encryption / Decryption What is encryption/decryption? Network Security Encryption / Decryption "Enryption is the translation of data into a secret code."

Transposition Algorithm What is encryption/decryption? Network Security Transposition Algorithm An example

Network Security Key = PUBLIC P U B L I C 5 6 1 4 3 2 What is encryption/decryption? Network Security Key = PUBLIC P U B L I C 5 6 1 4 3 2

Public key encryption is secure now What is encryption/decryption? Network Security Message to send: Public key encryption is secure now

Network Security 5 6 1 4 3 2 P U B L I C K E Y E N C R Y P T I O N I S What is encryption/decryption? Network Security 5 6 1 4 3 2 P U B L I C K E Y E N C R Y P T I O N I S S E C U R E N O W B Y P

Network Security The message will now be … What is encryption/decryption? Network Security The message will now be … BYPSE CCOCF INIEF LETSF PKRNU UEYIR Unauthorised users who do not have the key will not be able to convert it back to the original message

What is encryption/decryption? Network Security A key or password is necessary for encryption and decryption. Decryption is the changing back of encrypted code (or cipher text) to plain text.

What is encryption/decryption? Network Security

What is encryption/decryption? Network Security There are two main types of encryption / decryption security measures: Public Key Encryption (Asymmetric) Symmetric Key Encryption

Public Key Encryption Network Security Uses two keys: Public Private Public Key (Asymmetric) Encryption Network Security Public Key Encryption Uses two keys: Public Private A popular implementation is the SSL (Secure Socket Layer)

Symmetric Key Network Security Uses only one key Symmetric Key Encryption Network Security Symmetric Key Uses only one key Key must be known only by the sender and receiver Faster encryption/decryption

Public Key Encryption History First invented in early 1970s by Clifford Cocks. Reinvented by Rivest, Shamir and Adleman in 1976 and was called RSA. It was published. In 1984 ElGamal created his algorithm. In 1989 Koblitz created his hyperelliptic curve cryptography algorithm

How is data sent using public key encryption? Sender encrypts the message using its private key Sender encrypts its private key using the receiver’s public key Receiver uses its private key to decrypt the sender’s private key Receiver uses the sender’s private key to decrypt the message.

Digital signatures Public Key Encryption Authentication is also done using digital signatures. Digital signatures are sent to the receiving computer to make sure that the sender is who it says it is.

Public Key Encryption Digital certificates are used. A large scale Public Key Encryption Digital certificates are used. Before communication starts the certificate authority confirms that every computer is who it says it is.

Public Key Encryption Hashing algorithms are used to create keys. A simple example: Input number Hashing Algorithm Hash Value 32,569 Input # x 138 4,494,522

Hashing algorithms Public Key Encryption If the algorithm is not known, it is very difficult to determine the input number. In reality more complex numbers are used, usually 40-bit or 128-bit

Public Key Encryption Checks for data corruption Validation and Verification of data Public Key Encryption Checks for data corruption Two popular algorithms: Checksum Cyclic Redundancy check (CRC)

Public Key Encryption An implementation of Public key encryption Secure Socket Layer (SSL) Public Key Encryption An implementation of Public key encryption Developed by Netscape Used extensively by Netscape and Internet explorer

Secure Socket Layer (SSL) Public Key Encryption URL of an SSL-enabled website starts with https:// An example is the Go Mobile page for topping up your mobile credit

Secure Socket Layer (SSL) Public Key Encryption It has become part of the transport layer in the OSI Model Is known as the TLS (Transport Layer Security)

Public Key Encryption Sender creates a private key What happens in an SSL? Public Key Encryption Sender creates a private key Sender sends it to the receiving computer using the receiver’s public key

What happens in an SSL? Public Key Encryption Communication is then encrypted/decrypted using the private key After communication between the two computers ends the key is discarded

Conclusion The most common protection alternatives used are those that use the encryption/decryption methods. Encryption is the translation of data into a code that is not understandable without the key. Decryption is the changing back of code from cipher text to plain text. A key or password is necessary.

Conclusion There are two types: Public key encryption Private / Symmetric key Private key encryption uses only one key, which is private. Public key encryption uses two keys: Public key Private key

How is data sent using public key encryption? Conclusion How is data sent using public key encryption?

Conclusion Authentication is done using digital signatures Digital certificates are used in a large scale communication Hashing algorithms are used to create keys and passwords. Checksum and CRC are used to check for data corruption

Conclusion SSL is an implementation of public key encryption. Private keys are created before every communication session, and deleted afterwards

For notes and references for further reading Visit www.geocities.com/publickeyencryption For notes and references for further reading