Presentation is loading. Please wait.

Presentation is loading. Please wait.

Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.

Similar presentations


Presentation on theme: "Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007."— Presentation transcript:

1 Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007

2 Overview Symmetric/Asymmetric Key Digital Signatures Certificates SSL Protocol Commonly Used Certificates VNC Tunneling PGP/GnuPG Conclusion

3 Symmetric Encryption “Private” Key “Private” Key Same key for encryption and decryption Same key for encryption and decryption Strengths: Efficient Strengths: Efficient Weakness: Parties involved Weakness: Parties involved

4 Symmetric Encryption Cont’d

5 Asymmetric Encryption “Public” Key Encryption “Public” Key Encryption Based on Key Pair Based on Key Pair 2 Keys 2 Keys Public Public Private Private Strength: Keys are related but not equal Strength: Keys are related but not equal Weakness: Computation time Weakness: Computation time

6 Asymmetric Key cont’d Many public keys, One private key Many public keys, One private key One way Encryption/Decryption One way Encryption/Decryption A User’s Private Key A User’s Public Key(s)

7 Asymmetric Key cont’d

8 Digital Signatures A electronic signature that validates data integrity A electronic signature that validates data integrity One way hashing algorithm One way hashing algorithm Strength: Data validation Strength: Data validation Weakness: Doesn’t validate the sender Weakness: Doesn’t validate the sender

9 Digital Signatures cont’d

10 Certificates An electronic document used to identify an entity An electronic document used to identify an entity Can identify the entity’s name, public key, date of issuance, and date of revocation Can identify the entity’s name, public key, date of issuance, and date of revocation Issued by Certificate Authority in public domain Issued by Certificate Authority in public domain

11 Secure Socket Layer Netscape vs. Microsoft TLS Netscape vs. Microsoft TLS Typically used on a client/server network Typically used on a client/server network Two Parts: Two Parts: Handshake Handshake Bulk-Data Transfer Bulk-Data Transfer

12 SSL Handshake Consists of four parts: Consists of four parts: Message Exchange Message Exchange Public-Key Computations Public-Key Computations Random-Number Generation Random-Number Generation Handshake Authentication Handshake Authentication

13 Commonly Used Certificates Client SSL Client SSL Server SSL Server SSL S/MIME S/MIME CA Certificates CA Certificates

14 VNC Tunneling through SSH VNC - Virtual Network Computing VNC - Virtual Network Computing Unsecured – data transmitted in plain text Unsecured – data transmitted in plain text SSH – Secure Shell SSH – Secure Shell Enables strong security with VNC capability Enables strong security with VNC capability

15 PGP and GnuPG Based on public key architecture Based on public key architecture Handled by multiple OS Handled by multiple OS Encrypted messages sent with email software Encrypted messages sent with email software

16 Conclusion Symmetric/Asymmetric systems Symmetric/Asymmetric systems Digital Signatures Digital Signatures Certificates Certificates SSL SSL VNC Tunneling VNC Tunneling PGP/GnuPG PGP/GnuPG


Download ppt "Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007."

Similar presentations


Ads by Google