Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cryptography and PKI February 12, 2001 February 12, 2001 ABN AMRO.

Similar presentations


Presentation on theme: "Cryptography and PKI February 12, 2001 February 12, 2001 ABN AMRO."— Presentation transcript:

1 Cryptography and PKI February 12, 2001 February 12, 2001 ABN AMRO

2 Agenda  Cryptography Today  PKI Algorithms  PKC Considerations  Strengths and Limitations

3 Cryptography Today - accountability, - fairness, - accuracy, and confidentiality. - accountability, - fairness, - accuracy, and confidentiality.

4 Cryptography Today Primary Prevention From Conception to Installation

5 Cryptography Today Possibility Acceptability

6 Cryptography Today THREAT MODEL What the system is designed to protect For whom How long What the system is designed to protect For whom How long

7 System Design number theory, complexity theory, Information theory, probability theory, abstract algebra, and formal analysis, among others. number theory, complexity theory, Information theory, probability theory, abstract algebra, and formal analysis, among others.

8 System Design security and accessibility, anonymity and accountability, privacy and availability security and accessibility, anonymity and accountability, privacy and availability

9 Implementation Problems bad random-number generators, don't check properly for error conditions, and leave secret information in swap files. bad random-number generators, don't check properly for error conditions, and leave secret information in swap files.

10 Cryptography for people Users want simplicity, convenience, and compatibility with existing (insecure) systems

11 State of Security Assume the WORST Assume your adversaries are better than they are. Assume science and technology will soon be able to do things they cannot yet. Give yourself a margin for error. Give yourself more security than you need today. Assume your adversaries are better than they are. Assume science and technology will soon be able to do things they cannot yet. Give yourself a margin for error. Give yourself more security than you need today.

12 Symmetric Key Plain Text Cipher Text

13 Cryptography and PKI

14 Things To Consider  Does the organization have enough resources/personnel to deploy and maintain the framework?  If so, do they possess the proper skill sets?  Will the security management model be centralized or decentralized?  What are the necessary components?  What vendors provide the necessary components?  do the components work together?

15 Public Key Infrastructure Algorithms: RSA, Diffie-Hellman, El Gamal, DSS.

16 RSA Key Generation Encryption Decryption Key Generation Encryption Decryption

17 DSS

18 PKC Considerations

19 Strengths & Limitations PKI Strengths  Enables organizations to streamline security  Ease of manageability and maintenance  Address security issues at the enterprise level  Total cost of ownership is reduced Strengths  Enables organizations to streamline security  Ease of manageability and maintenance  Address security issues at the enterprise level  Total cost of ownership is reduced Limitations  Interoperability between vendors and products  Interpretation of standards  Initial cost of implementation Limitations  Interoperability between vendors and products  Interpretation of standards  Initial cost of implementation

20 Popular VENDORS Baltimore Tech. Entrust Verisign Valicert DSS: iPlanet, Siemens, Critical Path, Oracle Baltimore Tech. Entrust Verisign Valicert DSS: iPlanet, Siemens, Critical Path, Oracle


Download ppt "Cryptography and PKI February 12, 2001 February 12, 2001 ABN AMRO."

Similar presentations


Ads by Google