Web Security.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Netprog: Cryptgraphy1 Cryptography Reference: Network Security PRIVATE Communication in a PUBLIC World. by Kaufman, Perlman & Speciner.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Principles of Information Security, 2nd edition1 Cryptography.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Cryptography 101 Frank Hecker
Public Key Cryptography July Topics  Symmetric and Asymmetric Cryptography  Public Key Cryptography  Digital Signatures  Digital Certificates.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography, Authentication and Digital Signatures
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.

Reviews Rocky K. C. Chang 20 April 2007.
Basics of Cryptography
Security Outline Encryption Algorithms Authentication Protocols
Unit 3 Section 6.4: Internet Security
Symmetric and Asymmetric Encryption
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
Cryptography Reference: Network Security
Cryptography Reference: Network Security
Secure Sockets Layer (SSL)
Security.
Chapter 8 Network Security.
Chapters 14,15 Security.
Encryption
Basic Network Encryption
Topic 1: Data, information, knowledge and processing
IS3230 Access Security Unit 9 PKI and Encryption
Keys Campbell R. Harvey Duke University, NBER and
Message Security, User Authentication, and Key Management
Security at the Application Layer: PGP and S/MIME
Network Security Basics
Chapter 8 Network Security.
PART VII Security.
Security.
Lecture 4 - Cryptography
Cryptology/Cryptography
Cryptography and Network Security
The Secure Sockets Layer (SSL) Protocol
Chapter 4 Cryptography / Encryption
Chapters 14,15 Security.
Lecture 10: Network Security.
Digital Communications
Chapter 29 Cryptography and Network Security
Basic Network Encryption
Public – Private Key Cryptography
Advanced Computer Networks
Basic of Modern Cryptography
Fluency with Information Technology Lawrence Snyder
Security: Integrity, Authentication, Non-repudiation
Introduction to Cryptography
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Web Security

Simple Encryption In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it

Substitution Cipher Example Ciphertext: QEB NRFZH YOLTK CLU GRJMP LSBO QEB IXWV ALD Plaintext: the quick brown fox jumps over the lazy dog

Classes of Cryptographic Algorithms Symmetric Algorithms – Uses the same cryptographic key for both encryption and decryption (i.e., shared secret) Asymmetric Algorithms – Requires two separate keys, one is secret (private) and one is public; the keys are mathematically linked

The key and algorithm must be shared between Bob and Alice Symmetric Encryption Man In The Middle Bob Alice Algorithm Cipher Text Plain Text Plain Text Cipher Text Key The key and algorithm must be shared between Bob and Alice

Asymmetric Encryption Also known and public-key cryptography Each person has a pair of keys (public and private) Any person can encrypt a message for a specific person Based on cryptographic algorithms that use mathematical problems that currently have no efficient solution Public-key algorithms are the fundamental security ingredients for almost all Internet security Underpins Internet standards such as Transport Layer Security (TLS), S/MIME and PGP Can also be used for digital signatures, in which a message is signed with the sender’s private key and can be verified by anyone who has access to the sender’s public key

Key Generation

Certificate Authorities An entity that issues digital certificates A digital certificate certifies the ownership of a public key by the named subject of the certificate A client uses a CA certificate to verify the CA signature on a server certificate

What’s Needed For Secure Communication Between Client and Web Server? 1) Client needs to prove the web server is who it says it is 2) Client needs to share information with web server in a secure fashion #1 Is solved with certificates #2 is solved with asymmetric and symmetric encryption of messages

How Communication Works

YouTube Explanation https://www.youtube.com/watch?v=SJJmoDZ3il8