Unit 3 Section 6.4: Internet Security

Slides:



Advertisements
Similar presentations
What is. Digital Certificate It is an identity.
Advertisements

Public Key Infrastructure and Applications
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Pretty Good Privacy (PGP). How PGP works PGP uses both public-key cryptography and symmetric key cryptography, and includes a system which binds the public.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Secure Electronic Transaction (SET)
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography, Authentication and Digital Signatures
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Types of Electronic Infection
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Csci5233 computer security & integrity 1 Cryptography: an overview.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
DIGITAL SIGNATURE.
Mort Anvari Introduction to Encryption Technology To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
Lifecycle Metadata for Digital Objects October 9, 2002 Transfer / Authenticity Metadata.
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
Unit 3 Section 6.4: Internet Security
The Secure Sockets Layer (SSL) Protocol
Cryptography: an overview
Symmetric and Asymmetric Encryption
Computer Communication & Networks
Security Design.
e-Health Platform End 2 End encryption
K E Y Plain text Cipher text Encryption Decryption
Section 4.6: Digital Signatures
Digital Signature.
E-Commerce Security.
NET 311 Information Security
Pooja programmer,cse department
Lecture 4 - Cryptography
The Secure Sockets Layer (SSL) Protocol
Cryptography: an overview
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
PKI (Public Key Infrastructure)
Electronic Payment Security Technologies
Chapter 8 roadmap 8.1 What is network security?
Introduction to Encryption Technology
Presentation transcript:

Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates

Digital Signatures and Certificates To prove that an electronic message is genuine, a sender can digitally sign the message. This means it can be detected if the message has been tampered with and the signature is proof that it has been sent by the correct person. Digital signatures use asymmetric encryption. The process to send a message is as follows:

A digest (also known as a hash) is produced from the message using a hash function. The digest is a much reduced version of the original message (it is not possible to change a message digest back into the original message from which it was created). Message 010010100010 110100101010 Digest Hash Function

The digest is then encrypted using the sender’s private key The digest is then encrypted using the sender’s private key. The sender’s private key must be used instead of the receiver’s public key to prove it has been encrypted by the sender. The encrypted digest result is the digital signature. 1111001010010 1001010001010 Encrypted Digest (Digital Signature) Encrypt using sender’s private key Digest 010010100010 110100101010

The encrypted digest (digital signature) is then appended to the original message. 1111001010010 1001010001010 Digital Signature Appended with

Encrypt using receiver’s public key The message and digital signature are then encrypted using the receiver’s public key. The receiver’s public key must be used here so that only the receiver can decrypt the message with the private key. Message 1111001010010 1001010001010 0010101000110 0001010010011 0101000100101 0101010100111 1101001100000 Encrypted Message Encrypt using receiver’s public key

The encrypted message is then sent by electronic mail. 0010101000110 0001010010011 0101000100101 0101010100111 1101001100000 Encrypted Message Send by e-mail

Digital Signatures and Certificates The process to verify that a message is genuine is as follows:

Decrypt using receiver’s private key The message and signature are decrypted using the receiver’s private key. Message 1111001010010 1001010001010 1111001010010 1001010001010 1101001001011 1111110100100 Encrypted Message Decrypt using receiver’s private key

Separate Digital Signature The decrypted message is then separated into the original message and digital signature. Message 1111001010010 1001010001010 Digital Signature Separate Digital Signature 1111001010010 1001010001010

The digital signature (encrypted digest) is then decrypted using the sender’s public key. This proves it has been sent by the person who owns the private key. Digital Signature (Encrypted Digest) 1111001010010 1001010001010 Decrypt using sender’s public key 010010100010 110100101010 Decrypted Digest

A new digest is produced from the original message using the same hash function as the original digest. Message Hash Function 010010100010 110100101010 New Digest

The decrypted digest is then compared to the new digest The decrypted digest is then compared to the new digest. If the decrypted digest is the same as the new digest then the message has not been tampered with. 010010100010 110100101010 Decrypted Digest 010010100010 110100101010 New Digest

Digital Signatures and Certificates Although this process sounds complicated it is all handled by the signing software so the messages can be signed and received using a simple click.

Digital Signatures and Certificates A digital certificate is issued by a certification authority. It contains your name, a serial number, expiration dates, a copy of the certificate holder's public key (used for encrypting messages and digital signatures), and the digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real. Digital certificates can be kept in registries so that authenticating users can look up other users' public keys.