Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
By: Hassan Waqar.  A PROTOCOL for securely transmitting data via the internet.  NETWORK LAYER application.  Developed by NETSCAPE.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution of public keys –use of public-key.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
03 December 2003 Public Key Infrastructure and Authentication Mark Norman DCOCE Oxford University Computing Services.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
Computer Science Public Key Management Lecture 5.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
SSL Technology Overview and Troubleshooting Tips.
Digital Certificates. What is a Digital Certificate? A digital certificate is the equivalent of your business card in the e-commerce world. It says who.
CSCI 6962: Server-side Design and Programming
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Session 11: Security with ASP.NET
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
1 Apache and Virtual Sites and SSL Dorcas Muthoni.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Types of Electronic Infection
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Data Encryption using SSL Topic 5, Chapter 15 Network Programming Kansas State University at Salina.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Digital Signatures and Digital Certificates Monil Adhikari.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
1 Internet data security (HTTPS and SSL) Ruiwu Chen.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
The Secure Sockets Layer (SSL) Protocol
Key management issues in PGP
TOPIC: HTTPS (Security protocol)
Setting and Upload Products
Basics of Cryptography
Unit 3 Section 6.4: Internet Security
SSL Certificates for Secure Websites
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Secure Sockets Layer (SSL)
e-Health Platform End 2 End encryption
S/MIME T ANANDHAN.
E-Commerce Security.
Information Security message M one-way hash fingerprint f = H(M)
Using SSL – Secure Socket Layer
12 E-Commerce Overview.
Digital Signatures and Forms
Pooja programmer,cse department
Secure Electronic Transaction (SET) University of Windsor
Lecture 4 - Cryptography
The Secure Sockets Layer (SSL) Protocol
Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE
Public-Key, Digital Signatures, Management, Security
Unit 8 Network Security.
Advanced Computer Networks
Electronic Payment Security Technologies
Presentation transcript:

Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE Unit - 5 Chap – 3 SSL

Creating a Secure Server with SSL Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE Creating a Secure Server with SSL The Internet is a much less secure place than it used to be. If the Web site you administer will be used for electronic commerce or for exchanging any type of information that needs to kept private, these transactions need to be secure. SSL-enabled Web sites use a different URL prefix, https, to indicate that HTTP protocol request and document transfers are encrypted.

and how to create a self-signed certificate. Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE Secure Sockets Layer (SSL) is used to encrypt communications between your Web server and Web clients. It gives an overview of SSL, describes how digital certificates fit into the security picture, and how to create a self-signed certificate.

Understanding SSL and Server Certificates Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE Understanding SSL and Server Certificates One key is public, accessible to everyone; the other key is private, so only you or another authorized person can access it. Either key can be used to encrypt or decrypt data. The public key is part of the certificate, which is how the certificate is used to verify data sent to and received from the server.

Understanding SSL and Server Certificates Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE Understanding SSL and Server Certificates If a key is public, if (theoretically) everyone knows the public key, how can it be used for secure communication? Data encrypted with the public key can be decrypted only with the private key, which only you know. So, anyone can send you data encrypted with the public key but only you will be able to decrypt it because only you know the private key.

Understanding SSL and Server Certificates Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE Understanding SSL and Server Certificates Likewise, data encrypted with your private key can be decrypted only by the public key. If only you know the private key, recipients of encrypted data can be confident that a message or other data has come from you and not from someone impersonating you.

Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE Digital certificates Digital certificates work on two simple principles, encryption and trust: 1. SSL encrypts the communication between a Web server and a Web client to ensure that the data exchange has not been altered during transmission and to make it more difficult to steal sensitive data if the data exchange is intercepted. Encryption increases the difficulty of deciphering a captured data stream.

Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE Digital certificates Digital certificates provide a certain level of assurance, or trust, that the identities behind a Web server and a Web client are genuine, that is, that a Web server or client is not being operated by an impostor or fraud. Depending on the type of certificate in use, a digital certificate issued by a recognized and trusted certificate authority (CA) means that the CA has taken steps to verify the identity of the organization or entity operating a Web site. As a result, a digital certificate provides a reasonable degree of certainty that a Web site is in fact operated by the organization or entity that claims to operate it.

Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE Digital certificates A certificate contains information about the certificate owner, including the following: The owner’s email address The owner’s name How the certificate can be used How long the certificate is valid The address of the Web site for which the certificate has been issued The public key associated with the certificate A message digest (also known as hash) to use to confirm that the certificate has not been altered since it was issued

Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE Creating a Self-Signed Certificate Creating a self-signed digital certificate on Fedora Core and RHEL systems is simple and straightforward. Use the following procedure (as the root user): 1. Change directories to /etc/pki/tls/certs: # cd /etc/pki/tls/certs 2. Create a key pair: # make genkey umask 77 ; \ /usr/bin/openssl genrsa -des3 1024 > /etc/pki/tls/private/localhost.key Generating RSA private key, 1024 bit long modulus ...............++++++ .......++++++ e is 65537 (0x10001)

Verifying - Enter pass phrase: Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE Enter pass phrase: Verifying - Enter pass phrase: This step creates public and private keys that will be used to encrypt and decrypt data streams sent to and from the server. Use a pass phrase that will be easy to remember but difficult for others to guess. The generated key file will be /etc/pki/tls/private/localhost.key. 3. If you are going to obtain a digital certification from a CA, you need to create a certificate signing request (this step is optional for self-signed certificates): # make certreq umask 77 ; \ /usr/bin/openssl req -new -key /etc/pki/tls/private/localhost.key - out /etc/pki/tls/certs/localhost.csr Enter pass phrase for /etc/pki/tls/private/localhost.key: You are about to be asked to enter information that will be incorporated Configuring a Web Server 549