Recap unit 2 Review cipher systems, RSA Digital signatures

Slides:



Advertisements
Similar presentations
Digital Signatures. Anononymity and the Internet.
Advertisements

15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
Electronic Transaction Security (E-Commerce)
Cryptography in World War II Jefferson Institute for Lifelong Learning at UVa Spring 2006 David Evans Class 4: Modern Cryptography
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
Attacks on Digital Signature Algorithm: RSA
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Data Security 101 Part 1: PKI and SSL. Reading First, read the VeriSign case, –page Second, read section 5.3 –pages Finally, briefly skim.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Public Encryption: RSA
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Supporting Technologies III: Security 11/16 Lecture Notes.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Computer encryption is… Based on the science of cryptography.
Pertemuan-13 Enkripsi and Authentication. Symmetric-key Cryptography  Data encrypted and decrypted with same key  Classical examples: Caesar cipher,
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Public-Key Cryptography CS110 Fall Conventional Encryption.
David Evans CS200: Computer Science University of Virginia Computer Science Class 36: Public-Key Cryptography If you want.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Encryption.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
14-1 Last time Internet Application Security and Privacy Basics of cryptography Symmetric-key encryption.
1 Hello World and Welcome to The simple crypt Key=23 {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.
Encryption CS110: Computer Science and the Internet.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
1 Original Message Scrambled Message Public Key receiver Internet Scrambled+Signed Message Original Message Private Key receiver The Process of Sending.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
Web Server Management: Securing Access to Web Servers Jon Warbrick University of Cambridge Computing Service.
Henric Johnson1 Secure Electronic Transactions An open encryption and security specification. Protect credit card transaction on the Internet. Companies.
Digital Signatures.
Developing an e-commerce site
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
How do we buy and sell on the Internet safely?
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
Cryptography Reference: Network Security
Cryptography Reference: Network Security
Secure Electronic Transaction
Chapter 5 Electronic Commerce | Security
Uses Uses of cryptography Lab today on RSA
BY GAWARE S.R. DEPT.OF COMP.SCI
Basic Network Encryption
Topic 1: Data, information, knowledge and processing
E-Commerce Security.
Information Security message M one-way hash fingerprint f = H(M)
Chapter 5 Electronic Commerce | Security
Secure Electronic Transaction (SET) University of Windsor
Chapter 4 Cryptography / Encryption
Secure Socket Layer (SSL) Transport Layer Security (TLS)
Cryptography Reference: Network Security
Secure Electronic Transactions (SET)
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Handbook of Applied Cryptography - CH11, from 11.5~11.8
Basic Network Encryption
Electronic Payment Security Technologies
Fluency with Information Technology Lawrence Snyder
Security at the Transport Layer
Security: Public Key Cryptography
Introduction to Cryptography
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

Recap unit 2 Review cipher systems, RSA Digital signatures Who uses cryptography? E-commerce Start unit 3 with logic gates

RSA recap What is a cipher system? Is RSA a cipher system? How does RSA work? How is RSA different?

Example Suppose Alice wants to send Bob a message. What will happen if Alice encrypts the message using: Bob’s e Bob’s d Her own e Her own d Digital signature Nonrepudation: Alice can’t deny that she sent the message.

Encryption Today Who uses secret communication today? Just the military and CIA? You can easily encounter it every day Essential part of Web browsers See ecommerce.pdf for details

E-commerce When you buy something online, why do you need encryption? What does an online merchant need in order to sell stuff online? RSA and AES (XOR) Bank authenticates your credit card Certification authority authenticates merchant Https: secure site and padlock icon