e-Security Solutions Penki Kontinentai Vladas Lapinskas

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure and Applications
Cryptography and Network Security
Information Security & Cryptographic Principles. Infosec and Cryptography Subjects / Topics : 1. Introduction to computer cryptography 1. Introduction.
Increased Security, while protecting Privacy ? True or False ? Christer Bergman, President and CEO, Precise Biometrics.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Tools and Techniques of Encryption Jeremy Malcolm A presentation to WASCAL on 29 May 1996.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
James Higdon, Sameer Sherwani
Symmetric Encryption Mom’sSecretApplePieRecipe Mom’sSecretApplePieRecipe The same key is used to encrypt and decrypt the data. DES is one example. Pie.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
1 Thuy, Le Huu | Pentalog VN Web Services Security.
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
CIA AAA. C I A Confidentiality I A Confidentiality Integrity A.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Fundamentals of Network Security Ravi Mukkamala SCI 101 October 6, 2003.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.
Key management issues in PGP
Web Applications Security Cryptography 1
Security is one of the most widely used and regarded network services
Security Outline Encryption Algorithms Authentication Protocols
Symmetric and Asymmetric Encryption
Public Key Infrastructure and Applications
Cryptography and Network Security
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
IS3230 Access Security Unit 9 PKI and Encryption
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
Keys Campbell R. Harvey Duke University, NBER and
Campbell R. Harvey Duke University and NBER
Cryptography and Network Security
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
Secure Electronic Transaction (SET)
Message Digest Cryptographic checksum One-way function Relevance
Security in Network Communications
Campbell R. Harvey Duke University and NBER
Secure Electronic Transaction (SET) University of Windsor
Lecture 4 - Cryptography
The Secure Sockets Layer (SSL) Protocol
Lecture 10: Network Security.
Install AD Certificate Services
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
The Italian Academic Community’s Electronic Voting System
Cryptography and Network Security
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

e-Security Solutions Penki Kontinentai Vladas Lapinskas VladasL@5ci.lt Banking Technology Vladas Lapinskas VladasL@5ci.lt

New Great Opportunities Car PC PC’s ATM Smart Phone Mobile Information Kiosk Wallet PC TV (set-top, Internet and game machine)

Main Business Principles Safety Privacy Trust

Town-Wide Secure Network

Video Security Banking Office Home

Cryptographic techniques Encryption To Secure Confidential Data Hash Functions To Protect Data Integrity Digital Signature For Authentication and Non-Repudiation Digital Certificates For Identification Complex solutions Finance e-Government Healthcare

Encryption / Decryption Secret symmetric key One Key: Secret or Session Key Useful for: Fast Encryption / Decryption Problem: Key Management Examples: DES, Triple-DES Public Key Private Key Encryption Decryption PKI encryption Two Keys: Public and Private Keys Useful for: Encryption, Signing, Verifying, Key Exchange Problem: Very Slow Examples: RSA, DSA

Digital Signatures                                                                 Smart card Card reader +

Certification Authority Digital Certificates I have verified that William Whyte has the matching secret key to this public one: 5E F8 87 32 AF 7E C9 7A 76 1E 49 I have verified that his email address is: william@nowhere.com and he can be contacted at: +353-1-6054399 Signed Certification Authority Valid Until Jan 1st, 2003  Information about a person  Their public key  A Digital Signature

Third – party trust

Trusted solutions for the new age The Future New technology Traditional values: Safety, Privacy, Trust Finance e-Government Healthcare Trusted solutions for the new age

Obstacles Legal Human Technical

Thank you for your interest Penki Kontinentai Thank you for your interest