Summary of Encryption.

Slides:



Advertisements
Similar presentations
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Advertisements

Cryptography and Network Security
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Basic Communication on the Internet: Integrated Browser Programs and Web-Based Services Tutorial 3.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
Online Security Tuesday April 8, 2003 Maxence Crossley.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Security Jonathan Calazan December 12, 2005.
Guide to Operating System Security Chapter 10 Security.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Alpha Five User Group, Bill Parker, SSL Security and WAS, July 2007 SSL Security with Alpha Five App Server Protecting sensitive or personal data.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Enhancing Security with S/MIME Chuck Connell,
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
Masud Hasan Secue VS Hushmail Project 2.
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Unit 2—Using the Computer Lesson 14 and Electronic Communication.
12/01/1999Joe Lewis - Xcert International Inc. Who’s Peeking at Your Files? A Guide to Personal Data Security.
Types of Electronic Infection
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Pasewark & Pasewark Microsoft Office 2003: Introductory 1 INTRODUCTORY MICROSOFT OUTLOOK Lesson 1 – Outlook Basics and .
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Not only business information, but a large amount of personal information too is now digitized and stored in computer connected to the internet. System.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.
Encryption / Security Victor Norman IS333 / CS332 Spring 2014.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Theme 1: Expansion of the home office Topic 3: Become more comfortable with Internet Explorer and Textbook: Chapter 1.2, P
Security fundamentals Topic 9 Securing internet messaging.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Key management issues in PGP
Unit 3 Section 6.4: Internet Security
Computer Communication & Networks
Lecture 10: Network Security.
DIGITAL ENCRYPTION INSTRUCTIONS FOR MICROSOFT OUTLOOK 2007
Unit 8 Network Security.
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

Summary of Encryption

What is encryption In encryption, we use a key or key to control an algorithim with changes a plain text file to a cypertext file that, hopefully can only be decrypted by the intended recipient. We do this to gain Privacy – our message is only read by the intended recepient Authenticity – the recepient knows who sent the message

Types of keys Symetrical Keys The same key decrypts and encrypts the message Gives us Privacy Authenticity The problem is how to get the key to the recipient. This problem is as large as sending the encrypted message

Types of Keys Public Key In public key cryptography there are two keys. A public key, used to encrypt the message. This is publicly available A private key, used to decrypt the message. This is know only to the intended recipient. There is no key exchange problem. The public key is publicly available. (how we will discuss)

Public Key Cryptography With public key cryptography we get Privacy We do not get authenticity. The recipient can not prove who the message is from To regain this, we use digital signatures as described in the last lecture. Public Key Cryptography is the only form used in most internet and email communication.

Practical Cryptography In practice, we need to obtain public keys in a manner we can trust to avoid a, Man in the Middle, attack. In a man in the middle attack, a malicious individual places him/herself in between two parties trying to communicate, and impersonates both.

Practical Cryptography To avoid this, we incorporate public keys into digital certificates issued by Certificate Authorities To use Cryptography, we generally need to obtain a digital certificate, from an authority. To do this, we first need a certificate, for the Certificate Authority. Lets look at those.

Certificate Authorities Versign – Major player Web site for email certificates www.verisign.com/authentication/individualauthentication/ digital_id.index.html Thawte – a “Trust” Network Originally independent Absorbed by Verisign in 2000 www.thawte.com

Using the certificate Note: Certificate allows you to receive encrypted email To send encrypted email to someone, they must have a digital certificate. To begin you must send your certificate to them, and they must send their certificate to you.

Outlook tutorial Tutorial Website support.gateway.com/s/tutorials/Tu_842008.shtml Gives the basics for setting up encrypted email

Mac OS X tutorial Long tutorial, including obtaining the key on http://www.macdevcenter.com/pub/a/mac/2003/01/20 /mail.html In short, once the key is obtained, it needs to be installed in keychain. From that point on, encryption is transparent. You click on an icon to encrypt outgoing mail. The Certificates are attached to entries in your address book. Certificates are automatically captured when attached to incoming mail.

Onion Routing A way to mask your surfing from your ip Website www.torproject.org

TorPark Secure browsing from public locations www.xerobank.com Originally called Torpark Released by our old friends, the Cult of the Dead Cow Hacktivismo branch Now commercial. (sigh) ;-( Featured, I am told on the series, “Smallville”