Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Digital Signatures and Hash Functions. Digital Signatures.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Techniques Instructor: Jerry Gao Ph.D. San Jose State University URL: May,
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key in the first place? Solutions: Deffie-Hellman trusted key distribution.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key over network? Solution: trusted key distribution center (KDC)
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
1. INDEX 2 A signature is a handwritten depiction of someone’s name or nickname that a person writes on documents as proof of identity and intent. Signature.
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Public Key Cryptography July Topics  Symmetric and Asymmetric Cryptography  Public Key Cryptography  Digital Signatures  Digital Certificates.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
Secure Electronic Transaction (SET)
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
Authentication 3: On The Internet. 2 Readings URL attacks
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Network Security Celia Li Computer Science and Engineering York University.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Basics of Cryptography
Computer Communication & Networks
Lecture 4 - Cryptography
Presentation transcript:

Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari

Cryptography Concepts  Symmetric-key encryption: One key.  Public-key encryption: Two keys  One-way hash algorithms  Digital signature: Combine public key with hash  Key exchange: Combine symmetric key with public key What is a Public-Key Infrastructure?  Certificate  Certification authority (CA)  Registration  Certificate enrollment  Certificate revocation

Public-key cryptography is a key technology for e- commerce, intranets, extranets and other web-enabled applications. Supporting infrastructure is needed.

Also called shared-key encryption or secret-key cryptography. The key is called secret key, symmetric key or session key It uses a single key that both the sender and recipient possess. It is used for both encryption and decryption. Efficient for encrypting large amounts of data. The primary yardstick for the strength of a symmetric algorithm is its key size.

Two keys—a public key and a private key, which are mathematically related. Also sometimes called asymmetric-key encryption. The public key can be passed openly between the parties or published in a public repository.But the private key remains private. Data encrypted with the public key can be decrypted only using the private key. Verse the same.

Public-key algorithms are using very large numbers. slow forms of cryptography. In practice, used only at critical points, _such as for exchanging a symmetric key performed on a large amount of data or for signing a hash of a message

Digital signatures are used to verify that the individual sent the message really is who he or she claims to be, and to confirm that the message received is identical to the message sent. Data is distributed in cleartext, such as with . In this case, while the sensitivity of the message itself may not warrant encryption, it can be important to ensure that the data is in its original form and has not been sent by an impostor

A hash—also as a hash value or a message digest —is a different type of data transformation from key-based cryptography (whether symmetric key or public key). A hash is the conversion of a piece of data of any length into a non-reversible fixed-length number by applying a one-way mathematical function called a hash algorithm to the data.

The length of the resulting hash value is very large The sender generates a hash of the message, encrypts it, and sends it with the message itself. The recipient then decrypts both the message and the hash, produces another hash from the received message, and compares the two hashes. If they are the same, there is an extremely high probability that the message was transmitted intact.

You can use public-key technology in conjunction with hash algorithms to create a digital signature. A digital signature acts as a data integrity check and provides proof of possession of the private key.

 Generating data into a hash value.  Using a private key, the sender transforms the hash value into a digital signature.  The sender then sends the data, signature, and the sender’s certificate to the recipient.  The recipient applies the hash algorithm to the received data and generates a hash value.  The recipient uses the signer's public key and the newly generated hash value to verify the signature.  This process is transparent to the user.

Hash algorithms can process data much faster than public- key algorithms. Hashing the data also reduces the size of the data to be signed and thus speeds the signing process. When creating or verifying the signature, the public-key algorithm has to transform only the hash value (128 or 160 bits of data).

Symmetric-key algorithms are excellent for quickly and securely encrypting data. However, the requirement that sender and receiver must exchange a secret key before data can be exchanged is their weakness. Combining symmetric algorithms to encrypt the data with public-key algorithms to exchange the secret key yields a solution that is both fast and scalable.

 The sender obtains the public key of the recipient.  The sender creates a random secret key (the single key used in symmetric-key encryption).  The sender uses the secret key with a symmetric algorithm to convert the plaintext data into ciphertext data.  The sender uses the recipient’s public key to transform the secret key into ciphertext secret key.

 The sender sends the ciphertext data and ciphertext secret key to the recipient.  The recipient converts the ciphertext secret key into plaintext using the private key of the recipient.  The recipient converts the ciphertext data into plaintext using the plaintext secret key.  Again, these steps are performed by PKI-enabled applications and are transparent to the user.

A PKI is the set of operating system and application services that make it easy and convenient to use public- key cryptography. PKI is used to describe the policies, standards, and software that regulate or manipulate certificates and public and private keys.

A certification authority (CA) is an entity trusted to issue certificates. A CA accepts a certificate request, verifies the requester's information according to the policy of the CA, uses its private key to apply its digital signature to the certificate. The CA then issues the certificate to the subject.

Registration is the process by which subjects make themselves known to a CA. Registration can be implicit in the act of: making the request for a certificate, accomplished through another trusted entity assuring for the subject, or done as a result information received from a trusted source. Once registered with the CA, a certificate is issued to the subject, provided that the certificate is in satisfaction with the criteria of CA policy.

It refers to a public key certificate. The issuer and signer of the certificate is known as a certification authority (CA). The entity being issued the certificate is the subject of the certificate. A public key certificate is a digitally signed statement that binds the value of a public key to the identity of the subject (person, device, or service) that holds the corresponding private key. It is signed by the Certification Authority( CA)

Certificates also contain:  The certificate’s serial number, which is guaranteed by the CA to be unique.  The name of the CA that issued the certificate and the key that was used to sign the certificate.  An identifier of the policy that the CA followed to establish that the subject is who it says it is.  The key-pair (the public/private key) identified in the certificate.

Certificates have a specified lifetime, but CAs can reduce this lifetime by the process known as certificate revocation. The CA publishes a certificate revocation list (CRL) that lists serial numbers of certificates that no longer usable, the reason for revocation, and date from which to apply.

"What are our business requirements for increased security, and can a PKI help address them?" Some services stand out as immediate candidates for PKI support: , secure file transfer, document management services, remote access, e- commerce and Web-based transaction services.

Cryptography lets the receiver of an electronic message verify the sender, ensures that a message can be read only by the intended person, and assures the recipient that a message has not be altered in transit. A public key infrastructure (PKI) includes the techniques and standards used to manage certificates and public and private keys in order to authenticate the validity of each party involved in an electronic transaction.

The End