Digital Certificates. What is a Digital Certificate? A digital certificate is the equivalent of your business card in the e-commerce world. It says who.

Slides:



Advertisements
Similar presentations
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Advertisements

Lori Fitterling LI843 SSL Secured Sockets Layer. What is Secure Sockets Layer (SSL)? It is protection of data transferred over the Internet using encryption.
Encryption, SSL and Certificates BY JOSHUA COX AND RACHAEL MEAD.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
Mar 19, 2002Mårten Trolin1 This lecture On the assignment Certificates and key management SSL/TLS –Introduction –Phases –Commands.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
03 December 2003 Public Key Infrastructure and Authentication Mark Norman DCOCE Oxford University Computing Services.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
Web services security I
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Supporting Technologies III: Security 11/16 Lecture Notes.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Masud Hasan Secue VS Hushmail Project 2.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Configuring Directory Certificate Services Lesson 13.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Module 9: Fundamentals of Securing Network Communication.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Software Security Seminar - 1 Chapter 5. Advanced Protocols 조미성 Applied Cryptography.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
Windows 2000 Certificate Authority By Saunders Roesser.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Public Key Infrastructure (PKI) Chien-Chung Shen
SSL. Why Is Security Important ●Security is important on E-Commerce because it makes sure that your information gets from your computer to their server.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Pertemuan #10 Secure HTTP (HTTPS) Kuliah Pengaman Jaringan.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Public Key Encryption, Secure WWW Transactions & Digital Signatures.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Digital Signatures and Digital Certificates Monil Adhikari.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
April 20023CSG11 Electronic Commerce Encryption John Wordsworth Department of Computer Science The University of Reading Room.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
ENCRYPTION, SSL, CERTIFICATES RACHEL AKISADA & MELANIE KINGSLEY.
1 Internet data security (HTTPS and SSL) Ruiwu Chen.
Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE
Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE
Presentation transcript:

Digital Certificates

What is a Digital Certificate? A digital certificate is the equivalent of your business card in the e-commerce world. It says who you are. Digital certificates are base on Private Key/Public Key technology.

What is Private Key/Public Key Technology? Ciphers are used to encrypt data. Two of the more common types are:  Symmetrical Ciphers – They have one key which is used to encrypt and decrypt data. Some common symmetrical ciphers are: DES IDEA  Asymmetrical Ciphers – These ciphers have two keys, one used for encryption and one for decryption. The most common type of these is Public Key and Private Key encryption. Public and Private Keys can be used to authenticate both the source and recipient of a message.

How does Public/Private Key Encryption work? In the following example Bill and Monica are close friends. They have exchange Public Keys with each other so that they can conduct private correspondence.

The Key to the Bill and Monica Story! Bill want to go out on a hot date with Monica so he sends her an asking her out. Bill wants Monica to know the message is from him so he digitally signs it using his Private Key. Monica gets the message and sees it is digitally signed by Bill. She knows that she can validate his signature by using his Public Key. She does this and now knows that it is from Bill. But Bill is an amorous man and this message might not of been for her. He could be bulk Billing. What’s a girl to do?

The Key Goes On! Monica decides to respond to Bill, but she only wants him to be able to read her message. She encrypts her message using Bills Public Key. Bill gets Monica’s and uses his Private Key to decrypt the message. He has been made a very tempting offer, but he only knows that the message is for him. He is not certain it is from Monica.

Key Decisions! Bill is very excited about Monica's offer and wants to ensure that Monica knows that the response is from him and is only for her. Bill writes his response and signs this using his private key. This way Monica will know it is from him. Bill then encrypts the message using Monica’s public key. The message can now only be decrypted by Monica's Private Key. As Monica is the only one with her Private Key this means that she knows the message is specifically for her. When she opens her she will know that the message was for her and that it came from Bill. Let the good times roll!

Where else can you use Digital Certificates? Many organisations use SSL Digital Certificates.  These are used to facilitate encryption of links for Web/ applications.

Why use an SSL Certificate? Prior to the use of SSL Certificates, sensitive information transferred using Web/ based applications, were often passed between the computer and the server in clear text. This meant that Userids, Passwords and Information could all be viewed if someone made use of a sniffing tool such as Packet Sniffer. SSL certificates can provide organisations with:  Secure  Secure Electronic Commerce  Secure Software Publishing  Client Authentication  Smart Card logon capabilities.

How Does SSL Encryption Work? Secure Socket Layer (SSL) come in 40 and 128 bit encryption. These bit numbers designate the level of encryption used. For example the 40 bit encryption key has 2 to the 40 th power number of combinations (or 1,099,511,627,776) different key combination possibilities. The only real way to crack an SSL document is by using brute force attacks, using every key combination possible until you hit the correct one. This is extremely time consuming. One of the first crack examples of this type used 120 computers running parallel processes and took 8 days to search half the key space.

How Do You Get an SSL Certificate? SSL certificates are generated by a Certification Authority (CA). A CA provides the following services. They:  Issue Certificates for:  Server Authentication;  Client Authentication; and  Secure .  Integrate with Active Directory (AD) to:  Publish Certificates and CRLS; and  Provide CA Information.  Can provide Certificate Enrollment using mechanisms such as:  ActiveX control or Win32 wizard.

What Types of CA’s Exist? Types of CA’s are:  Enterprise: Domain authentication of requests Templates define certificate content  Stand Alone: Out-of-band authentication of requests  Exchange: KMS – specific policy modules KMS provides key archival/recovery for .

How does an Organistion get their Certificates? Digital certificates can be:  Self-signed – meaning that the organisation is the CA. OR  Commercially signed – which means that the certificates are generated using a recognised commercial CA. VeriSign is one company that generates commercially signed certificates.

Commercial-Signed Certificates They offer a good degree of assurance to relying parties. Less management overhead. Commercial-signed certificates are not easy to forge. However they ARE a costly solution.

Self-Signed Certificates Don’t offer a good degree of assurance to relying parties. Require a significant amount of management. They are easy to forge. They are cost effective.

Commercial or Internal certificates? There is reasonable grounds for an organisation to generate their own certificates for internal systems. HOWEVER There is still a need to use Commercially Signed Certificates when conducting business with external agencies. Some example would be:  Secure  Electronic Commerce