Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher.

Slides:



Advertisements
Similar presentations
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Advertisements

Cryptography and Network Security
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
CSE 461 Section. “Transport Layer Security” protocol Standard protocol for encrypting Internet traffic Previously known as SSL (Secure Sockets Layer),
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Principles of Information Security, 2nd edition1 Cryptography.
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
CSCI 6962: Server-side Design and Programming
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Chapter 10: Authentication Guide to Computer Network Security.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Linux Networking and Security Chapter 8 Making Data Secure.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Computer encryption is… Based on the science of cryptography.
Encryption Objective 1: Explain data encryption procedures.
Learning Aid Type Text Page 206 MGS GROUP C Svitlana Panasik.
Material being covered 3/9 Remainder of Text Chapter 6 (Q5, 6) Text Chapter 6A Material Posted 3/9 Midterm Information Introduction to Text Chapter 7.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Encryption Encryption is the process of obscuring information to make it unreadable without special knowledge. information
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Types of Electronic Infection
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Public Key Encryption.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Pertemuan #10 Secure HTTP (HTTPS) Kuliah Pengaman Jaringan.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Network and Internet Security Prepared by Dr. Lamiaa Elshenawy
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Electronic Banking & Security Electronic Banking & Security.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
Unit 8 Network Security.
Electronic Payment Security Technologies
Presentation transcript:

Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher

Encryption is the obscuring of information to make it unreadable without special knowledge, sometimes referred a scrambling now used in protecting many kinds of systems, such as the Internet e-commerce, mobile telephone networks, and bank automatic teller machines is the obscuring of information to make it unreadable without special knowledge, sometimes referred a scrambling now used in protecting many kinds of systems, such as the Internet e-commerce, mobile telephone networks, and bank automatic teller machines

Encryption Secrecy/Privacy other techniques are still needed to make communications secure, particularly to verify the integrity and authenticity of a message Message authentication code (MAC) Digital signatures Antother consideration is protection against traffic analysis other techniques are still needed to make communications secure, particularly to verify the integrity and authenticity of a message Message authentication code (MAC) Digital signatures Antother consideration is protection against traffic analysis

Encryption or Software code obfuscation is also used in software copy protection against reverse engineering, unauthorized application analysis cracks and software piracy used in different encryption or obfuscation software

Encryption Systems Computer encryption is based on the science of crytograph, which has been used throughout history. Most computers encryption systems belong in one of two categories: Symmetirc-key encryption Public-key encryption Computer encryption is based on the science of crytograph, which has been used throughout history. Most computers encryption systems belong in one of two categories: Symmetirc-key encryption Public-key encryption

Symmetric Key each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to another computer.

Public Key uses a combination of a private key and a public key.

Public Key: Secure Sockets Layer (SSL) is a popular implementation of public-key encryption SSL is an Internet security rotocol used by Internet browsers and web servers to transmit sensitive information. It’s had become part of TLS is a popular implementation of public-key encryption SSL is an Internet security rotocol used by Internet browsers and web servers to transmit sensitive information. It’s had become part of TLS

Transport Layer Security (TLS) an overall security protocol In your browser, you can tell when you are using a secure protocol, such as TLS, in a couple of different ways: The “http: in the address line is replaced with “https” A small padlock in the status bar at the top of the browser window an overall security protocol In your browser, you can tell when you are using a secure protocol, such as TLS, in a couple of different ways: The “http: in the address line is replaced with “https” A small padlock in the status bar at the top of the browser window

Hashing Algorithms The key in public-key encryption is based on a hash value. This is a value that is computed from the base input number using a hashing algorithm. The hash value is a summary of the original value. It is nearly impossible to derive the original input number without knowing the data used to create the hash value. The key in public-key encryption is based on a hash value. This is a value that is computed from the base input number using a hashing algorithm. The hash value is a summary of the original value. It is nearly impossible to derive the original input number without knowing the data used to create the hash value.

Authentication is used to verify that the information comes from a trusted source. If information is “authentic,” you know who created it and you know that it has not been altered in any way since that person created it. There are several ways to authenticat a person or information on a computer is used to verify that the information comes from a trusted source. If information is “authentic,” you know who created it and you know that it has not been altered in any way since that person created it. There are several ways to authenticat a person or information on a computer

Ways to authenticate Password The use of a user name and password provides the most common form of authentication Pass cards These cards can range from a simple cad with a magnetic strip, similar to a credit card, to sophisticated smart cards that have an embedded computer chip Digital signatures A digital signature is basicllly a way to ensure that an electonic document (e0mail, spreadsheet, text file) is authentic. Password The use of a user name and password provides the most common form of authentication Pass cards These cards can range from a simple cad with a magnetic strip, similar to a credit card, to sophisticated smart cards that have an embedded computer chip Digital signatures A digital signature is basicllly a way to ensure that an electonic document (e0mail, spreadsheet, text file) is authentic.

Digital Signature Algorithm (DSA) is a type of public-key encryption method that Digital Signatures are based on. DSS is the format for digital signatures that has been endorsed by the U.S. government. DSA algorithm consists of a private-key, known only by the originator of the document (the signer), and a public-key which has four parts. is a type of public-key encryption method that Digital Signatures are based on. DSS is the format for digital signatures that has been endorsed by the U.S. government. DSA algorithm consists of a private-key, known only by the originator of the document (the signer), and a public-key which has four parts.

Checking for Corruption Another secure-computing need is ensure that the data has not been corrupted during transmission or encryption. A popular ways to do this are Checksum Another secure-computing need is ensure that the data has not been corrupted during transmission or encryption. A popular ways to do this are Checksum

Checksum is probably one of the oldest methods of ensuring that data is correct provides a form of authentication because an invalid checksum suggest that the sata has been compromised in some fashion. is probably one of the oldest methods of ensuring that data is correct provides a form of authentication because an invalid checksum suggest that the sata has been compromised in some fashion.

Source: on.4.htmhttp://computer.howstuffworks.com/encrypti on.4.htm Notice the “http” not “https”…not a Secure Sockets Layer (SSL) on.4.htmhttp://computer.howstuffworks.com/encrypti on.4.htm Notice the “http” not “https”…not a Secure Sockets Layer (SSL)