Symmetric Encryption Mom’sSecretApplePieRecipe Mom’sSecretApplePieRecipe The same key is used to encrypt and decrypt the data. DES is one example. Pie.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Public Key Infrastructure (PKI)
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
Information Security & Cryptographic Principles. Infosec and Cryptography Subjects / Topics : 1. Introduction to computer cryptography 1. Introduction.
Public Key Management and X.509 Certificates
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key over network? Solution: trusted key distribution center (KDC)
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
X.509 Certificate management in.Net By, Vishnu Kamisetty
Public Key Cryptography July Topics  Symmetric and Asymmetric Cryptography  Public Key Cryptography  Digital Signatures  Digital Certificates.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
Chapter 5. Learning Objectives Understand the need for secure Outline benefits of PGP and S/MIME Understand vulnerabilities and how.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
©Copyrights 2011 Eom, Hyeonsang All Rights Reserved Distributed Information Processing 20 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science.
Secure Electronic Transaction (SET)
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Information Security Fundamentals Major Information Security Problems and Solutions Department of Computer Science Southern Illinois University Edwardsville.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Unit 1: Protection and Security for Grid Computing Part 2
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Networks Management and Security Lecture 3.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Authentication 3: On The Internet. 2 Readings URL attacks
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav
IST E-infrastructure shared between Europe and Latin America ULAGrid Certification Authority Vanessa Hamar Universidad de Los.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Creating and Managing Digital Certificates Chapter Eleven.
S/MIME (Secure/Multipurpose Internet Mail Extensions) security enhancement to MIME – original Internet RFC822 was text only – MIME provided.
Network Security Celia Li Computer Science and Engineering York University.
1 Certification Issue : how do we confidently know the public key of a given user? Authentication : a process for confirming or refuting a claim of identity.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
GRID-FR French CA Alice de Bignicourt.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
第五章 电子邮件安全. Security is one of the most widely used and regarded network services currently message contents are not secure –may be inspected.
Public Key Infrastructure (PKI)
Security is one of the most widely used and regarded network services
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
Network Security - A Lecture 1 - NETW4006 NETW4006-Lecture01 1.
e-Security Solutions Penki Kontinentai Vladas Lapinskas
Presentation transcript:

Symmetric Encryption Mom’sSecretApplePieRecipe Mom’sSecretApplePieRecipe The same key is used to encrypt and decrypt the data. DES is one example. Pie Key Important Concepts

Symmetric Encryption The Advantages ° Secure ° Widely Used ° The encrypted text is compact ° Fast The Disadvantages ° Complex Administration ° Requires Secret Key Sharing ° Large Number of Keys ° No non-repudiation ° Keys are Subject to interception Important Concepts

Asymmetric Encryption One half of a key pair is used to encrypt, the other half is used to decrypt. RSA is one example. Mom’sSecretApplePieRecipe Mom’sSecretApplePieRecipe PublicKeyRecipient’sPublicKeyRecipient’sPrivateKeyPrivateKey Important Concepts

Asymmetric Encryption The Advantages ° Secure ° No secret sharing ° No prior relationship ° Easier Administration ° Far fewer keys ° Supports non- repudiation The Disadvantages ° Slower than symmetric key ° The encrypted text is larger than a symmetric version ° point to multi-point does not scale Important Concepts

The Combination Mom’sSecretApplePieRecipe RandomSymmetricKey Bill’sPublicKey Mom’s Secret Apple Pie Recipe Encrypted To:Bill “Digital Envelope” “Key Wrapping” Important Concepts

The Combination You get the best of both worlds ° The benefits of Symmetric Key Speed Compact Encrypted Text ° The benefits of Public Key Simpler Key management Digital Signature Non-Repudiation

Mom’sSecretApplePieRecipe Digest Certifying Authority’s Digital Signature Digital Certificates Encrypted Certificate Name, Address, OrganizationOwner’s Public Key Certificate Validity Dates All you need is the CA’s public key to verify the certificate and extract the certified public key Important Concepts

What is a Certificate? A signed packet of identifying attributes Identifying Attributes: ° Subject Name (the user being identified) ° Public Key ° Issuer Name (trusted source identifying user) ° Validity Period ° Signature Specified in: ° RFC 2459 ° x.509 v 1-3 Serial Number : 6cb0dad0137a5fa79888f Validity : Nov.08, Nov.08,1998 Subject / Name / Organization Locality = Internet Organization = VeriSign, Inc. Organizational Unit = VeriSign Class 2 CA - Individual Subscriber Organizational Unit = Incorp. by Ref.,LIAB.LTD(c)96 Organizational Unit = Digital ID Class 2 - Netscape Common Name = Mom Address = Unstructured Address = RR2, Pieland, USA Status: Valid Public Key: ie86502hhd009dkias736ed55ewfgk98dszbcvcq m85k309nviidywtoofkkr2834kl Signed By : VeriSign, Inc.: kdiowurei495729hshsg0925h309afhwe09721h akndnxnzkjoaioeru y5 Important Concepts

Digital Signatures Clear Text “Hash” Digest Clear Text Encrypted Digest Hi level Functionality Non-Repudiation

Digital Signatures Mom’sSecretApplePieRecipe “Hash Function” Digest Mom’sSecretApplePieRecipe DigestEncrypted Digest ‘ DigestEncrypted “match?” Signer’sPublicKey Hi level Functionality Non-Repudiation

Key Generation Standards ° RFC 2510 Key may be generated by End Entity, RA, or CA – ANSI x not specified but commonly used ° PKCS #11 Key may be generated by End Entity, RA, or CA – RSA ( ) – DSA ( ) – ECDSA Certificate Issuance

Certificate Creation Standards ° PKCS #1 ° RFC 2459 Certificate and CRL Profile Specifies the the type and format of a certificate – essentially x.509 with some modification Uses PKCS #1 specifiers – MD5 with RSA for signature – SHA-1 with RSA for signature Certificate Issuance

How do you assure that you get a real (and valid) public key? X.509 Digital Certificate “I officially notarize the association “I officially notarize the association between this particular User, and between this particular User, and this particular Public Key” this particular Public Key”

How do I validate a certificate? For a certificate to be valid, the following checks must normally succeed: ° today’s date must fall between the starting and ending validity dates for the certificate ° the signature must be valid ° the contents of the certificate must not have changed ° the certificate issuer must be one we trust ° the certificate must not have been revoked