1 Introduction The State of the Art in Electronic Payment Systems, IEEE Computer, September 1997.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Cryptographic Techniques Instructor: Jerry Gao Ph.D. San Jose State University URL: May,
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Codes, Ciphers, and Cryptography-RSA Encryption
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Supporting Technologies III: Security 11/16 Lecture Notes.
The RSA Algorithm Rocky K. C. Chang, March
How HTTPS Works J. David Giese. Hyper Text Transfer Protocol BrowserHTTP Server GET / HTTP/1.1 HOST: edge-effect.github.io HEADERS BODY HTTP/ OK.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Public-Key Cryptography CS110 Fall Conventional Encryption.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Midterm Review Cryptography & Network Security
Computer and Internet Security. Introduction Both individuals and companies are vulnerable to data theft and hacker attacks that can compromise data,
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
1 Network Security Basics. 2 Network Security Foundations: r what is security? r cryptography r authentication r message integrity r key distribution.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
1 Hello World and Welcome to The simple crypt Key=23 {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.
Chapter 4: Public Key Cryptography
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
CPIS 312 Chapter Four: PUBLIC KEY CRYPTO. Index 2 A.Introduction A.1 Asymmetric Key Cryptography- Introduction A.2 General ideas about the Public Key.
Cryptography and Network Security Chapter 13
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Chapter 3 - Public-Key Cryptography & Authentication
Introduction to Cryptography
Presentation transcript:

1 Introduction The State of the Art in Electronic Payment Systems, IEEE Computer, September 1997

2 Requirements and Safeguards for ECommerce Entity authentication Message integrity Payment non-repudiation Effective audit mechanism Privacy

3 Safeguards and Security Mechanisms Cryptography –Private- and Public-key Cryptography –Cryptographic Certificates

4 Hello World and Welcome to The simple crypt Key=23 {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography

5 ALICE BOB Eve

6 Message This is a big secret Message I?~jhYU WEKUia The Internet Message This is a big secret Message I?~jhYU WEKUia Recipient’s private key Recipient’s PUBLIC key

7 PGP,Version Manual, NetworkAssociates, 1999.

8

9 Certificate Authorities The Certificate Authority (CA) is a trusted third party Provides the necessary authentication and security infrastructure The CA creates and issues certificates

10 PGP,Version Manual, NetworkAssociates, 1999.

11 Sondra Schneider, IFsec, June 11, 1999.

12 Using the CA to Establish Trust Customer Merchant The CA 1- Establish a Certificate 2- send signed request and certificate 3- Check Signature 4-Merchant can trust customer and may continue with trade

13 Sondra Schneider, IFsec, June 11, 1999.

14 Sondra Schneider, IFsec, June 11, 1999.

15 Authentication Protocols General-purpose secure messaging protocols include: –SSL –S/MIME Secure protocols for electronic commerce include: –EDI/MIME. –SET

16 SET Byte, June 1997

17 June 1997

18 June 1997

19 The Use of Smartcards Byte, June 1997

20 Minimal Key Lengths for Symmetric Ciphers, Matt Blaze and others, 1996.

21 Avoiding bogus encryption products, Matt Curtin, 1998.

22 RSA from the RSA FAQ RSA is a public-key cryptosystem –take two large primes, p and q, –find their product n = pq; (n is called the modulus) –Choose, e, less than n and relatively prime to (p- 1)(q-1), and find its inverse, d, mod (p-1)(q-1), which means that: ed = 1 mod (p-1)(q-1) ; – e and d are called the public and private exponents, respectively. –The public key is the pair (n,e); –the private key is d. –The factors p and q must be kept secret, or destroyed.

23 Two numbers are relatively prime when they share no factors in common other than 1. In other words, if the greatest common divisor of a and n is equal to 1. This is written: gcd(a,n) = 1

24 It is difficult (presumably) to obtain the private key d from the public key (n,e). If one could factor n into p and q, however, then one could obtain the private key d. Thus the entire security of RSA is predicated on the assumption that factoring is difficult.

25 RSA encryption: suppose Alice wants to send a private message, m, to Bob. Alice creates the ciphertext c = m^e mod n, e and n are Bob's public key. To decrypt, Bob computes: m = c^d mod n, and recovers the original message m; the relationship between e and d ensures that Bob correctly recovers m. Since only Bob knows d, only Bob can decrypt.

26 public-key operations take O(k^2) steps, private key operations take O(k^3) steps, key generation takes O(k^4) steps where k is the number of bits in the modulus