Encryption. What is encryption? Encryption is conversion of original data to another data that can be converted back to original data by authorized persons.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure and Applications
A New Approach of Signing Documents with Symmetric Cryptosystems and an Arbitrator Nol Premasathian Faculty of Science King Mongkut’s.
By: Hassan Waqar.  A PROTOCOL for securely transmitting data via the internet.  NETWORK LAYER application.  Developed by NETSCAPE.
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
Digital Signatures. Anononymity and the Internet.
Electronic Transaction Security (E-Commerce)
Apr 9, 2002Mårten Trolin1 Previous lecture TLS details –Phases Handshake Securing messages –What the messages contain –Authentication The second assignment.
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.
Network Security Secure hypertext transfer protocol (https) Cookies Public Key Cryptography.
INF 123 SW ARCH, DIST SYS & INTEROP LECTURE 17 Prof. Crista Lopes.
Electronic Mail Security. Authentication and confidentiality problems Two systems: - PGP (Pretty Good Privacy) - S/MIME (Science Multipurpose Internet.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
Deployment Models A. client (no S/MIME) »NHIN-Direct developed security agent »off-the-shelf S/MIME proxy B. client using Native S/MIME »Internet.
What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.
Public Key Encryption An example of how a bank might accomplish encryption.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
IS 247 Introduction to Web Application Development Tim Wu.
Learning Aid Type Text Page 206 MGS GROUP C Svitlana Panasik.
Material being covered 3/9 Remainder of Text Chapter 6 (Q5, 6) Text Chapter 6A Material Posted 3/9 Midterm Information Introduction to Text Chapter 7.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Case Study II: A Web Server CSCI 8710 September 30 th, 2008.
Types of Electronic Infection
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
System Security: Cryptography Technologies CPE Operating Systems
SSL(Secure Socket Layer) Guided By:- Presented By:- Richard Sinn Jimmy Mehta
Encryption / Security Victor Norman IS333 / CS332 Spring 2014.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Public Key Encryption.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
SSL. Why Is Security Important ●Security is important on E-Commerce because it makes sure that your information gets from your computer to their server.
1 Hello World and Welcome to The simple crypt Key=23 {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.
Module 5: Configuring and Managing File Systems. Overview Working with File Systems Managing Data Compression Securing Data by Using EFS.
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
System Security: Cryptography Technologies CPE Operating Systems
Fall 2006CS 395: Computer Security1 Key Management.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
Secure Socket Layer Protocol Dr. John P. Abraham Professor, UTRGV.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
1-way String Encryption Rainbows (a.k.a. Spectrums) Public Private Key Encryption HTTPS Encryption.
ENCRYPTION, SSL, CERTIFICATES RACHEL AKISADA & MELANIE KINGSLEY.
Digital Signatures.
Unit 3 Section 6.4: Internet Security
Security Design.
Topic 1: Data, information, knowledge and processing
E-Commerce Security.
Keys Campbell R. Harvey Duke University, NBER and
Campbell R. Harvey Duke University and NBER
Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE
Campbell R. Harvey Duke University and NBER
Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE
Public – Private Key Cryptography
Unit 8 Network Security.
Electronic Payment Security Technologies
Introduction to Cryptography
Presentation transcript:

Encryption

What is encryption? Encryption is conversion of original data to another data that can be converted back to original data by authorized persons. For example: – Cell phone call – SSL web site protocol – Answer sharing during exam

Basic types of encryptions Shared key (Symmetric key) encryption – Same key for encryption and decryption. For example: Zip or Rar encrypted archive Encrypted Word, Excel, Power Point document Sometimes national security agents use little-known languages Public key encryption – Two keys: one for encryption and another for decryption. For. Ex.: SSL secured web site protocol (partically) Certificate sing E-GOV key

Shared key Encryption and decryption processes use same key

Simple shared key

Public key Public key consists of two keys: – Public key (known by everyone) – Private key (known only by authorized person) Used in two main directions: – First: Anyone can send message encrypted using public key but only authorized person can decrypt it – Second: Only authorized person can encrypt message by private key, everyone can decrypt it by public key (everybody sure that message from authorized person)

Public key One private key One public key

Public key One private key One public key