Krishna Sattiraju CS 792.NET. Overview  What is XML Encryption  Methods for Encryption  Storage of Encrypted Data  Benefits of XML Secure Storage.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Public Key Infrastructure and Applications
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Public Key Infrastructure Alex Bardas. What is Cryptography ? Cryptography is a mathematical method of protecting information –Cryptography is part of,
Conventional Encryption: Algorithms
XML Encryption Prabath Siriwardena Director, Security Architecture.
Cryptographic Security Presented by: Josh Baker October 9 th, CS5204 – Operating Systems.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
1 XML Encryption Notes from encrypt/index.html by Bilal Siddiqui And “Secure XML” by Eastlake and Niles.
Overview of Cryptography Oct. 29, 2002 Su San Im CS Dept. EWU.
August 6, 2003 Security Systems for Distributed Models in Ptolemy II Rakesh Reddy Carnegie Mellon University Motivation.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Web services security I
ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt.
Encryption Methods By: Michael A. Scott
What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
1 Web Services Security XML Encryption, XML Signature and WS-Security.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
Key Management with the Voltage Data Protection Server Luther Martin IEEE P May 7, 2007.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
Computer encryption is… Based on the science of cryptography.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
XML CRYPTOGRAPHY CS 795. NET Sunish Kotla
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Advanced Windows 8 Apps Using JavaScript Jump Start Exam Prep M5: Data, Files, and Encryption Michael Palermo Microsoft Technical Evangelist Jeremy.
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 23/10/2015 | pag. 2.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Data Security (File, Database, XML) Team: SecurityGurus Suresh Konda Jiji Nair Pallavi Shetty.
1 Integrating digital signatures with relational database: Issues and organizational implications By Randal Reid, Gurpreet Dhillon. Journal of Database.
What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav
NETWORK SECURITY.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
1 Thuy, Le Huu | Pentalog VN Web Services Security.
Cryptology aka Cryptography Tim Cahill Ryan Church.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
Task Force CoRD Meeting / XML Security for Statistical Data Exchange Gregory Farmakis Agilis SA.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Slides for Chapter 11: Security.
Paper On Cryptography CS300 Technical Paper Review Avinash Chambhare Abdus Samad.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Real time Stock quotes by web Service and Securing XML for Web Services security. Bismita Srichandan
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Symmetric and Asymmetric Encryption
Security Design.
Security in Network Communications
Cryptography and Network Security
The Secure Sockets Layer (SSL) Protocol
NET 311 Information Security
Presentation transcript:

Krishna Sattiraju CS 792.NET

Overview  What is XML Encryption  Methods for Encryption  Storage of Encrypted Data  Benefits of XML Secure Storage  Types of XML Encryption

XML Encryption  Specification that defines how to encrypt data  Used to encrypt data, keying information and algorithms

Methods for encryption Using Symmetric Encryption Combination of Symmetric and Asymmetric Encryption X.509 Certificates

Storage of Encrypted Data  Whole element is replaced with an element named  Only the data in the element is replaced and its name remains readable in the document

XML Document Code

Encrypted Code

Asymmetric XML Encryption and Decryption o Select XML Element o Encrypt element o Encrypt Session Key o Create Encrypted Data element o Replace Original element o Select Encrypted Data element o Decrypt Session Key o Decrypt Cipher Data using unencrypted symmetric o Replace the Encrypted Data Element

Name Spaces  System. XML  System.Security. Cryptography  System.Security.Cryptography.xml

Benefits of XML Secure Storage XML Is Structured Format Allows for secure storage of documents Provides granularity Leverages Existing technologies

XML Encryption  Encrypted data is maintained.  All information needed to decrypt a document is contained within the document.  Session can be secured on the document level and shared between multiple parties.  Sensitive data is easily interchanged between applications.

XML Encryption of Element John Smith A23B45C56

XML Encryption using Content John Smith A23B45C56

Encrypting XML Content (Character Data) John Smith A23B45C56 Example Bank 04/02

XML Encryption in WS- Security <env:Envelope xmlns:env=" xmlns:xenc=" <wsse:Security xmlns:wsse="

XML Encryption w/ Digital Certificate <EncryptedData xmlns=" Type=" <EncryptionMethod Algorithm=" rsakey.pem IPiEu9Nv+EsGyvV... xrfPSA+BEI+8...

XML Signing AND XML Encryption Order of Cryptographic operations matters Signing and Encrypting Encrypting and Signing Change of the order while Decrypting - Danger

References  XML Encryption by By: Derek Smyth : Smyth  XML Encryption Syntax and Processing By Takeshi Imamura, Blair Dillaway, Ed Simon  encrypt2/ encrypt2/ 

Thank You!!!