1 Thuy, Le Huu | Pentalog VN Web Services Security.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure and Applications
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Cryptographic Technologies
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
Web services security I
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
SSL Technology Overview and Troubleshooting Tips.
JSSE API University of Palestine Eng. Wisam Zaqoot April 2010.
1 Lecture 5 George Koutsogiannakis/ Summer 2011 CS441 CURRENT TOPICS IN PROGRAMMING LANGUAGES.
CSCI 6962: Server-side Design and Programming
Csci5233 Computer Security1 GS: Chapter 6 Using Java Cryptography for Authentication.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
How HTTPS Works J. David Giese. Hyper Text Transfer Protocol BrowserHTTP Server GET / HTTP/1.1 HOST: edge-effect.github.io HEADERS BODY HTTP/ OK.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Module 9: Fundamentals of Securing Network Communication.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Java Security Session 19. Java Security / 2 of 23 Objectives Discuss Java cryptography Explain the Java Security Model Discuss each of the components.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
TIBCO BusinessWorks.  Generating the key   You will have to create a certificate as you own the server.  The ‘Keytool’ is a utility provided in the.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
1 Session 4 Module 6: Digital signatures. Digital Signatures / Session4 / 2 of 18 Module 4, 5 - Review (1)  Java 2 security model provides a consistent.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Fundamentals of Network Security Ravi Mukkamala SCI 101 October 6, 2003.
Computer Communication & Networks
IS3230 Access Security Unit 9 PKI and Encryption
The Secure Sockets Layer (SSL) Protocol
Presentation transcript:

1 Thuy, Le Huu | Pentalog VN Web Services Security

2 Agenda Cryptography Concepts – Cryptographic Algorithms Cryptographic Operations – Data Privacy – Data Integrity, Authenticity, and Non-repudiation Basics of Digital Certificates and Certificate Authority – What is a Digital Certificate – Certificate Purposes Create Your Own Certificate and CA WS Security Implementation Using Apache CXF and Spring

3 Cryptography Concepts Cryptography is the art and science of keeping data secure. Cryptographic services help ensure data privacy, maintain data integrity, authenticate communicating parties, and prevent repudiation (when a party refutes having sent a message). Three major areas of concern: privacy, authentication, and integrity are addressed using Cryptography.

4 Cryptography Concepts Basic encryption allows you to store information or to communicate with other parties while preventing non- involved parties from understanding the stored information or understanding the communication Encryption transforms understandable text (plaintext) into an unintelligible piece of data (ciphertext). Decryption restores the understandable text from the unintelligible data Both functions involve a mathematical formula (the algorithm) and secret data (the key).

5 Cryptographic Algorithms Symmetric key algorithm – With a secret or symmetric key algorithm, the key is a shared secret between two communicating parties. Encryption and decryption both use the same key

6 Cryptographic Algorithms Asymmetric key algorithm – One of the keys, the private key, is kept secret and not shared with anyone. The other key, the public key, is not secret and can be shared with anyone

7 Cryptographic Algorithms

8 Cryptographic Operations Data Privacy – Encryption/Decryption Field/Message level encryption: The user application completely controls key generation, selection, distribution, and what data to encrypt Session level encryption: SSL or HTTPS is such sesion level encryption Link Level encryption: Usually by specialized hardware. Bank ATM networks may implement hardware encryption – Translate The translate operation is used to decrypt data from encryption under one key to encryption under another key. This is done in one step to avoid exposing the plaintext data within the application program

9 Cryptographic Operations Data Integrity, Authenticity, and Non-repudiation – Hash (Message Digest)

10 Cryptographic Operations Data Integrity, Authenticity, and Non-repudiation – HMAC (Hash MAC), MAC (Message Authentication Code)

11 Cryptographic Operations Data Integrity, Authenticity, and Non-repudiation – Sign/Verify

12 Basics of Digital Certificates and Certificate Authority What is a Digital Certificate – Digital certificates are electronic credentials that are used to assert the online identities of individuals, computers, and other entities on a network. – Digital certificates function similarly to identification cards such as passports and drivers licenses. – Most commonly they contain a public key and the identity of the owner. They are issued by certification authorities (CAs) that must validate the identity of the certificate-holder both before the certificate is issued and when the certificate is used. – Common uses include business scenarios requiring authentication, encryption, and digital signing

13 Digital Certificate

14 Digital Certificate

15 Certificate Purposes Encryption. A certificate with this purpose will contain cryptographic keys for encryption and decryption. Signature. A certificate with this purpose will contain cryptographic keys for signing data only. Signature and encryption. A certificate with this purpose covers all primary uses of a certificate’s cryptographic key, including encryption of data, decryption of data, initial logon, or digitally signing data. Signature and smartcard logon. A certificate with this purpose allows for initial logon with a smart card, and digitally signing data; it cannot be used for data encryption.

16 Create Your Own Certificate and CA Java Keytool: Generate a Key Pair, Your Self-Signed Certificate OpenSSL: Set Up a Certificate Authority keytool -genkey -alias client -keystore /pressf5/ClientKeyStore.jks -keyalg RSA -sigalg SHA1withRSA //password: client-pass and key-pass keytool -genkey -alias server -keystore /pressf5/ServerKeyStore.jks -keyalg RSA -sigalg SHA1withRSA //password: server-pass and key-pass keytool -export -alias client -file /pressf5/certfile.cer -keystore /pressf5/ClientKeyStore.jks keytool -export -alias server -file /pressf5/scertfile.cer -keystore /pressf5/ServerKeyStore.jks keytool -import -alias server -file /pressf5/scertfile.cer -keystore /pressf5/ClientKeyStore.jks keytool -import -alias client -file /pressf5/certfile.cer -keystore /pressf5/ServerKeyStore.jks openssl x509 -signkey cakey.pem -req -days in careq.pem -out caroot.cer -extensions v3_ca

17 WS Security Implementation Apache CXF for server both Soap and Rest – UsernameToken – Timestamp – Signature – Encrypt Deploy on Tomcat Server – HTTP – SSL/HTTPS Intergrated with Spring Apache CXF client for Soap, Jersey for client Rest

18 Link Reference SOAP SERVICE – – REST SERVICE – – e.cxf.systests/cxf-systests-rs- security/2.5.2/org/apache/cxf/systest/jaxrs/security/bob.prope rties?av=f e.cxf.systests/cxf-systests-rs- security/2.5.2/org/apache/cxf/systest/jaxrs/security/bob.prope rties?av=f – – secure-restful-web-services-using-jersey-client secure-restful-web-services-using-jersey-client

19 Thank You