Download presentation
Presentation is loading. Please wait.
Published byScott Wilkins Modified over 9 years ago
2
Not only business information, but a large amount of personal information too is now digitized and stored in computer connected to the internet. System connected to the internet are potential target for eavesdropping and destruction/tempering of the data stored in them. Website offering services on the internet is vulnerable to attacks.
3
Authorized e-commerce and e-governance transactions could be modified or replayed for commercial gain. Unauthorized use of computing systems compromise of data and financial losses. Systems, networks and data have to be protected to guard against such attacks which could originate from within the organization or from outside.
4
Trojan sometimes referred to as a Trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system. computer virus a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability.
5
Worm A computer worm is a self-replicating Malware computer program. It uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. E-mail spam also known as junk e-mail, is a subset of spam that involves nearly identical messages sent to numerous recipients by e-mail.
6
Externally accessible systems are targets of hacking. Hackers can deface websites and steal valuable information from systems resulting in a significant loss of revenue if it is a financial institution or an e- commerce site. Phishing is the creation of e-mail message referencing web pages that are replicas of existing sites to make users believe that these are authentic sites.
7
IP Spoofing IP spoofing is used by intruders to gain unauthorized access to computers. Message are sent to the computer with the sender IP address of a trusted system. Packet headers of the message are modified to make it appear that the message is coming from a trusted system.
8
For externally accessible systems such as web, e-mail and FTP servers, protection can be accorded in following ways: Scanning Demilitarised zone(DMZ) Turn on system and firewall logs Implement intrusion Detection Systems. Establish proxy servers Establish an additional networks as a buffer between the internal and external networks. SSL( Secure sockets layer)
9
Three Pillars of a Secure Communication Privacy A secure conversation should be private. In other words, only the sender and the receiver should be able to understand the conversation. Integrity A secure communication should ensure the integrity of the transmitted message. This means that the receiving end must be able to know for sure that the message he is receiving is exactly the one that the transmitting end sent him. authentication A secure communication should ensure that the parties involved in the communication are who they claim to be.
10
Cryptography is "the art of writing in secret characters". Encrypting is the act of translating a 'normal message' to a message written with 'secret characters' (also known as the encrypted message). Decrypting is the act of translating a message written with 'secret characters' into a readable message (the unencrypted message).
11
A key-based algorithm uses an encryption key to encrypt the message. This means that the encrypted message is generated using not only the message, but also using a 'key':
13
The receiver can then use a decryption key to decrypt the message. Again, this means that the decryption algorithm doesn't rely only on the encrypted message. It also needs a 'key':
15
Symmetric Key These type of algorithm uses the same key for encryption and decryption. Symmetric cryptosystems began in 1977 when the Data encryption standard(DES) was adopted as a United States federal standard. Symmetric system operate either in the block cipher(fixed size block) or in the stream cipher(data of any size). In block cipher data is encrypted in 64-bit block using a 56-bit key. Triple-DES follows the same algorithms as DES, using three 56-bit keys. 64-bit data block are first encrypted using key1. the result is encrypted using key 2and again using key 3
16
Although this type of algorithms are generally very fast and simple to implement, they also have several drawbacks. The main drawback is that they only guarantee privacy Another drawback is that both the sender and the receiver need to agree on the key they will use throughout the secure conversation (this is not a trivial problem).
18
Public-key algorithms are asymmetric algorithms and, therefore, are based on the use of two different keys, instead of just one. In public-key cryptography, the two keys are called the private key and the public key Private key: This key must be know only by its owner. Public key: This key is known to everyone (it is public) Relation between both keys: What one key encrypts, the other one decrypts, and vice versa. That means that if you encrypt something with my public key (which you would know, because it's public :-), I would need my private key to decrypt the message.
19
In a basic secure conversation using public-key cryptography the sender encrypts the message using the receiver's public key The encrypted message is sent to the receiving end, who will decrypt the message with his private key. Only the receiver can decrypt the message because no one else has the private key. Also, notice how the encryption algorithm is the same at both ends: what is encrypted with one key is decrypted with the other key using the same algorithm.
21
There is no need to agree on a common key for both the sender and the receiver if someone wants to receive an encrypted message, the sender only needs to know the receiver's public key As long as the receiver keeps the private key secret, no one but the receiver will be able to decrypt the messages encrypted with the corresponding public key. unlike symmetric algorithms, public-key systems can guarantee integrity and authentication, not only privacy. The main disadvantage of using public-key systems is that they are not as fast as symmetric algorithms.
22
Digital Signatures
23
1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies are as good as original 5.Easily modifiable
24
Why Digital Signatures? To provide Authenticity, Integrity and Non- repudiation to electronic documents To use the Internet as the safe and secure medium for e-Commerce and e- Governance
25
Integrity is guaranteed in public-key systems by using digital signatures. A digital signature is a piece of data which is attached to a message and which can be used to find out if the message was tampered with during the conversation
27
The digital signature for a message is generated in two steps: A message digest is generated. A message digest is a 'summary' of the message we are going to transmit, and has two important properties: (1) It is always smaller than the message itself and (2) Even the slightest change in the message produces a different digest. The message digest is generated using a set of hashing algorithms. The message digest is encrypted using the sender's private key. The resulting encrypted message digest is the digital signature.
28
The digital signature is attached to the message, and sent to the receiver. The receiver then does the following: Using the sender's public key, decrypts the digital signature to obtain the message digest generated by the sender. Uses the same message digest algorithm used by the sender to generate a message digest of the received message.
29
Compares both message digests (the one sent by the sender as a digital signature, and the one generated by the receiver). If they are not exactly the same, the message has been tampered with by a third party. We can be sure that the digital signature was sent by the sender (and not by a malicious user) because only the sender's public key can decrypt the digital signature (which was encrypted by the sender's private key; remember that what one key encrypts, the other one decrypts, and vice versa). If decrypting using the public key renders a faulty message digest, this means that either the message or the message digest are not exactly what the sender sent.
30
A digital certificate is a digital document that certifies that a certain public key is owned by a particular user. This document is signed by a third party called the certificate authority (or CA).
31
Signed by using CA’s private key User Name & other credentials User Name & other credentials User’s Public key User’s Public key User Certificate Certificate Database Publish Certificate Request User Name User’s Public Key CA’s Name Validity Digital Signature of CA Certificate Class User’s Email Address Serial No. Key pair Generation Private Public Web site of CA User 1 certificate User 2 certificate. Public License issued by CCA
32
An X.509 certificate is a plain text file which includes a lot of information in a very specific syntax. four most important things we can find in an X.509 certificate: Subject: This is the 'name' of the user. It is encoded as a distinguished name (the format for distinguished names will be explained next) Subject's public key: This includes not only the key itself, but information such as the algorithm used to generate the public key. Issuer's Subject: CA's distinguished name. Digital signature: The certificate includes a digital signature of all the information in the certificate. This digital signature is generated using the CA's private key. To verify the digital signature, we need the CA's public key (which can be found in the CA's certificate).
33
Eavesdropping is the act of secretly listening to the private conversation of others without their consent. Destruction is the concept of damage to an object, system. A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Espionage or spying involves individual obtaining information that is considered secret or confidential without the permission of the holder of the information. An intruder is a person or animal who undesirably enters someone else's putative territory. A cipher is an algorithm for performing encryption or decryption
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.