Cryptography Network Security
Cryptography Network Security
Cryptography Network Security
Security
Security
Passive Attacks
- corrupt the content of information
Active Attacks
- Interrupt of halt file transfer
between both parties
Cryptography
- Art of writing secret code that
protects data from theft or alteration
Person B
Active
Intruder
Passive Attack
Person B
Person A
Passive
Eaves
Dropper
Why Cryptography
Authentication
- proof of identity
- Privacy/confidentiality
- Integrity
- no data alteration
- Non-repudiation
- message was actually send
by sender & no one else
Cryptography Terminologies
Intruder
Encryption
Decryption
Plaintext
Cypher text
Algorithm
- mathematical functions
Key
- String of digits
Cryptography
Data Encryption Standard (DES)
- Private Key (Secret Key difficult
to break)
Cryptographic Protocols
Kerberos
- network authentication system for insecure
networks
IP Sec
SET Protocol
PGP
- File storage applications and Email services
- Supports digital signature and encryption
Cryptographic protocol analyzer tool (CryPA)
Methods of Encryption
Secret Key or Symmetric Key
Cryptography
Public key or Asymmetric key
cryptography
Hash Function
Encrypt Encrypted
Message
Secret Key
Internet
Encrypted
Message
Secret Key
Decrypt
Orginal
Message
Encrypt Encrypted
Message
Public Key
(Cipher Text)
Internet
Encrypted
Message
Private Key
Decrypt
Orginal
Message
Hash Function
Formula that converts a message of
a given length into a string of digits
called as a message digest
Encryption Algorithm
RSA Algorithm
- Public Key encryption
- use in Outlook,windows,firefox,IBM lotus notes
- Its a freeware
Popular encryption softwares
- PGP
- SSL (Secured Socket Layer Banks,
(VISA,Master card)
- SET (Secure Electronic Transactions MS)
- DES (IBM)
Encrypt
6EB69570
08E03CE4
Alice
Hello Alice
Decrypt
Regulations of Encryption
http://www.bis.doc.gov/encryption/de
fault.htm
Breaking Encryption
Schemes
E-Commerce Application
Secure Hypertext Transfer Protocol (S-HTTP)
TCP-Based Application Protocol HTTP, SMTP,NNTP
Secure Socket Layer
Internet Protocol (IP)
Web Security Layers
Verisign verifies
(Authentication)
Owner ship of domain name, that
business exists
That business has the authority to
apply for the certificate
EV SSL Certificate (Verisign extended
validation)
- Highest kind of authentication
Cryptographic Application
Digital signature provide authentication
for online transactions
SSL protocol for internet security
PGP security standard for Email
Provide Network security
Steganography (a method of hiding
messages in innocent artifacts)
Issuing Digital Certificate
Biometric System
Digital Signature
Used for authenticating E-commerce
business transactions
Two parts
- Signer Authentication
- Document Authentication
- sender cannot remove content
after signing it
- Receiver cannot make any
changes in the message
Digital Signature
Hash Function: Formula that converts
message of a given length into string
of digits called a message digest
Non-Repudiation and
Message Integrity
User and recipient cannot dispute the
contents once sent.
Message Integrity : - important to
validate the authenticity of the
credentials to be sure of their
orginality
NRO (Non-repudation of Origin)
NRR (Non-repudiation of receipt)