Charu Gupta B.Tech CS 3 Yr Roll No. 0821510020
Charu Gupta B.Tech CS 3 Yr Roll No. 0821510020
Charu Gupta B.Tech CS 3 Yr Roll No. 0821510020
0821510020
1
Key
Plaintext
Encryption
Decryption
Plaintext
3 cryptographic algorithms: Message-digest algorithm Map variable-length plaintext to fixed-length cipher text. Secret-key algorithm Use one single key to encrypt and decrypt Public-key algorithm Use 2 different keys public key and private key.
Use a secret key to encrypt a message into cipher text. Use the same key to decrypt the cipher text to the original message. Also called Symmetric cryptography.
Secret Key Cipher text Secret Key
Plaintext
Encryption
Decryption
Plaintext
Secret-Key Problem?
All keys need to be replaced, if one key is compromised. Not practical for the Internet environment. On the other hand, the encryption speed is fast. Suitable to encrypt your personal data.
Public-key Encryption
Involves 2 distinct keys public, private. The private key is kept secret and never be divulged, and it is password protected (Pass phase). The public key is not secret and can be freely distributed, shared with anyone. It is also called asymmetric cryptography. Two keys are mathematically related, it is infeasible to derive the private key from the public key. 100 to 1000 times slower than secret-key algorithms.
Public Key Cipher text Private Key
Plaintext
Encryption
Decryption
Plaintext
an example:
5 Encryption:
Cipher text C = M * Public Key 5 * 4 = 20
Public-Private Encryption
Public key
Private key
Digital Signature
Suppose message
encrypted with public key is tampered by some1 in b/w then u receive a corrupted message when decrypted using private key..solution is digital signature..reverse of assymetric process..
Public Key
Ensure the document being unchanged during transmission. Also ensures non repudiation since the sender only had the private key, cannot deny he send message
USER
BANK
FAKE BANK
The main function of a digital certificate is to ensure that a user sending a file or message is who or she claims to be. In addition ,digital IDs provide a higher degree of security by encrypting messages so only the specified recipients can access the contents.
A digital certificate is an electronic ID" issued by a certification authority (CA). It contains your name, a serial number, expiration dates, a copy of the certificate holder's public key (used for encrypting messages and digital signatures), and the digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real. Digital certificates can be kept in registries so that authenticating users can look up other users' public keys.
Digital Certificates
When a Web browser like Firefox, Netscape or Internet Explorer makes a secure connection, the digital certificate is automatically turned over for review. The browser checks it for anomalies or problems, and pops up an alert if any are found. When digital certificates are in order, the browser completes secure connections without interrupt.
Hashing Algorithm
Issuer
Period of Validity
Message Digest
Subject
C=US ST=NY L=Albany O=OFT CN=John Doe
Signature of Issuer
Certificate Database
CA
Raman
Signed Certificate
M E S S A G E
verifies requester credentials and binds his public key in the certificate
Raman provide geeta with DC &certifies his key Verifies sender msg using senders public key
Web site of CA
Geeta
Public key of CA
Certificate Authorities
A CA is responsible for verifying the identity of a requesting entity before issuing a certificate. The CA then signs the certificate using its private key, which is used to verify the certificate. A CA's public keys are distributed in software packages such as Web browsers and operating systems, or they can also be added manually by the user.
Each organization may have a CA that issues certificates for its employees Public CAs - e.g., Verisign -- issue certificates for anyone Banks etc may issue certificates for customers How do people with certificates from different CAs talk to each other?
Certificate Authorities
MCI RSA AT&T Thawte Verizon
Certificate types
Personal certificate Server certificate Software publisher certificate CA certificate
ensure that only the sender and the intended recipient can read the contents of the message
Authentication
ensure that all parties are who they claim to be such that there is no spoofing (pretending to be someone else) and misrepresentation (misleading purpose)
Integrity
ensure that information is not tampered with in transit to the recipient
Non-repudiation
ensure that a party to a genuine transaction cannot falsely deny its participation
Greater customer satisfaction/confidence.peace of mind that CA guarantees your Clients FULL authentication when issuing DC.SAFER business environment for your customer as well as yourself Certificate encrypted with cas private key .receiver s/w has public key s of most CA's.So receiver can check if cas really created the certificate
Disadvantages
The certifying authorities structure is incredibly Complex and must be changed in some way before it could be easily applied to Internet users, but will be essential to a large scale evolution in e-commerce Financial Disadvantages Certification authorities typically require a subscription to their service, which requires monthly payments to continue the relationship. In addition, multiple certificates for different sites or purposes can become a costly endeavor. Technological Disadvantages Creating a platform that accepts all digital certificates is a difficult undertaking, and human carelessness may compromise the safety of login credentials.
Trusted authorities may make mistake Most user m/c which store private key r vulnerable to misuse n theft When u are installing or downloading a file your computer warns you when the files has no digital certificate. However, even if the file is digitally signed, the certificate does not guarantee that the software will function correctly this is limitation of digital certificate. Furthermore, a digital certificate has a validity period usually 1 to 2 yrs- that sets up when the certificate is valid and when it will be revoked.
Applications
part of many security protocols implemented by software publishers Online Businesses, For secure e commerce e-libraries most browsers store digital certificates of trusted authorities so that you are visiting the right website And warns you when the certificate presented is invalid. government transactions, legally binding situations. interaction with a lack of prior knowledge about the involved parties For the authentication of e-mails, files, web servers, executables, copyright protection and virtually all computer based application that require authentication
A digital certificate is an electronic "passport" that establishes your credentials when doing business or other transactions on the Web. It is issued by a certification authority (CA). It is probable that in the near future organizations and individuals will have several digital certificates (IDs) for a range of different activities in which they are required to validate their identities. For example, a person working within a government department may use one digital ID to access confidential information within an intranet while using another separate ID to make on line purchases. The government or department can be the authority that issues digital certificates. Can be used for verifying ,identifying instead of revealing.
Q/A
Thank You