SlideShare a Scribd company logo
1
Public Key Infrastructure
Traditional Commerce
Electronic Commerce
Type of Commerce
2
Traditional Commerce
In the traditional way; The fact that
a document is written, original, and
sealed is the reason for its validity.
The parties negotiate and sign
documents phisically.
3
E-commerce means sharing information, maintaining commercial communications,
and conducting commercial exchanges through communication networks. One of
the important infrastructures of e-commerce is creating a safe space for
exchanging commercial data in the cyber environment. E-commerce models are:
 G2G
 G2C
 G2B
 B2B
 C2C
 B2C
4
Electronic Commerce
Security Attacks
Security Services
Security Mechanism
Requirements
5
Safe Commerce Requirements
(Security Attacks)
Interruption
Interception
Modification
Fabrication
6
Security Attacks
Destination
Source
7
Secure Data Transfer
Source Destination
Interruption
8
Source
Destination
Third system
Interception
9
Modification
10
Source Destination
Third system
Fabrication
11
Third system
Source Destination
(Authentication)
(Integrity)
(Non-Repudiation)
(Confidentiality)
(Security Services)
12
Security Services
encryption
authentication
auditing authorization
(Security Mechanism)
13
Security Mechanisms
 Privacy
 Authentication
 Integrity
 None Repudiation
P.A.I.N.
14
E-commerce Security
15
Cryptography
 Cryptography is a science that encrypts data using
mathematics and can return it to its normal state again.
 This science realizes the possibility of storing information as
well as transferring information on an insecure medium.
 Encryption is done using mathematical algorithms.
 In a system, the message is encrypted at the source. After that,
the encrypted message is transferred to the receiver and there
it is decoded to get the original message.
16
Cryptography
Cryptographical
Algorithms
(Symmetric)
(Asymmetric)
(Hash)
17
Cryptographical Algorithms
Symmetric Algorithms
 In secret key encryption, which is known as symmetric
encryption, a key is used to encrypt and decrypt the
message. Therefore, the sender and receiver of the
message must have a common secret, which is the key.
 Des. Triple Des and AES are the famous ones, it have so
many usages in financial systems for Credit card PINs and
Telecommunications systems.
18
 It is used to encrypt a large amount of
information.
 when used together with a Digital certificate;
It keeps information confidential.
 when used with an electronic signature; It
guarantees the integrity of the message.
19
Symmetric algorithms Usages
20
Symmetric algorithms
Symmetric keys must be distributed through a secure channel
and must be changed periodically. Example:
n*(n-1)/2 Parties Needed Keys
4 6
6 15
12 66
1000 499500
21
Key Managment
 Pros
 High-Speed encryption and decryption
 Fast key generation
 Cons
 Multiplicity of keys for members of each relationship
 Distributing the key between the communication parties
 Usages
 Encrypting a large amount of information when stored on an
insecure medium
 Data encryption when transmitted over insecure media
22
Symmetric algorithms
Asymmetric Algorithms
This method uses two keys.
One key is for encryption and another is for decryption.
 Two keys are mathematically related in such a way that the data
encrypted with each one can be decrypted with the other.
 Each user has two keys : Public Key and Private Key.
23
24
Asymmetric Algorithms
25
Asymmetric Algorithms
 Prons
 No need to distribute and send private keys
 Cons
 Low speed in high data volume
 The complexity of key generation
 Usages
 In electronic signature technology
26
Asymmetric algorithms
Translation results
In electronic signature technology
Translation results
In electronic signature technology
 To encrypt the data for each participating party, only the
public key of that participant is needed, as a result, only the
confirmation of the public key of the participants is required.
 The most important features of the asymmetric technique
are non-repudiation, electronic signature, and confirmation
of the correct data source.
27
Asymmetric algorithms
Hash algorithms, unlike the two mentioned
algorithms, do not use keys and perform one-way
encryption on information. The performance of these
functions on the data is such that by applying a Hash
function on a text, an abstract or digest of the text is
obtained.
28
Hash Algorithms
Input Output
Digest
29
Hash Algorithms
 Hash is a process that mathematically reduces the
volume of a stream of data to a fixed length. (usually
128 or 160 bits)
 The hash function is similar to a person's fingerprint.
.
30
Hash Algorithms
Input
Output
Digest
31
Hash Algorithms
• It is not possible to deduce the input from the
output.
• It is not possible to find two inputs that
produce the same output.
32
Hash Algorithms
 Pros
• No need to generate and send a key
• High Speed
 Cons
• Guarantee the integrity of the message
33
Hash Algorithms
34
Digital Signature
‫تعريف‬
•Digital Signature
– It is not like a handwritten signature.
– It is always different.
– It is based on encryption.
•Manual Signature
–It almost always looks the same.
–It can be faked.
35
Digital Signature
Message Hash Function
Message Digest
hash algorithm
Message
Digital Signature
Digital Signature
Sender Private Key
Encrypted Digest
160 bit Value
36
Digital Signature
37
Digital Signature verification
38
Digital Signature
Alice
BOB
Alice PVK
Packet
BOB PBK
BOB PVK
P
Random Key
Random
Key
ALICE PBK
‫؟‬
39
Digital Signature & Confidentiality
Alice
Packet
BOB PBK
BILL PBK
TOM PBK
BOB PVK
BILL PVK
TOM PVK
40
Sending for multiple recipients
 It is issued and signed by a trusted entity.
 It is based on the identity confirmation made by a center.
 It contains a set of information and the public key of a person or
organization.
 Its use is recorded in the certificate.
 It has a specific and limited validity period.
Digital Certificate
 There are centers that are responsible for issuing,
protecting, publishing, and revoking digital certificates.
 The public keys of these companies are located in Internet
browsers by default.
 Verification of people's identity is done hierarchically:
 Root Certificate Authority Root CA
• Sub CA
• Registration Authority RA
Certification Authority
RA RA
RA RA RA
Certificate
request
Root CA
CRL
Valid
Intermediate
CA
Intermediate
CA
CA & RA
CA Responsibilities
 Certificate Generation
 Certificate Issuance
 Certificate Relocation
 Certificate Renewal
 Database management
 Compilation of security policies
RA
Signature Owner
CA
Certificate Request
Private Key Location
X.509 Standard
47
Certificate Life Cycle
48
CA
RA
End
Entity
Directory
Services
Verification
of Applicant
Certificate
Archiving
Certificate
Expiration
Certificate
Revocation
Certificate
Publication
Certificate
Generation
49
GSMA Certificate Chain
50
Hardware Security Module
 Hardware security modules (HSM) perform cryptographic
operations, protected by hardware (PCI boards, SCSI
boxes, smart cards, etc.)
 These operations include:
 Random number generation
 Key generation (asymmetric and symmetric)
 Private key hiding (security) from attack (no
unencrypted private keys in software or memory)
 Private keys used for signing and decryption
 Private keys used in PKI for storing Root Keys
51
Why HSM?
 A number of public key operations require the
use of private keys as part of various processes:
 Cryptographically or digitally signing an object,
a file, etc.
 Decrypting an encrypted object or file
 These processes happen in active memory, which
is vulnerable to attack and copying of a private
key in open use, unencrypted

More Related Content

PPTX
Encryption in Cryptography
DOCX
Cryptography
PPT
Cryptographysecurity 1222867498937700-9
PDF
Cisco cybersecurity essentials chapter -5
PDF
Information Security Imp +Past Paper.pdf
PPT
Cryptography&Security
PPTX
Secrity project keyvan
PPT
PKI_Applications digital certificate.ppt
Encryption in Cryptography
Cryptography
Cryptographysecurity 1222867498937700-9
Cisco cybersecurity essentials chapter -5
Information Security Imp +Past Paper.pdf
Cryptography&Security
Secrity project keyvan
PKI_Applications digital certificate.ppt

Similar to PKI.pptx (20)

PPT
Public Key Infrastructure and Application_Applications.ppt
PDF
How encryption works
PDF
What is Cryptography ( cryptography )_.pdf
PDF
CNS_Solutions-Adi.pdf
PDF
CNS Solutions-Adi.pdf
PDF
CNS_Solutions-Adi.pdf
PPT
Digital signature Brief Introduction
PDF
Introduction of an SSL Certificate
PPTX
Digital signature
PPTX
Cryptography
PPTX
E-commerce security using asymmetric key algorithm
PDF
Email Encryption using Tri-Cryptosystem Based on Android
PDF
kasodhan2019.pdf
PPTX
PPTX
Public Digital Identity as a Service
PDF
Iaetsd a survey on cloud storage security with
PPT
Introduction to Digital signatures
PPT
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
PPT
Online security & encryption
PPTX
Understanding the Role of Hardware Data Encryption in EMV and P2PE
Public Key Infrastructure and Application_Applications.ppt
How encryption works
What is Cryptography ( cryptography )_.pdf
CNS_Solutions-Adi.pdf
CNS Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
Digital signature Brief Introduction
Introduction of an SSL Certificate
Digital signature
Cryptography
E-commerce security using asymmetric key algorithm
Email Encryption using Tri-Cryptosystem Based on Android
kasodhan2019.pdf
Public Digital Identity as a Service
Iaetsd a survey on cloud storage security with
Introduction to Digital signatures
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
Online security & encryption
Understanding the Role of Hardware Data Encryption in EMV and P2PE
Ad

Recently uploaded (20)

PPTX
Lecture Notes Electrical Wiring System Components
PPTX
UNIT 4 Total Quality Management .pptx
DOCX
573137875-Attendance-Management-System-original
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
composite construction of structures.pdf
PDF
Digital Logic Computer Design lecture notes
PPTX
Construction Project Organization Group 2.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPT
Project quality management in manufacturing
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Geodesy 1.pptx...............................................
PPTX
Sustainable Sites - Green Building Construction
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Lecture Notes Electrical Wiring System Components
UNIT 4 Total Quality Management .pptx
573137875-Attendance-Management-System-original
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
composite construction of structures.pdf
Digital Logic Computer Design lecture notes
Construction Project Organization Group 2.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Foundation to blockchain - A guide to Blockchain Tech
Project quality management in manufacturing
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Geodesy 1.pptx...............................................
Sustainable Sites - Green Building Construction
UNIT-1 - COAL BASED THERMAL POWER PLANTS
bas. eng. economics group 4 presentation 1.pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Ad

PKI.pptx