SlideShare a Scribd company logo
Security Overview
 Cryptography functions
   Secret key (e.g., DES)
   Public key (e.g., RSA)
   Message digest (e.g., MD5)
 Security services
   Privacy: preventing unauthorized release of information
   Authentication: verifying identity of the remote participant
   Integrity: making sure message has not been altered
                                            Security


                     Cryptography                               Security
                      algorithms                                services


          Secret        Public        Message      Privacy   Authentication   Message
           key           key            digest                                integrity
       (e.g., DES)   (e.g., RSA)    (e.g., MD5)




Secret Key (DES)


      Plaintext                                                            Plaintext


    Encrypt with                                                     Decrypt with
     secret key                                                       secret key
                                        Ciphertext
Public Key (RSA)
         Plaintext                         Plaintext


       Encrypt with                      Decrypt with
        public key                        private key
                           Ciphertext



 Encryption & Decryption
                      c = memod n
                      m = cdmod n




Message Digest
  Cryptographic checksum
     just as a regular checksum protects the receiver from
     accidental changes to the message, a cryptographic
     checksum protects the receiver from malicious
     changes to the message.
  One-way function
    given a cryptographic checksum for a message, it is
    virtually impossible to figure out what message
    produced that checksum; it is not computationally
    feasible to find two messages that hash to the same
    cryptographic checksum.
  Relevance
     if you are given a checksum for a message and you
     are able to compute exactly the same checksum for
     that message, then it is highly likely this message
     produced the checksum you were given.
Public key authentication
                A                          B

                         E(x ,
                               Publ
                                   ic )
                                    B

                             x




Key Distribution
 Certificate
   special type of digitally signed document:
      “I certify that the public key in this document belongs to
         the entity named in this document, signed X.”
   the name of the entity being certified
   the public key of the entity
   the name of the certified authority
   a digital signature
 Certified Authority (CA)
   administrative entity that issues certificates
   useful only to someone that already holds the CA’s
   public key.

More Related Content

PPTX
10 system.security.cryptography
PPTX
Key exchange in crypto
PDF
How does cryptography work? by Jeroen Ooms
PPTX
3 public key cryptography
PDF
Why Should You Pay Attention To Quantum Computing?
PPT
Authentication Protocols
PDF
Blockchain_FintechEvo_ver1.8_am
PPTX
Digital signature
10 system.security.cryptography
Key exchange in crypto
How does cryptography work? by Jeroen Ooms
3 public key cryptography
Why Should You Pay Attention To Quantum Computing?
Authentication Protocols
Blockchain_FintechEvo_ver1.8_am
Digital signature

What's hot (14)

PDF
Seamless Guest Experience with Kafka Streams (Ramaraju Indukurir and Himani A...
PPT
Stallings Kurose and Ross
PPTX
Json Web Token - JWT
PPTX
Ethereum Intro
DOCX
Network Security
PDF
MongoDB World 2019: Using Client Side Encryption in MongoDB 4.2 Link
PPTX
Cryptography Presentation
PDF
Cryptography For The Average Developer
PDF
Thotcon 2019 - When Strong Encryption Isn't
PDF
solutions.hamburg | web3 // smart contracts // ethereum
DOC
Id32
PPTX
Public Key Cryptosystem
PPTX
Quantum Computing & Cryptography: A Brief Introduction
PDF
MongoDB .local Chicago 2019: Using Client Side Encryption in MongoDB 4.2
Seamless Guest Experience with Kafka Streams (Ramaraju Indukurir and Himani A...
Stallings Kurose and Ross
Json Web Token - JWT
Ethereum Intro
Network Security
MongoDB World 2019: Using Client Side Encryption in MongoDB 4.2 Link
Cryptography Presentation
Cryptography For The Average Developer
Thotcon 2019 - When Strong Encryption Isn't
solutions.hamburg | web3 // smart contracts // ethereum
Id32
Public Key Cryptosystem
Quantum Computing & Cryptography: A Brief Introduction
MongoDB .local Chicago 2019: Using Client Side Encryption in MongoDB 4.2
Ad

Viewers also liked (20)

PDF
Lean Start-up Business Tactics Seminar - Who Owns Your Company?
PPTX
Cutting a cavetto mould
PPTX
Edmodo chavis
PPTX
Implementation training updated 9.27.13
PDF
Lecture11 b
PDF
23 7242
PDF
PDF
PDF
Specific campaign
PPTX
PPTX
Four Ways to Leverage Social Media in Your Marketing
PPTX
Finding Mrs Simon Storyboard
PPTX
Boosting innovation through collaborative online ideations
PDF
Lecture10
PDF
Hokkaido.pm.casual 22
PDF
положение сердце отдаю детям (1)
PPTX
2016 April Announcements
PDF
Статья журнал Фотоника - Аддитивные технологии Часть 1. - Металл
PPTX
Snecked rubble step by step angled
PPTX
Lean Start-up Business Tactics - Start-up Infrastructure on a Budget
Lean Start-up Business Tactics Seminar - Who Owns Your Company?
Cutting a cavetto mould
Edmodo chavis
Implementation training updated 9.27.13
Lecture11 b
23 7242
Specific campaign
Four Ways to Leverage Social Media in Your Marketing
Finding Mrs Simon Storyboard
Boosting innovation through collaborative online ideations
Lecture10
Hokkaido.pm.casual 22
положение сердце отдаю детям (1)
2016 April Announcements
Статья журнал Фотоника - Аддитивные технологии Часть 1. - Металл
Snecked rubble step by step angled
Lean Start-up Business Tactics - Start-up Infrastructure on a Budget
Ad

Similar to Security overview (20)

PPTX
Introduction to Cryptography
PPTX
Security
PPTX
Cryptography
PPTX
20 security
PPT
Crypt
PPT
PPT
Cryptography
PPT
Digital Signiture
PPT
1329 n 9460
PDF
CGI White Paper - Key Incryption Mechanism
PPT
6. cryptography
PPT
Java Crypto
PPT
Digital signature
PPT
Chapter 15 - Security
ODP
Network Security Topic 4 cryptography2
DOCX
Cryptography and security
PPT
Cryptography al-hamadi111
PPT
Cryptography
PPT
Network Security and Cryptography
PDF
Computer security module 3
Introduction to Cryptography
Security
Cryptography
20 security
Crypt
Cryptography
Digital Signiture
1329 n 9460
CGI White Paper - Key Incryption Mechanism
6. cryptography
Java Crypto
Digital signature
Chapter 15 - Security
Network Security Topic 4 cryptography2
Cryptography and security
Cryptography al-hamadi111
Cryptography
Network Security and Cryptography
Computer security module 3

More from vantinhkhuc (20)

PDF
Url programming
PDF
Servlets intro
PDF
Servlet sessions
PDF
PDF
Lecture17
PDF
Lecture9
PDF
Lecture6
PDF
PDF
Jsf intro
PDF
Jsp examples
PDF
PDF
Ejb examples
PDF
PDF
PDF
Ejb intro
PPT
Chc6b0c6a1ng 12
PPT
PDF
PDF
Ajas11 alok
PPT
Url programming
Servlets intro
Servlet sessions
Lecture17
Lecture9
Lecture6
Jsf intro
Jsp examples
Ejb examples
Ejb intro
Chc6b0c6a1ng 12
Ajas11 alok

Security overview

  • 1. Security Overview Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy: preventing unauthorized release of information Authentication: verifying identity of the remote participant Integrity: making sure message has not been altered Security Cryptography Security algorithms services Secret Public Message Privacy Authentication Message key key digest integrity (e.g., DES) (e.g., RSA) (e.g., MD5) Secret Key (DES) Plaintext Plaintext Encrypt with Decrypt with secret key secret key Ciphertext
  • 2. Public Key (RSA) Plaintext Plaintext Encrypt with Decrypt with public key private key Ciphertext Encryption & Decryption c = memod n m = cdmod n Message Digest Cryptographic checksum just as a regular checksum protects the receiver from accidental changes to the message, a cryptographic checksum protects the receiver from malicious changes to the message. One-way function given a cryptographic checksum for a message, it is virtually impossible to figure out what message produced that checksum; it is not computationally feasible to find two messages that hash to the same cryptographic checksum. Relevance if you are given a checksum for a message and you are able to compute exactly the same checksum for that message, then it is highly likely this message produced the checksum you were given.
  • 3. Public key authentication A B E(x , Publ ic ) B x Key Distribution Certificate special type of digitally signed document: “I certify that the public key in this document belongs to the entity named in this document, signed X.” the name of the entity being certified the public key of the entity the name of the certified authority a digital signature Certified Authority (CA) administrative entity that issues certificates useful only to someone that already holds the CA’s public key.