SlideShare a Scribd company logo
THE
WORLD OF
ENCRYPTION
ABSTRACT
THIS PRESENTATION IS JUST PROVIDING
THE BASIC CONCEPTS OF THE DIGITAL
CERTIFICATES, AND DIGITAL SIGNATURES
WITHOUT PROVIDING ANY TECHNICAL
SOLUTION OR PREFERABLE
TECHNOLOGIES.
ENCRYPTION
Encryption is the conversion of data into a form, called a CIPHER Text.
The use of encryption/decryption is as old as the art of communication.
Encryption/decryption is especially important in wireless communications.
Encryption/decryption is a good idea when carrying out any kind of sensitive transaction.
Ex: A credit-card purchase online, or the discussion of a company secret between different departments in the organization.
TYPES OF ENCRYPTION
PRIVATE KEY ENCRYPTION means that each
computer has a secret key (code) that it
can use to encrypt a packet of information
before it is sent over the network to the
other computer.
PUBLIC KEY ENCRYPTION uses a combination of a
private key and a public key.
The key is based on a hash value. This is a value that is computed from a base input number
using a hashing algorithm.
DIGITAL SIGNATURES
A DIGITAL SIGNATURE OR DIGITAL SIGNATURE
SCHEME IS A MATHEMATICAL SCHEME FOR
DEMONSTRATING THE AUTHENTICITY OF A DIGITAL
MESSAGE OR DOCUMENT.
A DIGITAL SIGNATURE CAN BE USED WITH ANY KIND
OF MESSAGE, WHETHER IT IS ENCRYPTED OR NOT,
SIMPLY SO THAT THE RECEIVER CAN BE SURE OF THE
SENDER'S IDENTITY AND THAT THE MESSAGE ARRIVED
INTACT.
CREATION OF DIGITAL SIGNATURES
a digital signature scheme typically
consists of three algorithms:
• hashing algorithm.
• signature generation algorithm
• a signature verifying algorithm that, given a message, public
key and a signature, either accepts or rejects the message's
claim to authenticity.
METHODS OF ENCRYPTION BASED ON PRIVACY
•a message may be digitally signed, but not
encrypted
•a message may be encrypted first, then
digitally signed
•a message may be digitally signed first, then
encrypted
Encryption scrambles or modifies a message or document so it cannot be read and understood, except by the intended recipient.
A key is necessary to reverse the scrambling or modification, to make the message readable.
PREREQUISITES TO CREATE A DIGITAL SIGNATURE
• Public-private digital key pair
• Certificate Authority.
• The public key certificate creates proof of the identity of the signer by using
the services of a certificate authority.
• A certificate authority uses a variety of processes to associate the particular
public key with an individual.
• The combination of public key and proof of identity result in a public key
certificate - also called a signer's certificate.
HOW IT WORKS?
DIGITAL SIGNATURE VERIFICATION
SECURE SOCKET LAYER (SSL)
SSL (Secure Sockets Layer) is a standard security
technology for establishing an encrypted link between a
server and a client—typically a web server (website)
and a browser; or a mail server and a mail client
Where Do Certificates Come In?
All browsers have the capability to interact with secured web
servers using the SSL protocol. However, the browser and the
server need what is called an SSL Certificate to be able to
establish a secure connection.
What is an SSL Certificate? How Does it Work?
SSL Certificates have a key pair: a public and a
private key. These keys work together to
establish an encrypted connection. The certificate
also contains what is called the “subject,” which is
the identity of the certificate/website owner.
How Does it Work?
• To get a certificate, you must create a Certificate Signing
Request (CSR) on your server.
• This process creates a private key and public key on your
server.
• The CSR data file that you send to the SSL Certificate issuer
(called a Certificate Authority or CA) contains the public
key.
• The CA uses the CSR data file to create a data structure to
match your private key without compromising the key itself.
The CA never sees the private key.
Certification Authority (CA)
•A trusted agent who certifies public keys for general
use (Corporation or Bank).
–User has to decide which CAs can be trusted.
•The model for key certification based on friends and
friends of friends is called “Web of Trust”.
–The public key is passing from friend to friend.
–Works well in small or high connected worlds.
–What if you receive a public key from someone you
don’t know?
(CA MODEL) TRUST MODEL
Root Certificate
CA Certificate
Browser Cert.
CA Certificate
Server Cert.
SSL Walkthrough
Client
Browser connects to website
Web Server
Step 1: Client accesses website
Client
Server responds with Certificate
and key Web Server
Step 2: Server responds with Certificate
Client Web Server
CA
Client verifies certificate
with CA
Step 3: Client verifies with CA
Client Web Server
Random
Key
Client sends a random key to server
encrypted with the public key
Step 4: Client sends random key to server
Client Web Server
Random
Key
Step 5: All communications are now encrypted with the Random key
What is the difference between Server Certificate and Client Certificate?
How can I differentiate between them?
How does IIS distinguish between Client and Server Certificates?
Can I use a Server Certificate as a Client Certificate or Vice-Versa?
References
https://www.globalsign.com/en/ssl-information-center/what-is-an-ssl-certificate/
https://www.evsslcertificate.com/ssl/description-ssl.html
http://www.techtarget.com/
http://www.symantec.com/connect/blogs/client-certificates-vs-server-certificates-what-s-difference
http://blogs.msdn.com/b/kaushal/archive/2012/02/18/client-certificates-v-s-server-certificates.aspx
http://blogs.msdn.com/b/kaushal/archive/2010/11/05/ssl-certificates.aspx

More Related Content

PPT
Digital certificate & signature
PPT
Digital Signature
PDF
Digital Signature
PPTX
PPTX
Kumkum digital certificate
PPTX
Digital signature & certificate
PDF
Digital certificates & its importance
PPTX
Digital signature
Digital certificate & signature
Digital Signature
Digital Signature
Kumkum digital certificate
Digital signature & certificate
Digital certificates & its importance
Digital signature

What's hot (20)

PPT
Digital Certificate
PPT
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
PPTX
How to design a digital signature in odoo
PPTX
Digital Signatures
PPT
Digital certificates
PPTX
Cryptography
PPTX
Digital signatures
PPT
Digital signature introduction
PPT
Digital signature
PDF
Pki and OpenSSL
PPTX
Digital Signature
PDF
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...
PPTX
kerberos
PPT
PPT
Marco Casassa Mont: Pki overview
PPTX
Digital signatures and e-Commerce
PPT
SSl and certificates
PPTX
Let's get started with passwordless authentication using windows hello in you...
PPT
Digital Signiture
Digital Certificate
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
How to design a digital signature in odoo
Digital Signatures
Digital certificates
Cryptography
Digital signatures
Digital signature introduction
Digital signature
Pki and OpenSSL
Digital Signature
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...
kerberos
Marco Casassa Mont: Pki overview
Digital signatures and e-Commerce
SSl and certificates
Let's get started with passwordless authentication using windows hello in you...
Digital Signiture
Ad

Viewers also liked (20)

PDF
Hacking Journalism: Using the Internet to Save the World
PDF
Advanced Web Hacking (EUSecWest 06)
PPTX
Cryptography.ppt
ODP
Encryption presentation final
PPTX
M tech2
PPTX
Claims Based Authentication A Beginners Guide
PDF
Understanding Claim based Authentication
PDF
Webinar Gratuito: "JavaScript para Hacking Web"
PPTX
C3 and digital citizenship
PDF
y3dips hacking priv8 network
PPTX
What The Heck Is Hacking?
PDF
Advanced growth hacking
PDF
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
PPT
Hacking web applications
PPTX
Travel Hacking 101
PPTX
Ethical Hacking
PPTX
Web Hacking Series Part 1
PPTX
Website Hacking and Preventive Measures
PDF
The power of Structured Journalism & Hacker Culture in NPR
PDF
Top Ten Web Hacking Techniques (2008)
Hacking Journalism: Using the Internet to Save the World
Advanced Web Hacking (EUSecWest 06)
Cryptography.ppt
Encryption presentation final
M tech2
Claims Based Authentication A Beginners Guide
Understanding Claim based Authentication
Webinar Gratuito: "JavaScript para Hacking Web"
C3 and digital citizenship
y3dips hacking priv8 network
What The Heck Is Hacking?
Advanced growth hacking
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
Hacking web applications
Travel Hacking 101
Ethical Hacking
Web Hacking Series Part 1
Website Hacking and Preventive Measures
The power of Structured Journalism & Hacker Culture in NPR
Top Ten Web Hacking Techniques (2008)
Ad

Similar to The world of encryption (20)

PPTX
Certificate pinning in android applications
PPTX
Secure socket layer
 
PPTX
Digital certificates in e commerce
PDF
Introduction of an SSL Certificate
PPT
Public Key Infrastructure and Application_Applications.ppt
PPTX
Impact of digital certificate in network security
PPTX
Impact of digital certificate in network security
PPT
Digital signature
DOC
Demonstration of secure socket layer(synopsis)
PPT
PKI_Applications digital certificate.ppt
PPT
Certificates and Web of Trust
PPT
PKI and Applications
PPTX
The last picks
PPTX
Chapter 2 System Security.pptx
PDF
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
PPT
Secure sockets layer, ssl presentation
PDF
Dr. Omar Ali Alibrahim - Ssl talk
PDF
presentation2-151203145018-lva1-app6891.pdf
PPTX
Ssl certificate in internet world
Certificate pinning in android applications
Secure socket layer
 
Digital certificates in e commerce
Introduction of an SSL Certificate
Public Key Infrastructure and Application_Applications.ppt
Impact of digital certificate in network security
Impact of digital certificate in network security
Digital signature
Demonstration of secure socket layer(synopsis)
PKI_Applications digital certificate.ppt
Certificates and Web of Trust
PKI and Applications
The last picks
Chapter 2 System Security.pptx
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
Secure sockets layer, ssl presentation
Dr. Omar Ali Alibrahim - Ssl talk
presentation2-151203145018-lva1-app6891.pdf
Ssl certificate in internet world

Recently uploaded (20)

PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
AI in Product Development-omnex systems
PPTX
history of c programming in notes for students .pptx
PPTX
Transform Your Business with a Software ERP System
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Nekopoi APK 2025 free lastest update
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
System and Network Administration Chapter 2
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Understanding Forklifts - TECH EHS Solution
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
How Creative Agencies Leverage Project Management Software.pdf
Wondershare Filmora 15 Crack With Activation Key [2025
AI in Product Development-omnex systems
history of c programming in notes for students .pptx
Transform Your Business with a Software ERP System
Operating system designcfffgfgggggggvggggggggg
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Nekopoi APK 2025 free lastest update
How to Choose the Right IT Partner for Your Business in Malaysia
Odoo POS Development Services by CandidRoot Solutions
System and Network Administration Chapter 2
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Softaken Excel to vCard Converter Software.pdf
Which alternative to Crystal Reports is best for small or large businesses.pdf
Understanding Forklifts - TECH EHS Solution
CHAPTER 2 - PM Management and IT Context
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
VVF-Customer-Presentation2025-Ver1.9.pptx
Navsoft: AI-Powered Business Solutions & Custom Software Development
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
How Creative Agencies Leverage Project Management Software.pdf

The world of encryption

  • 2. ABSTRACT THIS PRESENTATION IS JUST PROVIDING THE BASIC CONCEPTS OF THE DIGITAL CERTIFICATES, AND DIGITAL SIGNATURES WITHOUT PROVIDING ANY TECHNICAL SOLUTION OR PREFERABLE TECHNOLOGIES.
  • 3. ENCRYPTION Encryption is the conversion of data into a form, called a CIPHER Text. The use of encryption/decryption is as old as the art of communication. Encryption/decryption is especially important in wireless communications. Encryption/decryption is a good idea when carrying out any kind of sensitive transaction. Ex: A credit-card purchase online, or the discussion of a company secret between different departments in the organization.
  • 4. TYPES OF ENCRYPTION PRIVATE KEY ENCRYPTION means that each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to the other computer. PUBLIC KEY ENCRYPTION uses a combination of a private key and a public key. The key is based on a hash value. This is a value that is computed from a base input number using a hashing algorithm.
  • 5. DIGITAL SIGNATURES A DIGITAL SIGNATURE OR DIGITAL SIGNATURE SCHEME IS A MATHEMATICAL SCHEME FOR DEMONSTRATING THE AUTHENTICITY OF A DIGITAL MESSAGE OR DOCUMENT. A DIGITAL SIGNATURE CAN BE USED WITH ANY KIND OF MESSAGE, WHETHER IT IS ENCRYPTED OR NOT, SIMPLY SO THAT THE RECEIVER CAN BE SURE OF THE SENDER'S IDENTITY AND THAT THE MESSAGE ARRIVED INTACT.
  • 6. CREATION OF DIGITAL SIGNATURES a digital signature scheme typically consists of three algorithms: • hashing algorithm. • signature generation algorithm • a signature verifying algorithm that, given a message, public key and a signature, either accepts or rejects the message's claim to authenticity.
  • 7. METHODS OF ENCRYPTION BASED ON PRIVACY •a message may be digitally signed, but not encrypted •a message may be encrypted first, then digitally signed •a message may be digitally signed first, then encrypted Encryption scrambles or modifies a message or document so it cannot be read and understood, except by the intended recipient. A key is necessary to reverse the scrambling or modification, to make the message readable.
  • 8. PREREQUISITES TO CREATE A DIGITAL SIGNATURE • Public-private digital key pair • Certificate Authority. • The public key certificate creates proof of the identity of the signer by using the services of a certificate authority. • A certificate authority uses a variety of processes to associate the particular public key with an individual. • The combination of public key and proof of identity result in a public key certificate - also called a signer's certificate.
  • 11. SECURE SOCKET LAYER (SSL) SSL (Secure Sockets Layer) is a standard security technology for establishing an encrypted link between a server and a client—typically a web server (website) and a browser; or a mail server and a mail client
  • 12. Where Do Certificates Come In? All browsers have the capability to interact with secured web servers using the SSL protocol. However, the browser and the server need what is called an SSL Certificate to be able to establish a secure connection.
  • 13. What is an SSL Certificate? How Does it Work? SSL Certificates have a key pair: a public and a private key. These keys work together to establish an encrypted connection. The certificate also contains what is called the “subject,” which is the identity of the certificate/website owner.
  • 14. How Does it Work? • To get a certificate, you must create a Certificate Signing Request (CSR) on your server. • This process creates a private key and public key on your server. • The CSR data file that you send to the SSL Certificate issuer (called a Certificate Authority or CA) contains the public key. • The CA uses the CSR data file to create a data structure to match your private key without compromising the key itself. The CA never sees the private key.
  • 15. Certification Authority (CA) •A trusted agent who certifies public keys for general use (Corporation or Bank). –User has to decide which CAs can be trusted. •The model for key certification based on friends and friends of friends is called “Web of Trust”. –The public key is passing from friend to friend. –Works well in small or high connected worlds. –What if you receive a public key from someone you don’t know?
  • 16. (CA MODEL) TRUST MODEL Root Certificate CA Certificate Browser Cert. CA Certificate Server Cert.
  • 18. Client Browser connects to website Web Server Step 1: Client accesses website
  • 19. Client Server responds with Certificate and key Web Server Step 2: Server responds with Certificate
  • 20. Client Web Server CA Client verifies certificate with CA Step 3: Client verifies with CA
  • 21. Client Web Server Random Key Client sends a random key to server encrypted with the public key Step 4: Client sends random key to server
  • 22. Client Web Server Random Key Step 5: All communications are now encrypted with the Random key
  • 23. What is the difference between Server Certificate and Client Certificate? How can I differentiate between them? How does IIS distinguish between Client and Server Certificates? Can I use a Server Certificate as a Client Certificate or Vice-Versa?

Editor's Notes

  • #4: Symmetric Encryption Symmetric encryption is the oldest and best-known technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. This might be as simple as shifting each letter by a number of places in the alphabet. As long as both sender and recipient know the secret key, they can encrypt and decrypt all messages that use this key. Asymmetric Encryption The problem with secret keys is exchanging them over the Internet or a large network while preventing them from falling into the wrong hands. Anyone who knows the secret key can decrypt the message. One answer is asymmetric encryption, in which there are two related keys--a key pair. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it.  Any message (text, binary files, or documents) that are encrypted by using the public key can only be decrypted by applying the same algorithm, but by using the matching private key. Any message that is encrypted by using the private key can only be decrypted by using the matching public key.  This means that you do not have to worry about passing public keys over the Internet (the keys are supposed to be public). A problem with asymmetric encryption, however, is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the content of the message.
  • #5: Public Key cryptography also known as asymmetric cryptography, is a class of cryptographic algorithms which requires two separate keys, one of which is secret (or private) and one of which is public. Although different, the two parts of this key pair are mathematically linked. The public key is used to encrypt plaintext or to verify a digital signature; whereas the private key is used to decrypt ciphertext or to create a digital signature. The term "asymmetric" stems from the use of different keys to perform these opposite functions, each the inverse of the other – as contrasted with conventional ("symmetric") cryptography which relies on the same key to perform both, Public-key encryption, in which a message is encrypted with a recipient's public key. The message cannot be decrypted by anyone who does not possess the matching private key, who is thus presumed to be the owner of that key and the person associated with the public key. This is used in an attempt to ensure confidentiality.
  • #10: Digital signatures are based on public key cryptography, also known as asymmetric cryptography. Using a public key algorithm such as RSA, one can generate two keys that are mathematically linked: one private and one public. To create a digital signature, signing software (such as an email program) creates a one-way hash of the electronic data to be signed. The private key is then used to encrypt the hash. The encrypted hash -- along with other information, such as the hashing algorithm -- is the digital signature. The reason for encrypting the hash instead of the entire message or document is that a hash function can convert an arbitrary input into a fixed length value, which is usually much shorter. This saves time since hashing is much faster than signing.