SlideShare une entreprise Scribd logo
1  sur  40
SECURITY ISSUES
AND
ENCRYPTION
GROUP 5
GROUP MEMBERS
• Anubha
• Mohit Manna
• Nikhil
• Preeti
• Rahul Kumar Singh
CONTENTS
• Security Issues
• SSL
• Digital Signature
• Message Authentication
• Encryption techniques
SECURITY ISSUES OF E-COMMERCE
• Confidentiality
• Integrity
• Availability
• Authenticity
• Non-Repudiability
• Encryption
• Auditability
CONFIDENTIALITY
• Keeping private or sensitive information from being disclosed to unauthorised individuals, entities or
processes.
• Information should not be accessible to an unauthorized person. It should not be intercepted during the
transmission.
INTEGRITY
• The ability to protect data from being altered or destroyed by unauthorised access or accidental manner.
• Information should not be altered during its transmission over the network.
AVAILABILITY
• Information should be available wherever and whenever required within a time limit specified.
AUTHENTICITY
• There should be a mechanism to authenticate a user before giving him/her an access to the required
information.
• To Make sure that the message senders or principles are who they say they are.
NON - REPUDIABILITY
• It is the protection against the denial of order or denial of payment.
• Once a sender sends a message, the sender should not be able to deny sending the message
• the recipient of message should not be able to deny the receipt.
AUDITABILITY
• Data should be recorded in such a way that it can be audited for integrity requirements.
SSL(SECURE SOCKET LAYER)
•SECULAR SOCKET LAYER IS A COMMUNICATION PROTOCOL IS
CREATED BY NETSCAPE IN 1994 TO ENSURE SECURE
TRANSACTIONS BETWEEN WEB SERVERS AND BROWSERS.
•"HTTPS://" IS TO BE USED FOR HTTP URLS WITH SSL,
WHEREAS "HTTP:/" IS TO BE USED FOR HTTP URLS WITHOUT
SSL .
WHAT IS SSL USED FOR?
• The SSL protocol is used by millions of online business to protect their customers, ensuring their online
transactions remain confidential.
• A web page should use encryption when it expects users to submit confidential data, including
personal information, passwords, or credit card details.
• All web browsers have the ability to interact with secured sites so long as the site's certificate is issued
by a trusted certificate authority.
WHY SSL ? SSL PROVIDES…..
• Confidentiality (Privacy)
• Data integrity (Tamper-proofing)
• Server authentication (Proving a server is what it claims it is)
• Used in typical B2C transaction
• Optional client authentication
• Would be required in B2B (or Web services environment in which program talks to program)
SSL KEY EXCHANGE
FIREWALL
• A firewall is a system of hardware and software components designed to restrict access between or
among networks, most often between the Internet and a private Internet.
• The firewall is part of an overall security policy that creates a perimeter defense designed to protect the
information resources of the organization.
HARDWARE V/S SOFTWARE FIREWALLS.
• Hardware firewalls
- Protect an entire network
- Implemented on router level
- Usually more expensive, harder to configure.
• Software firewalls
- protect a single computer
- Usually less expensive, easier to configure.
DIGITAL SIGNATURE:
• Digital signature ensures the authenticity of the information.
• A digital signature is an e-signature authenticated through encryption and
password.
ENCRYPTION :
• It is a very effective and practical way to safeguard the data being transmitted over the network.
• It is the process of converting information or data into a code, especially to prevent unauthorized
access.
• Sender of the information encrypts the data using a encryption technique and only the specified
receiver can decrypt the data using the same or a different encryption technique.
BENEFITS OF ENCRYPTION
• Confidentiality
• Authentication
• Data Integrity
• Non-repudiation
DRAWBACKS OF ENCRYPTION
• Sometimes it may be difficult to access even for a legitimate user
• High availability
• selective access control
• Does not guard threats that emerge from the poor design of systems
• Costly
• based on the computational difficulty of mathematical problems
MESSAGE AUTHENTICATION
• Threat: the user is not sure about the originator of the message
• Message Authentication Code Algorithm
LIMITATIONS OF MAC
1. Establishment of Shared Secret
2. Inability to Provide Non-Repudiation
 Limitations of MAC can be overcome by Digital signature
ENCRYPTION TECHNIQUES
MOHIT MANNA
ORIGIN
• Humans want to (1)share information and (2) selectively
• This need gives birth to art of “coding messages”
• The art and science of concealing the messages to introduce secrecy in information security is called
cryptography.
• “ Cryptography “ from GREEK .. KRYPTO (hidden) + GRAPHENE (writing)
HISTORY
• HIEROGLYPH is the oldest technique used by Egyptians 4000 years ago
• Around 500-600 BC mono-alphabetic substitution ciphers were used
• Roman method (Caesar Shift Cipher) relies on shifting of a message by an agreed number
• Steganography (slightly different)
EVOLUTION
• Started during European Renaissance
• Vigenere Coding came in 15th Century
• After 19th Century it evolved from ad hoc approach to sophisticated art and science
• In early 20th Century machines were invented e.g. Enigma Rotor machine
• During WW2 both cryptography and cryptanalysis became excessively mathematical
• With advances govts. , military units and corporate houses started adopting it
MODERN CRYPTOGRAPHY
• It is called as cornerstone of communications security.
• Based on number theory, computational-complexity and probability theory
Classic Cryptography Modern Cryptography
It manipulates traditional characters It operates on binary bit sequences
Based on ‘security through obscurity’ Relies on mathematical algorithms.
Secrecy is obtained through secret key
It requires entire cryptosystem for
communicating confidentially
Requires parties interested in secure
communication to possess the secret key
CRYPTOGRAPHY PRIMITIVES
CRYPTOSYSTEMS
TYPES OF CRYPTOSYSTEMS
1. Symmetric key Encryption
2. Asymmetric Key Encryption(Public Key Encryption)
TYPES OF CRYPTOSYSTEMS [1. SYMMETRIC KEY ]
Examples: Digital Encryption Standard(DES), Triple- DES(3DES), IDEA and TWOFISH
FIESTEL BLOCK CIPHER
• The input block to each round is divided into two halves that can
be denoted as L and R for the left half and the right half
• In each round, the right half of the block, R, goes through
unchanged. But the left half, L, goes through an operation that
depends on R and the encryption key
• each round uses a different key, although all these subkeys are
related to the original key
• The permutation step at the end of each round swaps the
modified L and unmodified R.
• Above substitution and permutation steps form a ‘round’.
The number of rounds are specified by the algorithm design
• Once the last round is completed then the two sub blocks,
‘R’ and ‘L’ are concatenated in this order to form the ciphertext
block
• difficult part of designing a Feistel Cipher is selection of round
function ‘f’
FEATURES OF SYMMETRIC KEY ENCRYPTION
• Persons using it must share a common key prior to exchange of information
• Keys are recommended to be changed regularly to prevent any attack on the system
• robust mechanism needs to exist to exchange the key between the communicating parties
• Length of Key (number of bits) in this encryption is smaller and hence, process of encryption-decryption
is faster than asymmetric key encryption
• Processing power of computer system required to run symmetric algorithm is less
CHALLENGES OF USING SYMMETRIC KEY ENCRYPTION
1. Key Establishment
2. Trust Issue
• But, today we need to communicate to non-familiar parties..
TYPES OF CRYPTOSYSTEMS [2. ASYMMETRIC KEY]
• Different keys are used for encrypting and
decrypting the information
 User have 2 dissimilar keys mathematically
related called private key and public key
 Public key –public repository
Private key –well guarded secret
 When Host1 needs to send data to Host2,
he obtains the public key of Host2 from
repository, encrypts the data, and transmits
 Host2 uses his private key to extract the plaintext.
o Length of keys is large so slower
o Processing power of computer system required to run asymmetric algorithm is higher
CHALLENGES OF PUBLIC KEY CRYPTOSYSTEM
• the user needs to trust that the public key that he is using in communications with a person really is the
public key of that person and has not been spoofed by a malicious third party
• This is usually accomplished through a Public Key Infrastructure (PKI) consisting a trusted third party
PUBLIC KEY ENCRYPTION: RSA CRYPTOSYSTEM
• Used even today
• Invented by: Ron Rivest, Adi Shamir, Len Adleman
• Two things are involved: (1) Generation of key pair (2) Encryption- Decryption modes
1. GENERATION OF RSA KEY PAIR
• The process is as follows:
1. Generate the RSA modulus(n)
• Select two large primes, p and q
• Calculate n=p*q.
2. Find Derived Number(e)
• Number e must be greater than 1 and less than (p − 1)(q − 1)
• There must be no common factor for e and (p − 1)(q − 1) except for 1
3. Form the public key
• The pair of numbers (n, e) form the RSA public key and is made public
4. Generate the Private Key
• Private Key d is calculated from p, q, and e. For given n and e, there is
unique number d
• Number d is the inverse of e modulo (p − 1)(q – 1)
• Example:
1. Generate the RSA modulus(n)
• P=7, q=13. Thus, n=p*q=7*13=91
2. Find Derived Number(e)
• Select e = 5 because , there is no number that is common factor of 5
and (p − 1)(q − 1) = 6 × 12 = 72
3. Form the public key
• The pair of numbers (n, e) = (91, 5) forms the public key
4. Generate the Private Key
• Input p = 7, q = 13, and e = 5 to the Extended Euclidean Algorithm. The
output will be d = 29
• Check: de = 29 × 5 = 145 = 1 mod 72
Each party has to generate a pair of keys i.e. public key and private key
though n is part of the public key, difficulty in factorizing a large prime number ensures that attacker cannot find in
finite time the two primes (p & q) used to obtain n
RSA ENCRYPTION
• Encryption:
• sender wish to send some text message to
someone whose public key is (n, e)
• the sender then represents the plaintext as a
series of numbers less than n
• To encrypt the first plaintext P, which is a
number modulo n.
• Decryption:
• receiver of public-key pair (n, e) has received a
ciphertext C
• Receiver raises C to the power of his private key
d. The result modulo n will be the plaintext P
• Returning again to our numerical example,
the ciphertext C = 82 would get decrypted to
number 10 using private key 29
RSA does not directly operate on strings of bits as in case of symmetric key
It operates on numbers modulo n
it is necessary to represent the plaintext as a series of numbers less than n
THANK YOU

Contenu connexe

Tendances

Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherGopal Sakarkar
 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]SISA Information Security Pvt.Ltd
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and DistributionSyed Bahadur Shah
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network securitybabak danyal
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic toolsCAS
 
Introduction to Cryptography Training – Level 1
Introduction to Cryptography Training – Level 1Introduction to Cryptography Training – Level 1
Introduction to Cryptography Training – Level 1Bryan Len
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-finalTaymoor Nazmy
 
CISSP Week 20
CISSP Week 20CISSP Week 20
CISSP Week 20jemtallon
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesMurali Krishna
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distributionRiya Choudhary
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pkiPrabhat Goel
 
Information and data security key management and distribution
Information and data security key management and distributionInformation and data security key management and distribution
Information and data security key management and distributionMazin Alwaaly
 

Tendances (20)

Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar Cipher
 
Encryption and Key Distribution Methods
Encryption and Key Distribution MethodsEncryption and Key Distribution Methods
Encryption and Key Distribution Methods
 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]
 
Cryptography
CryptographyCryptography
Cryptography
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
Network security
Network securityNetwork security
Network security
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
 
Introduction to Cryptography Training – Level 1
Introduction to Cryptography Training – Level 1Introduction to Cryptography Training – Level 1
Introduction to Cryptography Training – Level 1
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
 
key management
 key management key management
key management
 
CISSP Week 20
CISSP Week 20CISSP Week 20
CISSP Week 20
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modules
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Info security & crypto
Info security & cryptoInfo security & crypto
Info security & crypto
 
Ch14
Ch14Ch14
Ch14
 
Sw2 b12
Sw2 b12Sw2 b12
Sw2 b12
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pki
 
Information and data security key management and distribution
Information and data security key management and distributionInformation and data security key management and distribution
Information and data security key management and distribution
 

Similaire à Encryption techniques

Similaire à Encryption techniques (20)

Cyptography and network security unit 3-1
Cyptography and network security unit 3-1Cyptography and network security unit 3-1
Cyptography and network security unit 3-1
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
 
chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdf
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Security - ch3.pptx
Security - ch3.pptxSecurity - ch3.pptx
Security - ch3.pptx
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxLec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptx
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)
 
Security - ch3.pptx
Security - ch3.pptxSecurity - ch3.pptx
Security - ch3.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Slidecast - Workshop
Slidecast - WorkshopSlidecast - Workshop
Slidecast - Workshop
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Security
SecuritySecurity
Security
 
groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
 
Security fundamentals
Security fundamentalsSecurity fundamentals
Security fundamentals
 
Security Fundamentals
Security FundamentalsSecurity Fundamentals
Security Fundamentals
 

Dernier

Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Onlineanilsa9823
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.CarlotaBedoya1
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 

Dernier (20)

Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 

Encryption techniques

  • 2. GROUP MEMBERS • Anubha • Mohit Manna • Nikhil • Preeti • Rahul Kumar Singh
  • 3. CONTENTS • Security Issues • SSL • Digital Signature • Message Authentication • Encryption techniques
  • 4. SECURITY ISSUES OF E-COMMERCE • Confidentiality • Integrity • Availability • Authenticity • Non-Repudiability • Encryption • Auditability
  • 5. CONFIDENTIALITY • Keeping private or sensitive information from being disclosed to unauthorised individuals, entities or processes. • Information should not be accessible to an unauthorized person. It should not be intercepted during the transmission.
  • 6. INTEGRITY • The ability to protect data from being altered or destroyed by unauthorised access or accidental manner. • Information should not be altered during its transmission over the network.
  • 7. AVAILABILITY • Information should be available wherever and whenever required within a time limit specified.
  • 8. AUTHENTICITY • There should be a mechanism to authenticate a user before giving him/her an access to the required information. • To Make sure that the message senders or principles are who they say they are.
  • 9. NON - REPUDIABILITY • It is the protection against the denial of order or denial of payment. • Once a sender sends a message, the sender should not be able to deny sending the message • the recipient of message should not be able to deny the receipt.
  • 10. AUDITABILITY • Data should be recorded in such a way that it can be audited for integrity requirements.
  • 11. SSL(SECURE SOCKET LAYER) •SECULAR SOCKET LAYER IS A COMMUNICATION PROTOCOL IS CREATED BY NETSCAPE IN 1994 TO ENSURE SECURE TRANSACTIONS BETWEEN WEB SERVERS AND BROWSERS. •"HTTPS://" IS TO BE USED FOR HTTP URLS WITH SSL, WHEREAS "HTTP:/" IS TO BE USED FOR HTTP URLS WITHOUT SSL .
  • 12. WHAT IS SSL USED FOR? • The SSL protocol is used by millions of online business to protect their customers, ensuring their online transactions remain confidential. • A web page should use encryption when it expects users to submit confidential data, including personal information, passwords, or credit card details. • All web browsers have the ability to interact with secured sites so long as the site's certificate is issued by a trusted certificate authority.
  • 13. WHY SSL ? SSL PROVIDES….. • Confidentiality (Privacy) • Data integrity (Tamper-proofing) • Server authentication (Proving a server is what it claims it is) • Used in typical B2C transaction • Optional client authentication • Would be required in B2B (or Web services environment in which program talks to program)
  • 15. FIREWALL • A firewall is a system of hardware and software components designed to restrict access between or among networks, most often between the Internet and a private Internet. • The firewall is part of an overall security policy that creates a perimeter defense designed to protect the information resources of the organization.
  • 16. HARDWARE V/S SOFTWARE FIREWALLS. • Hardware firewalls - Protect an entire network - Implemented on router level - Usually more expensive, harder to configure. • Software firewalls - protect a single computer - Usually less expensive, easier to configure.
  • 17. DIGITAL SIGNATURE: • Digital signature ensures the authenticity of the information. • A digital signature is an e-signature authenticated through encryption and password.
  • 18. ENCRYPTION : • It is a very effective and practical way to safeguard the data being transmitted over the network. • It is the process of converting information or data into a code, especially to prevent unauthorized access. • Sender of the information encrypts the data using a encryption technique and only the specified receiver can decrypt the data using the same or a different encryption technique.
  • 19. BENEFITS OF ENCRYPTION • Confidentiality • Authentication • Data Integrity • Non-repudiation
  • 20. DRAWBACKS OF ENCRYPTION • Sometimes it may be difficult to access even for a legitimate user • High availability • selective access control • Does not guard threats that emerge from the poor design of systems • Costly • based on the computational difficulty of mathematical problems
  • 21. MESSAGE AUTHENTICATION • Threat: the user is not sure about the originator of the message • Message Authentication Code Algorithm
  • 22. LIMITATIONS OF MAC 1. Establishment of Shared Secret 2. Inability to Provide Non-Repudiation  Limitations of MAC can be overcome by Digital signature
  • 24. ORIGIN • Humans want to (1)share information and (2) selectively • This need gives birth to art of “coding messages” • The art and science of concealing the messages to introduce secrecy in information security is called cryptography. • “ Cryptography “ from GREEK .. KRYPTO (hidden) + GRAPHENE (writing)
  • 25. HISTORY • HIEROGLYPH is the oldest technique used by Egyptians 4000 years ago • Around 500-600 BC mono-alphabetic substitution ciphers were used • Roman method (Caesar Shift Cipher) relies on shifting of a message by an agreed number • Steganography (slightly different)
  • 26. EVOLUTION • Started during European Renaissance • Vigenere Coding came in 15th Century • After 19th Century it evolved from ad hoc approach to sophisticated art and science • In early 20th Century machines were invented e.g. Enigma Rotor machine • During WW2 both cryptography and cryptanalysis became excessively mathematical • With advances govts. , military units and corporate houses started adopting it
  • 27. MODERN CRYPTOGRAPHY • It is called as cornerstone of communications security. • Based on number theory, computational-complexity and probability theory Classic Cryptography Modern Cryptography It manipulates traditional characters It operates on binary bit sequences Based on ‘security through obscurity’ Relies on mathematical algorithms. Secrecy is obtained through secret key It requires entire cryptosystem for communicating confidentially Requires parties interested in secure communication to possess the secret key
  • 30. TYPES OF CRYPTOSYSTEMS 1. Symmetric key Encryption 2. Asymmetric Key Encryption(Public Key Encryption)
  • 31. TYPES OF CRYPTOSYSTEMS [1. SYMMETRIC KEY ] Examples: Digital Encryption Standard(DES), Triple- DES(3DES), IDEA and TWOFISH
  • 32. FIESTEL BLOCK CIPHER • The input block to each round is divided into two halves that can be denoted as L and R for the left half and the right half • In each round, the right half of the block, R, goes through unchanged. But the left half, L, goes through an operation that depends on R and the encryption key • each round uses a different key, although all these subkeys are related to the original key • The permutation step at the end of each round swaps the modified L and unmodified R. • Above substitution and permutation steps form a ‘round’. The number of rounds are specified by the algorithm design • Once the last round is completed then the two sub blocks, ‘R’ and ‘L’ are concatenated in this order to form the ciphertext block • difficult part of designing a Feistel Cipher is selection of round function ‘f’
  • 33. FEATURES OF SYMMETRIC KEY ENCRYPTION • Persons using it must share a common key prior to exchange of information • Keys are recommended to be changed regularly to prevent any attack on the system • robust mechanism needs to exist to exchange the key between the communicating parties • Length of Key (number of bits) in this encryption is smaller and hence, process of encryption-decryption is faster than asymmetric key encryption • Processing power of computer system required to run symmetric algorithm is less
  • 34. CHALLENGES OF USING SYMMETRIC KEY ENCRYPTION 1. Key Establishment 2. Trust Issue • But, today we need to communicate to non-familiar parties..
  • 35. TYPES OF CRYPTOSYSTEMS [2. ASYMMETRIC KEY] • Different keys are used for encrypting and decrypting the information  User have 2 dissimilar keys mathematically related called private key and public key  Public key –public repository Private key –well guarded secret  When Host1 needs to send data to Host2, he obtains the public key of Host2 from repository, encrypts the data, and transmits  Host2 uses his private key to extract the plaintext. o Length of keys is large so slower o Processing power of computer system required to run asymmetric algorithm is higher
  • 36. CHALLENGES OF PUBLIC KEY CRYPTOSYSTEM • the user needs to trust that the public key that he is using in communications with a person really is the public key of that person and has not been spoofed by a malicious third party • This is usually accomplished through a Public Key Infrastructure (PKI) consisting a trusted third party
  • 37. PUBLIC KEY ENCRYPTION: RSA CRYPTOSYSTEM • Used even today • Invented by: Ron Rivest, Adi Shamir, Len Adleman • Two things are involved: (1) Generation of key pair (2) Encryption- Decryption modes
  • 38. 1. GENERATION OF RSA KEY PAIR • The process is as follows: 1. Generate the RSA modulus(n) • Select two large primes, p and q • Calculate n=p*q. 2. Find Derived Number(e) • Number e must be greater than 1 and less than (p − 1)(q − 1) • There must be no common factor for e and (p − 1)(q − 1) except for 1 3. Form the public key • The pair of numbers (n, e) form the RSA public key and is made public 4. Generate the Private Key • Private Key d is calculated from p, q, and e. For given n and e, there is unique number d • Number d is the inverse of e modulo (p − 1)(q – 1) • Example: 1. Generate the RSA modulus(n) • P=7, q=13. Thus, n=p*q=7*13=91 2. Find Derived Number(e) • Select e = 5 because , there is no number that is common factor of 5 and (p − 1)(q − 1) = 6 × 12 = 72 3. Form the public key • The pair of numbers (n, e) = (91, 5) forms the public key 4. Generate the Private Key • Input p = 7, q = 13, and e = 5 to the Extended Euclidean Algorithm. The output will be d = 29 • Check: de = 29 × 5 = 145 = 1 mod 72 Each party has to generate a pair of keys i.e. public key and private key though n is part of the public key, difficulty in factorizing a large prime number ensures that attacker cannot find in finite time the two primes (p & q) used to obtain n
  • 39. RSA ENCRYPTION • Encryption: • sender wish to send some text message to someone whose public key is (n, e) • the sender then represents the plaintext as a series of numbers less than n • To encrypt the first plaintext P, which is a number modulo n. • Decryption: • receiver of public-key pair (n, e) has received a ciphertext C • Receiver raises C to the power of his private key d. The result modulo n will be the plaintext P • Returning again to our numerical example, the ciphertext C = 82 would get decrypted to number 10 using private key 29 RSA does not directly operate on strings of bits as in case of symmetric key It operates on numbers modulo n it is necessary to represent the plaintext as a series of numbers less than n