104201-DIGITALENVELOP
-
Upload
yashwanth-kumar -
Category
Documents
-
view
221 -
download
0
Transcript of 104201-DIGITALENVELOP
-
8/3/2019 104201-DIGITALENVELOP
1/16
Digital Envelope
Presented by :
Afjal Das P (104201)
Advanced Communication
Systems
M. Tech, 3rd Semester
-
8/3/2019 104201-DIGITALENVELOP
2/16
Contents
Introduction Why Digital Envelop
Formation of Digital Envelop
Reading Digital Envelop Common Algorithms used
Advantages
Applications Conclusion
Refernces
-
8/3/2019 104201-DIGITALENVELOP
3/16
Symmetric Key Cryptography
Helloeveryone
Dhfksadfhgein
Helloeveryone
Encryption Decryption
Key#1
Key#1
Plain Text Plain TextCipher Text
-
8/3/2019 104201-DIGITALENVELOP
4/16
-
8/3/2019 104201-DIGITALENVELOP
5/16
Public Key Cryptography
Knowledge of the encryptionkey doesnt giveyou knowledge of the decryptionkey
Receiver of information generates a pair ofkeys
Publish the public key in a directory
Then anyone can send him messages thatonly he can read
Strength :
High Security
Need not pass key for decryption
Weakness
Very slow process
-
8/3/2019 104201-DIGITALENVELOP
6/16
Public Key Cryptography
Helloeveryone
Dhfksadfhgein
Helloeveryone
Encryption Decryption
Key#1
Key#2
Plain Text Plain TextCipher Text
-
8/3/2019 104201-DIGITALENVELOP
7/16
Digital Envelop
Two layers of encryption to protect amessage Message encoded using symmetric key
key to decode the message is encryptedusing public- key encryption
Overcomes the problem of public keyencryption
Only the key is protected with public keyencryption
Little overhead
-
8/3/2019 104201-DIGITALENVELOP
8/16
Plain Text
message
Receivers
Public key
Hash FunctionSymmetric
Key
Encryption
Symmetric
Key
Asymmetric
Key
Encryption
Message
Digest Encrypted
Text
Encrypted
Symmetric
Key
Digital Envelope
Asymmetric Key
EncryptionEncrypted
Message Digest
Encrypted
Hash ValueCipher Text
Encrypted Symmetric
Key
Digital Envelope
-
8/3/2019 104201-DIGITALENVELOP
9/16
Receivers
Private key
Encrypted
Hash ValueCipher Text
Encrypted Symmetric
Key
Secure Data
SymmetricKey
Message
Digest Plain Text
Hash
FunctionCompar
e
DiscardYes
No
Decryption
Asymmetric Key
Decryption
Asymmetric Key
Decryption
Hash
Value
Reading Digital Envelope
-
8/3/2019 104201-DIGITALENVELOP
10/16
Common Algorithms used
Hash algorithms MD5
SHA with at least 128 bits,256 bits better
Symmetric key cryptography
AES
min. 128 bits for RC-2 & RC-5,
3DES
CAST-128
Modified RC-4
Asymmetric key cryptography
RSA
-
8/3/2019 104201-DIGITALENVELOP
11/16
Advantages
Increased performance withoutsacrificing security
Multi addressed communications
email Single copy of encrypted message
Different public keys for each user
Switch secret keys as frequently aspossible
-
8/3/2019 104201-DIGITALENVELOP
12/16
Applications
Key exchange protocols
PGP open source for email security
Oracle S-MIME (Multipurpose Internet
Mail Extension)
SSL (Secure Socket Layer)
-
8/3/2019 104201-DIGITALENVELOP
13/16
Conclusion
Using Digital envelop we can achieve High security
High performance
Little overhead
-
8/3/2019 104201-DIGITALENVELOP
14/16
References
Ramachandran Ganesan1, Mohan Gobi1andKanniappan Vivekanandan Novel Digital EnvelopeApproach for A Secure E-Commerce ChannelInternational Journal of Network Security, Vol.11, No.3,PP.121{127, Nov. 2010
Wenping Guo, Ying Chen, and Xiaoming Zhao A Studyon High-Strength Communication Scheme Based onSigned Digital Envelope Proceedings of the SecondInternational Symposium on Networking and NetworkSecurity (ISNNS 10) Jinggangshan, P. R. China, 2-4,
April. 2010, pp. 190-192 Jinggangshan, P. R. China, 2-4, April. 2010, pp. 190-
192
W. Stallings, Cryptography and Network Security:Principles and Practice, 2nd Edition, Pearson
Education, 2002.
http://www.rsa.com/rsalabs/node.asp?id=2184 -
8/3/2019 104201-DIGITALENVELOP
15/16
15
-
8/3/2019 104201-DIGITALENVELOP
16/16
16