104201-DIGITALENVELOP

download 104201-DIGITALENVELOP

of 16

Transcript of 104201-DIGITALENVELOP

  • 8/3/2019 104201-DIGITALENVELOP

    1/16

    Digital Envelope

    Presented by :

    Afjal Das P (104201)

    Advanced Communication

    Systems

    M. Tech, 3rd Semester

  • 8/3/2019 104201-DIGITALENVELOP

    2/16

    Contents

    Introduction Why Digital Envelop

    Formation of Digital Envelop

    Reading Digital Envelop Common Algorithms used

    Advantages

    Applications Conclusion

    Refernces

  • 8/3/2019 104201-DIGITALENVELOP

    3/16

    Symmetric Key Cryptography

    Helloeveryone

    Dhfksadfhgein

    Helloeveryone

    Encryption Decryption

    Key#1

    Key#1

    Plain Text Plain TextCipher Text

  • 8/3/2019 104201-DIGITALENVELOP

    4/16

  • 8/3/2019 104201-DIGITALENVELOP

    5/16

    Public Key Cryptography

    Knowledge of the encryptionkey doesnt giveyou knowledge of the decryptionkey

    Receiver of information generates a pair ofkeys

    Publish the public key in a directory

    Then anyone can send him messages thatonly he can read

    Strength :

    High Security

    Need not pass key for decryption

    Weakness

    Very slow process

  • 8/3/2019 104201-DIGITALENVELOP

    6/16

    Public Key Cryptography

    Helloeveryone

    Dhfksadfhgein

    Helloeveryone

    Encryption Decryption

    Key#1

    Key#2

    Plain Text Plain TextCipher Text

  • 8/3/2019 104201-DIGITALENVELOP

    7/16

    Digital Envelop

    Two layers of encryption to protect amessage Message encoded using symmetric key

    key to decode the message is encryptedusing public- key encryption

    Overcomes the problem of public keyencryption

    Only the key is protected with public keyencryption

    Little overhead

  • 8/3/2019 104201-DIGITALENVELOP

    8/16

    Plain Text

    message

    Receivers

    Public key

    Hash FunctionSymmetric

    Key

    Encryption

    Symmetric

    Key

    Asymmetric

    Key

    Encryption

    Message

    Digest Encrypted

    Text

    Encrypted

    Symmetric

    Key

    Digital Envelope

    Asymmetric Key

    EncryptionEncrypted

    Message Digest

    Encrypted

    Hash ValueCipher Text

    Encrypted Symmetric

    Key

    Digital Envelope

  • 8/3/2019 104201-DIGITALENVELOP

    9/16

    Receivers

    Private key

    Encrypted

    Hash ValueCipher Text

    Encrypted Symmetric

    Key

    Secure Data

    SymmetricKey

    Message

    Digest Plain Text

    Hash

    FunctionCompar

    e

    DiscardYes

    No

    Decryption

    Asymmetric Key

    Decryption

    Asymmetric Key

    Decryption

    Hash

    Value

    Reading Digital Envelope

  • 8/3/2019 104201-DIGITALENVELOP

    10/16

    Common Algorithms used

    Hash algorithms MD5

    SHA with at least 128 bits,256 bits better

    Symmetric key cryptography

    AES

    min. 128 bits for RC-2 & RC-5,

    3DES

    CAST-128

    Modified RC-4

    Asymmetric key cryptography

    RSA

  • 8/3/2019 104201-DIGITALENVELOP

    11/16

    Advantages

    Increased performance withoutsacrificing security

    Multi addressed communications

    email Single copy of encrypted message

    Different public keys for each user

    Switch secret keys as frequently aspossible

  • 8/3/2019 104201-DIGITALENVELOP

    12/16

    Applications

    Key exchange protocols

    PGP open source for email security

    Oracle S-MIME (Multipurpose Internet

    Mail Extension)

    SSL (Secure Socket Layer)

  • 8/3/2019 104201-DIGITALENVELOP

    13/16

    Conclusion

    Using Digital envelop we can achieve High security

    High performance

    Little overhead

  • 8/3/2019 104201-DIGITALENVELOP

    14/16

    References

    Ramachandran Ganesan1, Mohan Gobi1andKanniappan Vivekanandan Novel Digital EnvelopeApproach for A Secure E-Commerce ChannelInternational Journal of Network Security, Vol.11, No.3,PP.121{127, Nov. 2010

    Wenping Guo, Ying Chen, and Xiaoming Zhao A Studyon High-Strength Communication Scheme Based onSigned Digital Envelope Proceedings of the SecondInternational Symposium on Networking and NetworkSecurity (ISNNS 10) Jinggangshan, P. R. China, 2-4,

    April. 2010, pp. 190-192 Jinggangshan, P. R. China, 2-4, April. 2010, pp. 190-

    192

    W. Stallings, Cryptography and Network Security:Principles and Practice, 2nd Edition, Pearson

    Education, 2002.

    http://www.rsa.com/rsalabs/node.asp?id=2184
  • 8/3/2019 104201-DIGITALENVELOP

    15/16

    15

  • 8/3/2019 104201-DIGITALENVELOP

    16/16

    16