Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key...
-
Upload
ami-allison -
Category
Documents
-
view
221 -
download
4
Transcript of Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key...
![Page 1: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/1.jpg)
Public Key Encryption
![Page 2: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/2.jpg)
IntroductionIntroduction
The Problem Network security
Encryption/Decryption
Public Key Encryption How is data transmitted? Secure Socket Language
Conclusion Questions and Comments
![Page 3: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/3.jpg)
The ProblemThe Problem
Trough the Internet, people can:
Buy products onlineBuy services onlineDo bank transactions online
![Page 4: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/4.jpg)
The ProblemThe Problem
Threats to network security include: Data diddling Salami attack Piggybacking Denial of Service (DoS) Distributed Denial of Service (DDoS)
![Page 5: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/5.jpg)
The ProblemThe Problem
Several network security schemes have been developed and used throughout the years
![Page 6: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/6.jpg)
Network SecurityNetwork Security
Protection alternatives include:
Use of passwordsUse of security modemsEncryption/decryption methods
![Page 7: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/7.jpg)
Network SecurityNetwork Security
The most secure protection methods are those which use
Encryption / DecryptionEncryption / Decryption
![Page 8: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/8.jpg)
Network SecurityNetwork SecurityHistory
Used since Roman Empire
Used by governments for military purposes
Nowadays it is being performed by computers
History
![Page 9: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/9.jpg)
Network SecurityNetwork SecurityWhat is encryption/decryption?
"Enryption is the translation of data into a secret code."
Encryption / Decryption
![Page 10: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/10.jpg)
Network SecurityNetwork SecurityWhat is encryption/decryption?
Transposition AlgorithmTransposition Algorithm
An exampleAn example
![Page 11: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/11.jpg)
Network SecurityNetwork Security
Key = PUBLICPUBLIC
What is encryption/decryption?
P U B L I C
5 6 1 4 3 2
![Page 12: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/12.jpg)
Network SecurityNetwork SecurityWhat is encryption/decryption?
Message to send:
Public key encryption is secure now
![Page 13: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/13.jpg)
Network SecurityNetwork SecurityWhat is encryption/decryption?
5 6 1 4 3 2
P U B L I C
K E Y E N CR Y P T I O
N I S S E C
U R E N O W
B Y P
![Page 14: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/14.jpg)
Network SecurityNetwork SecurityWhat is encryption/decryption?
The message will now be …
BYPSE CCOCF INIEF LETSF PKRNU UEYIR
Unauthorised users who do not have the key will not be able to convert it back to the original message
![Page 15: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/15.jpg)
Network SecurityNetwork SecurityWhat is encryption/decryption?
Decryption is the changing back of encrypted code (or cipher text) to plain text.
A key or password is necessary for encryption and decryption.
![Page 16: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/16.jpg)
Network SecurityNetwork SecurityWhat is encryption/decryption?
![Page 17: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/17.jpg)
Network SecurityNetwork Security
There are two main types of encryption / decryption security measures:
Public Key Encryption (Asymmetric)
Symmetric Key Encryption
What is encryption/decryption?
![Page 18: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/18.jpg)
Network SecurityNetwork SecurityPublic Key (Asymmetric) EncryptionPublic Key (Asymmetric) Encryption
Uses two keys:
Public
Private A popular implementation is the
SSL (Secure Socket Layer)
Public Key Encryption
![Page 19: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/19.jpg)
Network SecurityNetwork SecuritySymmetric Key Encryption
Uses only one key
Key must be known only by the
sender and receiver
Faster encryption/decryption
Symmetric Key
![Page 20: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/20.jpg)
Public Key EncryptionPublic Key Encryption
First invented in early 1970s by Clifford Cocks.
Reinvented by Rivest, Shamir and Adleman in 1976 and was called RSA. It was published.
In 1984 ElGamal created his algorithm. In 1989 Koblitz created his hyperelliptic curve
cryptography algorithm
History
![Page 21: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/21.jpg)
Public Key EncryptionPublic Key Encryption
Sender encrypts the message
using its private key
Sender encrypts its private key
using the receiver’s public key
How is data sent How is data sent using public key using public key
encryption?encryption?
Receiver uses its private key to
decrypt the sender’s private key
Receiver uses the sender’s private
key to decrypt the message.
How is data sent?
![Page 22: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/22.jpg)
![Page 23: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/23.jpg)
Public Key EncryptionPublic Key Encryption
Authentication is also done using digital signatures.
Digital signatures are sent to the receiving computer to make sure that the sender is who it says it is.
Digital signatures
![Page 24: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/24.jpg)
Public Key EncryptionPublic Key Encryption
Digital certificates are used.
Before communication starts the certificate authority confirms that every computer is who it says it is.
A large scale
![Page 25: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/25.jpg)
Public Key EncryptionPublic Key Encryption
Hashing algorithms are used to create keys.
A simple example:
Hashing algorithms
Input number
Hashing Algorithm
HashValue
32,569 Input # x 138 4,494,522
![Page 26: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/26.jpg)
Public Key EncryptionPublic Key Encryption
If the algorithm is not known, it is very difficult to determine the input number.
In reality more complex numbers are used, usually 40-bit or 128-bit
Hashing algorithms
![Page 27: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/27.jpg)
Public Key EncryptionPublic Key Encryption
Checks for data corruption
Two popular algorithms:ChecksumCyclic Redundancy check (CRC)
Validation and Verification of data
![Page 28: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/28.jpg)
Public Key EncryptionPublic Key Encryption
An implementation of Public key encryption
Developed by Netscape
Used extensively by Netscape and Internet explorer
Secure Socket Layer (SSL)
![Page 29: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/29.jpg)
Public Key EncryptionPublic Key Encryption
URL of an SSL-enabled website starts with https://
An example is the Go Mobile page for topping up your mobile credit
Secure Socket Layer (SSL)
![Page 30: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/30.jpg)
Public Key EncryptionPublic Key Encryption
It has become part of the transport layer in the OSI Model
Is known as the TLS (Transport Layer Security)
Secure Socket Layer (SSL)
![Page 31: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/31.jpg)
Public Key EncryptionPublic Key Encryption
Sender creates a private key
Sender sends it to the receiving computer using the receiver’s public key
What happens in an SSL?
![Page 32: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/32.jpg)
Public Key EncryptionPublic Key Encryption
Communication is then encrypted/decrypted using the private key
After communication between the two computers ends the key is discarded
What happens in an SSL?
![Page 33: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/33.jpg)
ConclusionConclusion
The most common protection alternatives used are those that use the encryption/decryption methods.
Encryption is the translation of data into a code that is not understandable without the key.
Decryption is the changing back of code from cipher text to plain text.
A key or password is necessary.
![Page 34: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/34.jpg)
ConclusionConclusion
There are two types:Public key encryptionPrivate / Symmetric key
Private key encryption uses only one key, which is private.
Public key encryption uses two keys: Public keyPrivate key
![Page 35: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/35.jpg)
ConclusionConclusion
How is data sent using public key encryption?
![Page 36: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/36.jpg)
ConclusionConclusion
Authentication is done using digital signatures Digital certificates are used in a large scale
communication Hashing algorithms are used to create keys
and passwords. Checksum and CRC are used to check for
data corruption
![Page 37: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/37.jpg)
ConclusionConclusion
SSL is an implementation of public key encryption.
Private keys are created before every communication session, and deleted afterwards
![Page 38: Public Key Encryption. Introduction The Problem Network security Encryption/Decryption Public Key Encryption How is data transmitted? Secure Socket Language.](https://reader035.fdocuments.us/reader035/viewer/2022081519/56649f155503460f94c2ab8e/html5/thumbnails/38.jpg)
Visit www.geocities.com/publickeyencryption
For notes and references for further reading