You are on page 1of 22

CRYPTOGRAPHY

Network Security- A Need

E-mailing,
Data Business
Distributions Organizations

Stock Trading
Distance Learning
Educational Institutes
THREATS
1) Stealing out confidential content by third party.

2) Inter or Intra-organizational manipulations.

3) Masquerading threats.

4) Replay attacks.

5) Denial of services.
OBJECTIVE
 To understand the concept of cryptography and its
security services.

 To bring out solution in the form of applications to uproot


security threats.

 To understand working of various cryptography based


applications.
What is Cryptography?
Cryptography is a technology of hiding actual content in
some form which is unintelligible.

In other words,
Cryptography is a method to enlock and unlock a
document using a personal key.
Cryptography- The Back Bone
Embed confidence in people:
1) to do online banking
2) to do online trading
3) to make online purchases with their
credit cards.

How ?
With a assurance that account information or any critical
information is secured through cryptographical services.
EXAMPLE
 Suppose you have a message as:
“I HAVE SENT YOU THREE CRORES”
with a key = 3.

Assign Numerical equivalent to each letter:

A B C D E F G H I J K L M
0 1 2 3 4 5 6 7 8 9 10 11 12

N O P Q R S T U V W X Y Z
13 14 15 16 17 18 19 20 21 22 23 24 25
 Now add your key to your message
from assigned numerical values from table
Key

I => 8 + 3 = 11 => L (Converted letter)


Entire converted message would appear as:
“I HAVE SENT YOU THREE CRORES”
Encrypted Message

“L KDYH VHQW BRX WKUHH FURUHV”


Authentication

Integrity Confidentiality

SECURITY SERVICES
By
CRYPTOGRAPHY

Access Control Availability


TYPES OF KEYS
o PUBLIC KEY
o PRIVATE KEY
Difference
PRIVATE KEYS PUBLIC KEYS
1)Only one key is used for 1)Two keys are used,one for
encryption & decryption. Encryption and another is
used for decryption.
2)Private keys are shared. 2)Public key pair is only
generated, not shared.
3)Known to only 3)One is publicly exposed
communicating parties. & other is kept secret.
Model for Private key Algorithms

Encrypting DECRYPTING Recovered


Message INTERNET
Procedure PROCEDURE Message

At sender At Receiver
side side
Private Key Private Key

Shared keys by sender and receiver


Model for Public key algorithms

Encryption Decryption Recovered


Message INTERNET Message
Procedure Procedure

Receiver’s Public key Receiver’s private key

Key Pair
Source

Exposed to public
DIGITAL SIGNATURE

A stream of bits appended to a document with the


objective of providing:
 Integrity
 Authentication

Parties Involved in the transaction process.


 Signer
 Verifier
 Arbitrator
Digital Signature Applications
DIGITAL ENVELOPE
An application to seal sender’s message in such a way that
intended recipient can only open & read the message.

Components:
1) Encrypted data 2) Encrypted key

DIGITAL CERTIFICATES
An application in which a central authority signs a sender’s
message and receiver can verify it after receipt.

It contains following information:


1)User Name 2)User’s Public key 3)Signature Algorithm
APPLICATIONS
PGP (Pretty Good Privacy)
What is PGP?
PGP is an open source freely available software package
for e-mail security.

Explosive Growth and Usage


1)Available free worldwide for different platforms.
2)Make organisational’s mailing system more secure.
3)Well acclaimed with strong encrypting algorithms & key
management system.
IPSEC Security Service:

What is IPSEC ?

 Capability that can be added to Internet protocol to


enhace network security.

 Provides the capability to secure communication across


a LAN or WAN users.

 IPsec encompasses mainly on authentication,


confidentiality, and key management.
Usage of IPSec:

 Secure branch office connectivity over the Internet.

 Secure remote access over the Internet.

 Establishing extranet and intranet connectivity with


partners.

 Enhancing electronic commerce security.


Secure Electronic Transactions (SET)

What is SET ?
A open encryption and security specification designed to
protect credit card transactions on the Internet.

Key Features of SET:


 Confidentiality of Information
 Integrity of data
 Cardholder account authentication
 Merchant authentications
SET PARTICIPANTS
Steps in Online Transaction

The Merchant The customer


6)Requests payment 1)Opens an credit card
authorization. account.
7)Confirms the order. 2)Receives a certificate.

8)Provides the goods 3) Verifies merchant.


or service.
4) Places an order.
9)Requests payment.
5) Sends order & payment.
CONCLUSION
E-business dimensions are expanding day by day
Its only cryptography which can provide immunity to those
transactions which are likely to toll hundreds of billions of
dollars per year.

You might also like