Professional Documents
Culture Documents
E-mailing,
Data Business
Distributions Organizations
Stock Trading
Distance Learning
Educational Institutes
THREATS
1) Stealing out confidential content by third party.
3) Masquerading threats.
4) Replay attacks.
5) Denial of services.
OBJECTIVE
To understand the concept of cryptography and its
security services.
In other words,
Cryptography is a method to enlock and unlock a
document using a personal key.
Cryptography- The Back Bone
Embed confidence in people:
1) to do online banking
2) to do online trading
3) to make online purchases with their
credit cards.
How ?
With a assurance that account information or any critical
information is secured through cryptographical services.
EXAMPLE
Suppose you have a message as:
“I HAVE SENT YOU THREE CRORES”
with a key = 3.
A B C D E F G H I J K L M
0 1 2 3 4 5 6 7 8 9 10 11 12
N O P Q R S T U V W X Y Z
13 14 15 16 17 18 19 20 21 22 23 24 25
Now add your key to your message
from assigned numerical values from table
Key
Integrity Confidentiality
SECURITY SERVICES
By
CRYPTOGRAPHY
At sender At Receiver
side side
Private Key Private Key
Key Pair
Source
Exposed to public
DIGITAL SIGNATURE
Components:
1) Encrypted data 2) Encrypted key
DIGITAL CERTIFICATES
An application in which a central authority signs a sender’s
message and receiver can verify it after receipt.
What is IPSEC ?
What is SET ?
A open encryption and security specification designed to
protect credit card transactions on the Internet.