[go: up one dir, main page]

0% found this document useful (0 votes)
74 views9 pages

Safe Data Transfer: Presentation by

Public-key cryptography is used to encrypt data for safe transfer over the internet. It uses a public and private key pair, where the public key encrypts messages but only the private key can decrypt them. This allows users to securely send encrypted messages that only the recipient can read. Digital certificates containing a server's public key and signed by a certificate authority are used to authenticate servers and websites. The goals of internet safety are to encrypt data, detect interference, and identify individuals to keep data private and secure during transfer.

Uploaded by

vlad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views9 pages

Safe Data Transfer: Presentation by

Public-key cryptography is used to encrypt data for safe transfer over the internet. It uses a public and private key pair, where the public key encrypts messages but only the private key can decrypt them. This allows users to securely send encrypted messages that only the recipient can read. Digital certificates containing a server's public key and signed by a certificate authority are used to authenticate servers and websites. The goals of internet safety are to encrypt data, detect interference, and identify individuals to keep data private and secure during transfer.

Uploaded by

vlad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

SAFE DATA TRANSFER

presentation by:
Vladyslav Filiaiev,
CS-103
supervisor:
V. Dmytruk
PRESENTATION LEGEND

Goals of Internet safety

Public-key
cryptography

How does the system works

Receiving protected data


GOALS OF INTERNET SAFETY

As the user of Internet, everybody wants to


fell safe at such a big net full of unpredictable
events that may be caused by others.
So their data need to be trasfered and stored
in safety

There are 3 main goals of Internet safety:


• Encrytp data
• Detection of the
interferention
• Person identification
PUBLIC-KEY CRYPTOGRAPHY

Today`s data encryption methods rely on a


technique called public-key cryptography.

Everyone using a public-key system has a


public key and a private key.
Messages are encrypted and decrypted
with these keys.
A message encrypted with your public key
can only be decrypted by a system that
knows your private key.

This method is used by a lot of messangers


developers.
HOW DOES IT WORKS?

For the system to work, two parties engaging in a


secure transaction must know each other's public
keys. Private keys, however, are closely guarded
secrets known only to their owners.

When you want to send your friend an


encrypted message, you use friend`s public
key to turn your message into gibberish.
Only he/she can turn the gibberish back into the
original message, because only he/she know your
private key.
Public-key cryptography also works in reverse - that
is, only your public key can decipher your private
key's encryption.
When the recipient gets the message and so Then it decrypts the sender's MAC.
decrypts it, they also get an encrypted MAC. If the two are the same, then the
message hasn't been tampered with.
MAC - message-authentication code that is
produced by message-digest function.
Message-digest function is used to make
message tamper-proof (proves message
integrity) and runs by sender.
The software takes the message
and runs it through the same
message-digest function that
the sender used and creates its
own MAC.
RECEIVING PROTECTED DATA

A server authenticates itself to a client by sending


an unencrypted ASCII-based digital certificate.
A digital certificate contains information about the
company operating the server, including the
server's public key.
The digital certificate is 'signed' by a
trusted digital-certificate issuer, which
means that the issuer has
investigated the company operating
the server and believes it to be
legitimate.
CONCLUSIONS

To summarize it could be said that at this period of


technologies, public-key cryptography stays one of the
most efficient. It provides good techniques of keeping
data safe. To my mind, programmers will use this
method for a long time.
THANKS FOR YOUR ATTENTION!

You might also like