EWeek 5
EWeek 5
1
Overview
• Encryption
• Digital signatures
• Digital certificates
• Fire walls
2
Encryption
What does encryption mean to you?
3
Encryption
4
Encryption
5
The Solution
6
Definition of Encryption?
7
Elements of an encryption system
8
Example
9
Types of Encryption
10
Symmetric encryption (Single key)
11
Symmetric Encryption (Single key)
12
Symmetric Encryption
13
Symmetric Encryption
14
Common Symmetric Key Algorithms
DES-(Data Encryption Standard) is a symmetric-key
encryption method, which uses a 56-bit key, and
the block cipher method, which breaks text into 64-
bit blocks and then encrypts them.
Triple DES (3DES), is a model of the DES encryption
algorithm that encrypts data three times. Three 64-
bit keys are used, instead of one, for an overall key
length of 192 bits (the first encryption is encrypted
with second key, and the resulting cipher text is
again encrypted with a third key).
15
Common Symmetric Key Algorithms
• AES (Advanced Encryption Standard) is a symmetric 128-bit
block data encryption technique that works at multiple
network layers simultaneously.
• The terms AES and Rijndael are used interchangeably,
though there are some differences between the two.
• AES has a fixed block size of 128-bits and a key size of 128,
192, or 256-bits, whereas Rijndael can be specified with any
key and block sizes in a multiple of 32-bits, with a minimum
of 128-bits and a maximum of 256-bits.
16
Common Symmetric Key Algorithms
• International Data Encryption Algorithm (IDEA)
This is an encryption system that uses a 128-bit key. It uses the block
cipher method that breaks the text into 64-bit blocks before
encrypting them.
17
Advantages of Using Symmetric
Encryption
1. The encryption process is simple
2. Each trading partner can use the same publicly known encryption
algorithm - no need to develop and exchange secret algorithms
3. Security is dependent on the length of the key.
18
Disadvantages of Symmetric
20
Asymmetric Encryption
(Public Key Encryption)
21
Asymmetric Encryption (Public Key
Encryption)
• Public-key encryption, or asymmetric encryption involves the use of
two keys, one that can be used to encrypt messages (the public key)
and one that can be used to either encrypt them or decrypt them
(the private key).
• These key pairs can be used in two different ways, to provide privacy
or authentication.
22>
Asymmetric Encryption
23
Asymmetric Encryption
24
Asymmetric Encryption
25
Difference btw Symmetric &
Asymmetric Encryption
• Single key • Two keys
• Does not support non- • Supports non-repudiation.
repudiation.
26
Digital certificates
27
Digital certificates
Before encrypting and transmitting sensitive
information it is important to ensure that the
public key being used does indeed belong to the
intended message recipient and not someone
masquerading as them.
One method of doing this is to use a trusted third
party or certificate authority (CA). Owners of public
keys submit them to a CA along with proof of
identity and the CA then digitally signs and issues a
certificate which verifies that the public key
attached to the certificate belongs to the party
stated.
28
Digital certificates
29
Digital signatures
30
Digital signatures
31
Digital signatures
32
E Commerce Technologies
Smart cards
33
Smart cards
• At first glance a smart card looks like a normal credit or debit card.
However, closer examination reveals the absence of a magnetic
stripe as smart cards store all their information on a chip buried
within the card. Compared to conventional magnetic stripe cards,
smart cards differ in several important ways:
34
1. They can store much more data
2. They can be password protected
3. They can incorporate a microprocessor that can perform
processes such as encryption
35
• The potential for smart card use is enormous, but there are three
key functions of interest to the Web store merchant:
1. Storage of encryption keys
2. Electronic purses
3. User profile portability
36
Smart card Applications
37
• Electronic purses
Many applications in place today use a smart card
as a replacement for cash because of the higher
security they offer over standard credit cards.
Although most of these systems (for example
Mondex, VisaCash, CLIP and Proton) were
developed for point of sales applications, their use
is likely to extend to Web commerce as they
provide an easy and secure way to handle cash
transactions.
38
Secure Sockets Layer (SSL)
39
• Netscape's Secure Sockets Layer (SSL) protocol is
currently the most widely used method for
performing secure transactions on the Web and is
supported by most Web servers and clients
including Netscape Navigator and Microsoft
Internet Explorer.
• The Secure Sockets Layer (SSL) protocol provides
several features that make it particularly suitable
for use in e-commerce transactions.
40
Features of SSL
41
• Authentication is provided through digital certificates. Digital
certificates provide the basis for secure electronic transactions as
they enable all participants in a transaction to quickly and easily
verify the identity of the other participants.
42
TASK
43