210 likes | 377 Views
Chapter 14 Encryption: A Matter Of Trust. OBJECTIVES. What is Encryption? Basic Cryptographic Algorithm Digital Signatures Major Attacks on Cryptosystems Digital Certificates Key Management Internet Security Protocols and Standards Government Regulations. WHAT IS ENCRYPTION?.
E N D
OBJECTIVES • What is Encryption? • Basic Cryptographic Algorithm • Digital Signatures • Major Attacks on Cryptosystems • Digital Certificates • Key Management • Internet Security Protocols and Standards • Government Regulations
WHAT IS ENCRYPTION? • Based on use of mathematical procedures to scramble data to make it extremely difficult to recover the original message • Converts the data into an encoded message using a key for decoding the message
WHAT DOES ENCRYPTION SATISFY? • Authentication • Integrity • Nonrepudiation • Privacy
BASIC CRYPTOGRAPHIC ALGORITHM • Secret Key • The sender and recipient possess the same single key • Public Key • One public key anyone can know to encrypt • One private key only the owner knows to decrypt • Provide message confidentiality • Prove authenticity of the message of originator
COMMON CRYPTOSYSTEMS • RSA Algorithm • Most commonly used but vulnerable • Data Encryption Standards (DES) • Turns a message into a mess of unintelligible characters • 3DES • RC4 • International Data Encryption Algorithm (IDEA)
DIGITAL SIGNATURES • Transform the message signed so that anyone who reads it can be sure of the real sender • A block of data representing a private key • Serve the purpose of authentication
MAJOR ATTACKS ON CRYPTOSYSTEMS • Chosen-plaintext Attack • Known-plaintext Attack • Ciphertext-only Attack • Third-party Attack
DIGITAL CERTIFICATES • An electronic document issued by a certificate authority (CA) to establish a merchant’s identity by verifying its name and public key • Includes holder’s name, name of CA, public key for cryptographic use, duration of certificate, the certificate’s class and ID
CLASSES OF CERTIFICATES • Class 1 • Contains minimum checks on user’s background • Simplest and quickest • Class 2 • Checks for information e.g. names, SSN, date of birth • Requires proof of physical address, etc.
CLASSES OF CERTIFICATES (Cont’d) • Class 3 • You need to prove exactly who you are and you are responsible • Strongest • Class 4 • Checks on things like user’s position in an organization in addition to class 3 requirements
KEY MANAGEMENT • Key Generation and Registration • Key Distribution • Key Backup / Recovery • Key Revocation and Destruction
THIRD-PARTY SERVICES • Public Key Infrastructure • Certification Authority • Registration Authority • Directory Services • Notary Services • Arbitration Services
INTERNET SECURITY PROTOCOLS & STANDARDS • Web Application • Secure Socket Layer (SSL) • Secure Hypertext Transfer Protocol (S-HTTP) • E-Commerce • Secure Electronic Transaction (SET) • E-Mail • PGP • S/MIME
SSL • Operates between application and transport layers • Most widely used standard for online data encryption • Provide services: • Server authentication • Client authentication • Encrypted SSL connection
S-HTTP • Secure Web transactions • Provides transaction confidentiality, integrity and nonrepudiation of origin • Able to integrate with HTTP applications • Mainly used for intranet communications • Does not require digital certificates / public keys
SET • One protocol used for handling funds transfer from credit card issuers to a merchant’s bank account • Provide confidentiality, authentication and integrity of payment card transmissions • Requires customers to have digital certificate and digital wallet
PGP • Encrypts the data with one-time algorithm, then encrypts the key to the algorithm using public-key cryptography • Supports public-key encryption, symmetric-key encryption and digital signatures • Supports other standards, e.g. SSL
S/MIME • Provides security for different data types and attachments to e-mails • Two key attributes: • Digital signature • Digital envelope • Performs authentication using x.509 digital certificates
GOVERNMENT REGULATIONS • National Security Agency (NSA) • National Computer Security Center (NCSC) • National Institute of Standards and Technology (NIST) • Office of Defense Trade Controls (DTC)