SlideShare a Scribd company logo
1 of 32
Key Management and Distribution
Presented by
Syed Bahadur Shah
1
PRESENTATION CONTENTS
1. Key Management
2. Key Generation
3. Type of Keys
4. Key Distribution
5. Types of Key Distribution
6. Public Key Infrastructure
7. Question & Answer Section
2
What is Key Management?
3
What is Key Management?
Key management is the set of techniques and procedures
supporting the establishment and maintenance of keying
relationships between authorized parties.
4
What is Key Generation/Establishment?
5
What is Key Generation/Establishment?
Key generation is the process of generating keys for
cryptography. The key is used to encrypt and decrypt
data whatever the data is being encrypted or
decrypted.
6
Types of Keys in Cryptography
7
Types of Keys in Cryptography
1. Symmetric Key
2. Asymmetric Key
8
Symmetric Key
Symmetric key is (also called “secret key / private key /
conventional key / single key”) use the same key for
both encryption and decryption.
9
Asymmetric Key
Asymmetric key is (also called “public key / two key”)
use different keys for encryption and decryption.
10
Symmetric Key Encryption & Decryption
11
Symmetric Key Encryption & Decryption
An algorithm in which the sender and receiver of a
message share a single, common key that is used
to encrypt and decrypt the message.
12
Asymmetric Key Encryption & Decryption
13
Asymmetric Key Encryption & Decryption
An algorithm in which the sender and receiver of a
message share different keys (public key & private
key) that is used to encrypt and decrypt the
message.
14
What is Key Distribution?
15
What is Key Distribution?
Key distribution in cryptography is a system that is responsible
for providing keys to the users in a network that shares sensitive
or private data.
16
Types of Key Distribution
17
Types of Key Distribution
 Public Key Distribution
1. Public Announcement
2. Publically Available Directory
3. Public Key Authority
4. Public Key Certificate
 Private Key Distribution
1. Simple Secret Key
2. Secret Key with Confidentiality & Authentication
18
Public Key Distribution
19
1# - Public Announcement
20
Alice Bob
2# - Publically Available Directory
21
Alice Bob
3# - Public Key Authority
22
Alice Bob
4# - Public Key Certificate
23
Alice Bob
Alice Bob
Private Key Distribution
24
1# - Simple Secret Key
25
2# - Secret Key with Confidentiality & Authentication
26
What is Public Key Infrastructure?
27
What is Public Key Infrastructure?
28
Public Key Infrastructure (PKI) is a framework that helps identify and solve these
problems for you, by establishing safe and reliable environment for electronic
transactions in the internet.
It uses public key encryption techniques to protect the confidentiality, integrity,
authenticity and non-repudiation of data.
How Public Key Infrastructure Works?
29
How Public Key Infrastructure Works?
30
AliceBob
How Public Key Infrastructure Works? (Cont:)
31
Question & Answer Section
32

More Related Content

What's hot

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 

What's hot (20)

Hash function
Hash function Hash function
Hash function
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Digital signature
Digital signatureDigital signature
Digital signature
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
Web Security
Web SecurityWeb Security
Web Security
 
DES
DESDES
DES
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
Diffie Hellman Key Exchange
Diffie Hellman Key ExchangeDiffie Hellman Key Exchange
Diffie Hellman Key Exchange
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 

Similar to Key Management and Distribution

Public Vs. Private Keys
Public Vs. Private KeysPublic Vs. Private Keys
Public Vs. Private Keys
101 Blockchains
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
Uttara University
 
key management in cryptography and network security
key management in cryptography and network securitykey management in cryptography and network security
key management in cryptography and network security
Sri Latha
 
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CanSecWest
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
eSAT Journals
 
asymmetric encryption.pptx
asymmetric encryption.pptxasymmetric encryption.pptx
asymmetric encryption.pptx
ab2478037
 

Similar to Key Management and Distribution (20)

Encryption and Key Distribution Methods
Encryption and Key Distribution MethodsEncryption and Key Distribution Methods
Encryption and Key Distribution Methods
 
Public Vs. Private Keys
Public Vs. Private KeysPublic Vs. Private Keys
Public Vs. Private Keys
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
SURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKS
SURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKSSURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKS
SURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKS
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406
 
Module 21 (cryptography)
Module 21 (cryptography)Module 21 (cryptography)
Module 21 (cryptography)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
key management in cryptography and network security
key management in cryptography and network securitykey management in cryptography and network security
key management in cryptography and network security
 
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
 
50+ Frequently Asked Cryptography Interview Questions in 2022
50+ Frequently Asked Cryptography Interview Questions in 202250+ Frequently Asked Cryptography Interview Questions in 2022
50+ Frequently Asked Cryptography Interview Questions in 2022
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
PRESENTATION ON CRYPTOGRAPHY.pptx
PRESENTATION ON  CRYPTOGRAPHY.pptxPRESENTATION ON  CRYPTOGRAPHY.pptx
PRESENTATION ON CRYPTOGRAPHY.pptx
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 
asymmetric encryption.pptx
asymmetric encryption.pptxasymmetric encryption.pptx
asymmetric encryption.pptx
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4
 
Encryption During Communication
Encryption During CommunicationEncryption During Communication
Encryption During Communication
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Key Management and Distribution

  • 1. Key Management and Distribution Presented by Syed Bahadur Shah 1
  • 2. PRESENTATION CONTENTS 1. Key Management 2. Key Generation 3. Type of Keys 4. Key Distribution 5. Types of Key Distribution 6. Public Key Infrastructure 7. Question & Answer Section 2
  • 3. What is Key Management? 3
  • 4. What is Key Management? Key management is the set of techniques and procedures supporting the establishment and maintenance of keying relationships between authorized parties. 4
  • 5. What is Key Generation/Establishment? 5
  • 6. What is Key Generation/Establishment? Key generation is the process of generating keys for cryptography. The key is used to encrypt and decrypt data whatever the data is being encrypted or decrypted. 6
  • 7. Types of Keys in Cryptography 7
  • 8. Types of Keys in Cryptography 1. Symmetric Key 2. Asymmetric Key 8
  • 9. Symmetric Key Symmetric key is (also called “secret key / private key / conventional key / single key”) use the same key for both encryption and decryption. 9
  • 10. Asymmetric Key Asymmetric key is (also called “public key / two key”) use different keys for encryption and decryption. 10
  • 11. Symmetric Key Encryption & Decryption 11
  • 12. Symmetric Key Encryption & Decryption An algorithm in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message. 12
  • 13. Asymmetric Key Encryption & Decryption 13
  • 14. Asymmetric Key Encryption & Decryption An algorithm in which the sender and receiver of a message share different keys (public key & private key) that is used to encrypt and decrypt the message. 14
  • 15. What is Key Distribution? 15
  • 16. What is Key Distribution? Key distribution in cryptography is a system that is responsible for providing keys to the users in a network that shares sensitive or private data. 16
  • 17. Types of Key Distribution 17
  • 18. Types of Key Distribution  Public Key Distribution 1. Public Announcement 2. Publically Available Directory 3. Public Key Authority 4. Public Key Certificate  Private Key Distribution 1. Simple Secret Key 2. Secret Key with Confidentiality & Authentication 18
  • 20. 1# - Public Announcement 20 Alice Bob
  • 21. 2# - Publically Available Directory 21 Alice Bob
  • 22. 3# - Public Key Authority 22 Alice Bob
  • 23. 4# - Public Key Certificate 23 Alice Bob Alice Bob
  • 25. 1# - Simple Secret Key 25
  • 26. 2# - Secret Key with Confidentiality & Authentication 26
  • 27. What is Public Key Infrastructure? 27
  • 28. What is Public Key Infrastructure? 28 Public Key Infrastructure (PKI) is a framework that helps identify and solve these problems for you, by establishing safe and reliable environment for electronic transactions in the internet. It uses public key encryption techniques to protect the confidentiality, integrity, authenticity and non-repudiation of data.
  • 29. How Public Key Infrastructure Works? 29
  • 30. How Public Key Infrastructure Works? 30 AliceBob
  • 31. How Public Key Infrastructure Works? (Cont:) 31
  • 32. Question & Answer Section 32