SlideShare a Scribd company logo
1 of 33
GROUP NO. 8
ENCRYPTION
DIGITALSIGNATURE
SSL
Learning objective
LEARNING OBJECTIVE
• To know what is Encryption and Decryption
• Their types and how it works
• To know what is Digital Signature and Digital
Signature Certificate
• Types of DS, Advantages and Disadvantages
• To know about SSL
ENCRYPTION
ENCRYPTION
DECRYPTION
Symmetric encryption
• Symmetric encryption is a type of encryption where only one key is
used to both encrypt and decrypt electronic information.
• By using symmetric encryption algorithms, data is converted to a form
that cannot be understood by any one who does not possess the secret
key to decrypt it.
• There are two types of symmetric encryption algorithms
1. Block algorithms
2. Stream algorithms
Symmetric encryption
• Due to the better performance and faster speed of symmetric encryption, symmetric
cryptography is typically used for bulk encryption / encrypting large amounts of data.
Some examples are:
1. Payment applications
2. Validation to confirm that the sender of a message is who he claims to be
3. Random number generation or hashing
• Drawbacks of symmetric encryption:
1. Key exhaustion
2. Attribution of data
3. Key management at large scale
• Maintaining large scale symmetric encryption systems is a very challenging task. This is
especially true when we want to achieve banking grade security and auditability.
ASYMMETRIC ENCRYPTION
• Asymmetric encryption encrypts and decrypts the data using two
separate yet mathematically-connected cryptographic keys
• These keys are known as a ‘public key’ and a ‘private key.’
Together, they’re called a ‘public and private key pair.’
• Let’s see how these two keys work together to create the
formidable force that is asymmetric encryption.
How does Asymmetric Encryption work?
PURPOSE OF ENCRYPTION
• Helps protect your online privacy by turning personal
information into “for your eyes only”
• You should make sure that your emails are being
sent over an encrypted connection, or that you are
encrypting each message - internet privacy concerns
are real
• Hacking is big business-many of the large-scale data
breaches that you may have heard about in the news
demonstrate that cybercriminals are often out to steal
personal information for financial gain.
• Regulations demand it :
1. The health insurance portability and accountability
act (hipaa)
2. Family education rights and privacy act (FERPA)
3. Fair credit practices act (FCPA) &other similar
laws.
DIGITAL SIGNATURE
DIGITAL SIGNATURE (DS)
 What is digital signature?
• A digital signature is a mathematically generated code
that validates the authenticity of a software, message, or
digital file. It uses encryption techniques that are secure
enough to be considered legal and binding in some
countries. It guarantees that the file has not been altered
during transmission, providing a layer of security
against cyber threats and attacks.
• When a person creates a digital signature, two
additional encrypted files are created. These are the
“private key” which stays with the signature owner, and
the “public key” which is sent along with the signed
document to let the recipient open it.
• A digital signature is like a person’s thumbprint. It is
undeniable proof of that person’s identity.
What is digital signature certificate(DSC)?
• Digital Signature Certificates (DSC)
are the digital equivalent (that is
electronic format) of physical or paper
certificates. Few Examples of physical
certificates are drivers' licenses,
passports or membership cards.
• A Digital Signature is nothing but an
authentication of any electronic
document by a subscriber to the
document. Such an authentication is
done by the way of an electronic
method or process according to
Section 3 of The Information
Technology Act, 2000.
• Types:-
• Class 1 digital signature certificate
• Class 2 digital signature certificate
• Class 3 digital signature certificate
ROLE OF A DIGITAL SIGNATURE
• In many regions, including parts of North America, the European
Union, and APAC, digital signatures are considered legally binding
and hold the same value as traditional document signatures.
• In addition to digital document signing, they are also used for financial
transactions, email service providers, and software distribution, areas
where the authenticity and integrity of digital communications are
crucial.
• Industry-standard technology called public key infrastructure ensures a
digital signature's data authenticity and integrity.
HOW DOES A DIGITAL SIGNATURE WORK?
• Digital signatures are based on Public Key infrastructure. By this mechanism,
two keys are generated, a Public Key and Private Key. The private key is kept
by the signer and it should be kept securely. When a signer digitally signs a
document, a cryptographic hash is generated for the document.
• That cryptographic hash is then encrypted using the sender's private key,
which is stored in a secure HSM box. It is then appended to the document and
sent to the recipients along with the sender's public key.
• The recipient can decrypt the encrypted hash with the sender's public key
certificate. A cryptographic hash is again generated on the recipient's end.
• Both cryptographic hashes are compared to check its authenticity. If they
match, the document hasn't been tampered with and is considered valid
ATTRIBUTES OF DIGITAL SIGNATURE
• Digital signature applies cryptographic measures to the content of a message or
document in order to show the following to the message’s recipient:
1. Authentication
2. Non-repudiation
3. Integrity
USES & APPLICATIONOF DIGITAL SIGNATURE
USES OF DIGITAL SIGNATURE:
• Same as that of a handwritten signature
• The foremost efilling, etender and
eprocurement websites where the use of
Digital signature in required for login
1. MCA
2. Income Tax
3. Sales Tax
Application of digital signature:
1. Electronic mail
2. Data storage
3. Electronic fund transfer
4. Blind signature
5. Smart cards
TYPES OF DIGITAL SIGNATURE
• Based on the technology it uses, here are 3 types of digital signatures that you
need to recognize:
1. Simple
2. Basic
3. Advanced & Qualified
ADVANTAGES OF DIGITAL SIGNATURE
• Speed
• Costs
• Security
• Authenticity
• Tracking
• Non-repudiation
• Imposter prevention
• Time-stamp
DISADVANTAGES OF DIGITAL SIGNATURE
• Expiry
• Certificates
• Law
• Compatibility
• Software
• Technology
ELECTRONIC SIGN V/S DIGITAL SIGN
• Electronic signature and digital
signature are
often used interchangeably but the
truth is that these two concepts are
different.
• The main difference between the two
is that digital signature is mainly used
to secure documents and is authorized
by certification authorities while
electronic signature is often associated
with a contract where the signer has
got the intention to do so.
Electronic sign v/s Digital sign
SECURE SOCKET
LAYER
SECURE SOCKET LAYER (SSL)
Concept –
 Security of data in transit over the internet has become
increasingly necessary.
 SSL is a protocol developed by Netscape for security of
data in transit, which covers all networks that use
TCP/IP.
 Both Netscape Navigator and Internet Explorer support
SSL and many websites use this protocol.
 It uses a program layer located between the Internet's
Hypertext Transfer Protocol (HTTP) and Transport
Control Protocol(TCP) layers.
SECURE SOCKET LAYER (SSL)
 SSL protocol is used to give data encryption
and authentication to the server.
 Browsers that use SSL protocol show a
dialog box on the screen, while Netscape
shows a blue key.
 SSL uses a cryptographic system where 2
keys are used to encrypt data.
 SSL has recently been succeeded by
Transport Layer Security (TLS) which is
based on SSL.
Example –
 SSL is used to secure communication
between a web browser and a web server.
This turns a website's address from HTTP to
HTTPS, the 'S' standing for 'secure'.
How Does SSL Works?
• A browser or server attempts to connect to a website (i.e. a web server) secured
with SSL. The browser/server requests that the web server identify itself.
• The web server sends the browser/server a copy of its SSL certificate.
• The browser/server checks to see whether or not it trusts the SSL certificate. If so,
it sends a message to the web server.
• The web server sends back a digitally signed acknowledgement to start an SSL
encrypted session.
• Encrypted data is shared between the browser/server and the web server.
Diagrammatic Representation
IMPORTANCE OF SSL
• SSL Protects Data
• SSL Affirms Your Identity
• Better Search Engine Ranking
• SSL Helps You Satisfy PCI/DSS
Requirements
IMPORTANCE OF SSL
• SSL Improves Customer Trust
• Google Makes SSL Mandatory
in 2018
• SSL Protects from Phishing and
other Attacks
WHAT ARE SSL CERTIFICATES ?
• Security Socket Layer (SSL) Certificates are small data files that
digitally bind a cryptographic key to an organization’s details.
• SSL certificates are what enable websites to move from HTTP to
HTTPS, which is more secure.
• Typically, SSL is used to secure credit card transactions, data transfer
and logins, and more recently is becoming the norm when securing
browsing of social media sites.
• SSL Certificates bind together:
1. A domain name, server name or hostname.
2. An organizational identity (i.e. company name) and location
TYPES OF SSL CERTIFICATES
There are three types of SSL certificates:
1. Single Domain SSL Certificates – A single-domain SSL certificate applies to
one domain and one domain only. It cannot be used to authenticate any other
domain, not even subdomains of the domain it is issued for.
2. Wildcard SSL Certificates- Wildcard SSL certificates are for a single domain
and all its subdomains. A subdomain is under the umbrella of the main domain.
Usually subdomains will have an address that begins with something other than
'www.’
3. Multi-Domain SSL Certificates (MDC) - A multi-domain SSL certificate, or
MDC, lists multiple distinct domains on one certificate. With an MDC, domains
that are not subdomains of each other can share a certificate.
REFERENCES
• https://cheapsslsecurity.com/blog/what-is-asymmetric-encryption-understand-
with-simple-examples/
• https://digisign.id/eng-3jenisdigi.html
• https://www.globalsign.com/en-in/ssl-information-center/what-is-an-ssl-certificate
• https://www.cryptomathic.com/news-events/blog/symmetric-key-encryption-why-
where-and-how-its-used-in-banking
• https://sslrenewals.com/blog/why-is-ssl-important-benefits-of-using-ssl-certificate
• https://blog.signaturit.com/en/what-is-a-digital-signature#4

More Related Content

What's hot

Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature pptRavi Ranjan
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesIshwar Dayal
 
Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief IntroductionGanesh Kothe
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signaturesVaibhav Khanna
 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateAboutSSL
 
Digital signature
Digital signatureDigital signature
Digital signaturePraseela R
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commercemahesh tawade
 
Digital certificates
Digital certificatesDigital certificates
Digital certificatesSimmi Kamra
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2Ankita Dave
 

What's hot (20)

Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief Introduction
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital Certificate
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commerce
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2
 

Similar to Cryptography

Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Mumbai Academisc
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL CertificateCheapSSLUSA
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applicationsArash Ramez
 
Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a ServicePT Datacomm Diangraha
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYDEEPAK948083
 
Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Nicholas Davis
 
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...Nicholas Davis
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems Maganathin Veeraragaloo
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importancesvm
 
Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systemsAbdulaziz Mohd
 

Similar to Cryptography (20)

Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL Certificate
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 
PKI & SSL
PKI & SSLPKI & SSL
PKI & SSL
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
 
Security and trust in e payment
Security and trust in e  paymentSecurity and trust in e  payment
Security and trust in e payment
 
Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a Service
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
IS-Crypttools.pptx
IS-Crypttools.pptxIS-Crypttools.pptx
IS-Crypttools.pptx
 
Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...
 
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Symantec SSL Explained
Symantec SSL ExplainedSymantec SSL Explained
Symantec SSL Explained
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systems
 

Recently uploaded

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 

Recently uploaded (20)

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 

Cryptography

  • 3. LEARNING OBJECTIVE • To know what is Encryption and Decryption • Their types and how it works • To know what is Digital Signature and Digital Signature Certificate • Types of DS, Advantages and Disadvantages • To know about SSL
  • 7. Symmetric encryption • Symmetric encryption is a type of encryption where only one key is used to both encrypt and decrypt electronic information. • By using symmetric encryption algorithms, data is converted to a form that cannot be understood by any one who does not possess the secret key to decrypt it. • There are two types of symmetric encryption algorithms 1. Block algorithms 2. Stream algorithms
  • 8. Symmetric encryption • Due to the better performance and faster speed of symmetric encryption, symmetric cryptography is typically used for bulk encryption / encrypting large amounts of data. Some examples are: 1. Payment applications 2. Validation to confirm that the sender of a message is who he claims to be 3. Random number generation or hashing • Drawbacks of symmetric encryption: 1. Key exhaustion 2. Attribution of data 3. Key management at large scale • Maintaining large scale symmetric encryption systems is a very challenging task. This is especially true when we want to achieve banking grade security and auditability.
  • 9. ASYMMETRIC ENCRYPTION • Asymmetric encryption encrypts and decrypts the data using two separate yet mathematically-connected cryptographic keys • These keys are known as a ‘public key’ and a ‘private key.’ Together, they’re called a ‘public and private key pair.’ • Let’s see how these two keys work together to create the formidable force that is asymmetric encryption.
  • 10. How does Asymmetric Encryption work?
  • 11. PURPOSE OF ENCRYPTION • Helps protect your online privacy by turning personal information into “for your eyes only” • You should make sure that your emails are being sent over an encrypted connection, or that you are encrypting each message - internet privacy concerns are real • Hacking is big business-many of the large-scale data breaches that you may have heard about in the news demonstrate that cybercriminals are often out to steal personal information for financial gain. • Regulations demand it : 1. The health insurance portability and accountability act (hipaa) 2. Family education rights and privacy act (FERPA) 3. Fair credit practices act (FCPA) &other similar laws.
  • 13. DIGITAL SIGNATURE (DS)  What is digital signature? • A digital signature is a mathematically generated code that validates the authenticity of a software, message, or digital file. It uses encryption techniques that are secure enough to be considered legal and binding in some countries. It guarantees that the file has not been altered during transmission, providing a layer of security against cyber threats and attacks. • When a person creates a digital signature, two additional encrypted files are created. These are the “private key” which stays with the signature owner, and the “public key” which is sent along with the signed document to let the recipient open it. • A digital signature is like a person’s thumbprint. It is undeniable proof of that person’s identity.
  • 14. What is digital signature certificate(DSC)? • Digital Signature Certificates (DSC) are the digital equivalent (that is electronic format) of physical or paper certificates. Few Examples of physical certificates are drivers' licenses, passports or membership cards. • A Digital Signature is nothing but an authentication of any electronic document by a subscriber to the document. Such an authentication is done by the way of an electronic method or process according to Section 3 of The Information Technology Act, 2000. • Types:- • Class 1 digital signature certificate • Class 2 digital signature certificate • Class 3 digital signature certificate
  • 15. ROLE OF A DIGITAL SIGNATURE • In many regions, including parts of North America, the European Union, and APAC, digital signatures are considered legally binding and hold the same value as traditional document signatures. • In addition to digital document signing, they are also used for financial transactions, email service providers, and software distribution, areas where the authenticity and integrity of digital communications are crucial. • Industry-standard technology called public key infrastructure ensures a digital signature's data authenticity and integrity.
  • 16. HOW DOES A DIGITAL SIGNATURE WORK? • Digital signatures are based on Public Key infrastructure. By this mechanism, two keys are generated, a Public Key and Private Key. The private key is kept by the signer and it should be kept securely. When a signer digitally signs a document, a cryptographic hash is generated for the document. • That cryptographic hash is then encrypted using the sender's private key, which is stored in a secure HSM box. It is then appended to the document and sent to the recipients along with the sender's public key. • The recipient can decrypt the encrypted hash with the sender's public key certificate. A cryptographic hash is again generated on the recipient's end. • Both cryptographic hashes are compared to check its authenticity. If they match, the document hasn't been tampered with and is considered valid
  • 17. ATTRIBUTES OF DIGITAL SIGNATURE • Digital signature applies cryptographic measures to the content of a message or document in order to show the following to the message’s recipient: 1. Authentication 2. Non-repudiation 3. Integrity
  • 18. USES & APPLICATIONOF DIGITAL SIGNATURE USES OF DIGITAL SIGNATURE: • Same as that of a handwritten signature • The foremost efilling, etender and eprocurement websites where the use of Digital signature in required for login 1. MCA 2. Income Tax 3. Sales Tax Application of digital signature: 1. Electronic mail 2. Data storage 3. Electronic fund transfer 4. Blind signature 5. Smart cards
  • 19. TYPES OF DIGITAL SIGNATURE • Based on the technology it uses, here are 3 types of digital signatures that you need to recognize: 1. Simple 2. Basic 3. Advanced & Qualified
  • 20. ADVANTAGES OF DIGITAL SIGNATURE • Speed • Costs • Security • Authenticity • Tracking • Non-repudiation • Imposter prevention • Time-stamp
  • 21. DISADVANTAGES OF DIGITAL SIGNATURE • Expiry • Certificates • Law • Compatibility • Software • Technology
  • 22. ELECTRONIC SIGN V/S DIGITAL SIGN • Electronic signature and digital signature are often used interchangeably but the truth is that these two concepts are different. • The main difference between the two is that digital signature is mainly used to secure documents and is authorized by certification authorities while electronic signature is often associated with a contract where the signer has got the intention to do so.
  • 23. Electronic sign v/s Digital sign
  • 25. SECURE SOCKET LAYER (SSL) Concept –  Security of data in transit over the internet has become increasingly necessary.  SSL is a protocol developed by Netscape for security of data in transit, which covers all networks that use TCP/IP.  Both Netscape Navigator and Internet Explorer support SSL and many websites use this protocol.  It uses a program layer located between the Internet's Hypertext Transfer Protocol (HTTP) and Transport Control Protocol(TCP) layers.
  • 26. SECURE SOCKET LAYER (SSL)  SSL protocol is used to give data encryption and authentication to the server.  Browsers that use SSL protocol show a dialog box on the screen, while Netscape shows a blue key.  SSL uses a cryptographic system where 2 keys are used to encrypt data.  SSL has recently been succeeded by Transport Layer Security (TLS) which is based on SSL. Example –  SSL is used to secure communication between a web browser and a web server. This turns a website's address from HTTP to HTTPS, the 'S' standing for 'secure'.
  • 27. How Does SSL Works? • A browser or server attempts to connect to a website (i.e. a web server) secured with SSL. The browser/server requests that the web server identify itself. • The web server sends the browser/server a copy of its SSL certificate. • The browser/server checks to see whether or not it trusts the SSL certificate. If so, it sends a message to the web server. • The web server sends back a digitally signed acknowledgement to start an SSL encrypted session. • Encrypted data is shared between the browser/server and the web server.
  • 29. IMPORTANCE OF SSL • SSL Protects Data • SSL Affirms Your Identity • Better Search Engine Ranking • SSL Helps You Satisfy PCI/DSS Requirements
  • 30. IMPORTANCE OF SSL • SSL Improves Customer Trust • Google Makes SSL Mandatory in 2018 • SSL Protects from Phishing and other Attacks
  • 31. WHAT ARE SSL CERTIFICATES ? • Security Socket Layer (SSL) Certificates are small data files that digitally bind a cryptographic key to an organization’s details. • SSL certificates are what enable websites to move from HTTP to HTTPS, which is more secure. • Typically, SSL is used to secure credit card transactions, data transfer and logins, and more recently is becoming the norm when securing browsing of social media sites. • SSL Certificates bind together: 1. A domain name, server name or hostname. 2. An organizational identity (i.e. company name) and location
  • 32. TYPES OF SSL CERTIFICATES There are three types of SSL certificates: 1. Single Domain SSL Certificates – A single-domain SSL certificate applies to one domain and one domain only. It cannot be used to authenticate any other domain, not even subdomains of the domain it is issued for. 2. Wildcard SSL Certificates- Wildcard SSL certificates are for a single domain and all its subdomains. A subdomain is under the umbrella of the main domain. Usually subdomains will have an address that begins with something other than 'www.’ 3. Multi-Domain SSL Certificates (MDC) - A multi-domain SSL certificate, or MDC, lists multiple distinct domains on one certificate. With an MDC, domains that are not subdomains of each other can share a certificate.
  • 33. REFERENCES • https://cheapsslsecurity.com/blog/what-is-asymmetric-encryption-understand- with-simple-examples/ • https://digisign.id/eng-3jenisdigi.html • https://www.globalsign.com/en-in/ssl-information-center/what-is-an-ssl-certificate • https://www.cryptomathic.com/news-events/blog/symmetric-key-encryption-why- where-and-how-its-used-in-banking • https://sslrenewals.com/blog/why-is-ssl-important-benefits-of-using-ssl-certificate • https://blog.signaturit.com/en/what-is-a-digital-signature#4