SlideShare a Scribd company logo
Cryptography & E-Commerce Keeping your Secrets secret! © University of Glamorgan    SLIDE “ Some simple yet secure cipher, easily acquired and easily read, should be introduced by which messages might to all intents and purposes be ‘sealed’ to any person but the recipient” Quarterly Review 1853,  [The Victorian Internet, Tom Standage]
Cryptography & E-Commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    SLIDE    WEB
Why use Cryptography? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    SLIDE [Chan et al]
Cryptography in e-commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    SLIDE    WEB
Cryptography in e-commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    SLIDE    WEB
History of Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan *US DOD  orange book standard    SLIDE    WEB
[object Object],[object Object],[object Object],Cryptographic basics  © University of Glamorgan    SLIDE    WEB
Basic Encryption Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    SLIDE    WEB
The Caesar Substitution Cipher © University of Glamorgan The  Caesar cipher  is named after Julius Caesar, said to be the first to use it. In the Caesar cipher each character is substituted by another. This technique is called a monoalphabetic cipher. Plaintext: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Ciphertext:   O P Q R S T U V W X Y Z A B C D E F G H I J K L M N Thus using a Caesar cipher, the message “Mission Impossible” would be encoded as  “ AWGGWN WADCGGWPZS” So what do the following ciphertexts mean ? 1) sbwuao 2)   gpkioc 3) kohqv cih tcf pfihig    SLIDE    WEB
A Simple Transposition Cipher ,[object Object],[object Object],© University of Glamorgan    SLIDE    WEB you live you learn   yo ul iv ey ou le ar n Encryption System  yuieolanolvyuer
Types of Ciphers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    SLIDE    WEB
Asymmetric and Symmetric encryption ,[object Object],[object Object],© University of Glamorgan One form of symmetric algorithm which can be mathematically proved to be unbreakable is the  one time pad  this uses a secret key once, which is then thrown away. This is expensive and difficult to manage, due to the number of keys used.     SLIDE    WEB
[object Object],[object Object],One time Pad © University of Glamorgan    SLIDE    WEB A  B  C Plaintext 01000011  01000001  01000010 key 11010001  01111001  00101011 ciphertext 10010010  00111000  01101001 One time pads are unbreakable – However if we use a limited length key the cipher could be broken by brute force.  33 bit key - 8 billion possibilities - 1 day on  PC. 56 bit key - 3 thousand trillion possibilities - supercomputer is required. Truly random key same length as message
Symmetric Algorithms (1) ,[object Object],[object Object],[object Object],© University of Glamorgan    SLIDE    WEB
Symmetric Algorithms (2)  ,[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    SLIDE    WEB
Asymmetric Encryption Systems (1) ,[object Object],© University of Glamorgan Plaintext Ciphertext If Key 1 was used last, then use Key2 If Key 2 was used last, then use Key1 A simple example of a one way function this will encrypt the message in a way which cannot be reversed. A pair of keys can generated using prime numbers and the modulus operator.    SLIDE    WEB If Key 1 was used last, then use Key2 If Key 2 was used last, then use Key1 Plaintext A Ciphertext P ,[object Object],[object Object],[object Object]
Public & Private Key Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    SLIDE    WEB
Encryption and E-commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan
Security Requirements and Key Length ,[object Object],[object Object],[object Object],© University of Glamorgan ,[object Object],[object Object],   SLIDE    WEB Type of Traffic Lifetime Min key length Product announcements, interest rates days/weeks 64 bits Long-term business plans years 80 bits Trade secrets decades 112 bits Identification of spies > 50 years 128 bits Security Requirements for Different Information
Cryptography and e-commerce Examples © University of Glamorgan    WEB    SLIDE
Digital Signatures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    WEB    SLIDE 011110100101101
Symmetric Key Digital Signatures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    WEB    SLIDE
Symmetric Key Digital Signatures © University of Glamorgan S  sends sealed  M  to Arbiter SENDER K S M ARBITER Arbiter retrieves  plaintext  M  from  S M K S M K R S M Arbiter seals [ Message received from  Sender  E ( M , K S ), Identify of Sender  S ,  and copy of plaintext  M  ] and sends all to  R RECIPIENT    WEB    SLIDE 1 2 3
Asymmetric Key Digital Signatures ,[object Object],[object Object],[object Object],[object Object],© University of Glamorgan A PRI M Encrypts message with B PUB  and  A PRI   and then send the message SENDER M Decrypts message with  B PRI  and  A PUB   in order to derive  M . RECIPIENT B PUB    WEB    SLIDE 1 2
Digital Signatures and Timestamps ,[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan A PRI M Encrypts message with B PUB  and  A PRI   and then send the message SENDER M Decrypts message with  B PRI  and  A PUB   in order to derive  M . RECIPIENT B PUB    WEB    SLIDE 1 2
Public Keys and Digital Signatures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    WEB    SLIDE
The Electronic Communications Act 2000 ,[object Object],[object Object],[object Object],[object Object],© University of Glamorgan
The International Context ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan
Contract Signing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    WEB    SLIDE
Blind Signatures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan Original Message Envelope containing  Message and Carbon paper Envelope containing  Message and Carbon paper Original Message Blinding Process Sent to Signer Remove  Envelope  Signature Signature    WEB    SLIDE
Blind Signatures & Ecash Coins ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    WEB    SLIDE
Some Legal Stuff.. RIPA (2000) ,[object Object],[object Object],[object Object],© University of Glamorgan    WEB    SLIDE
Summary of terms © University of Glamorgan    SLIDE    WEB ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Certificates  (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan Name:  Iain Sutherland Position:  Lecturer Public Key: 71F1890ACDE45….. Name:  University of Glam Position:  Employer Public Key: 7897636361FA….. Chain of Certificates Encrypted under University of Glamorgan’s Private Key Certificate for Iain Sutherland Encrypted under HEFC’s Private Key “ Islands of Trust”    WEB    SLIDE
Certificates  (2) © University of Glamorgan
Certificates  (3) © University of Glamorgan
Certificates  (4) © University of Glamorgan
An example of Cryptography: SET ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    SLIDE    WEB
SET Transaction ,[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan 1. Request Transaction 2. Acknowledgement request 3. Purchase order 4. Purchase order verification  5. Customer Payment data 6. Verify customer data 7. Status Query 8. Purchase Status information  9. Request payment 10. Verify payment  [Redrawn from Ghosh p132]  An  overview of the purchase / payment process used by SET (Secure Electronic Transactions) Consumer Bank Vendor
B2C: SET protocol ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    OHP    Handout Customer message to Merchant Customer message to Bank M2 Message Digest M1 Message Digest M3 Message Digest  Encrypted with Bank Key Only the bank can read it  Encrypted with Merchant Key Only the merchant can read it M3=Digest(M1+M2) Dual Customer Signature Encrypted with Private Key

More Related Content

What's hot

Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
Anil Neupane
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
Data encryption
Data encryptionData encryption
Data encryption
Deepam Goyal
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesIshwar Dayal
 
Digital certificates
Digital certificatesDigital certificates
Digital certificatesSimmi Kamra
 
Cryptography ppt
Cryptography pptCryptography ppt
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
jolly9293
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Mohamed Talaat
 
Security in e commerce
Security in e commerceSecurity in e commerce
Security in e commerce
akhand Akhandenator
 
Cryptography
CryptographyCryptography
Cryptography
EmaSushan
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & EncryptionBiroja
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
Subhash Gupta
 
Email security
Email securityEmail security
Email security
Indrajit Sreemany
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
Naveen Jakhar, I.T.S
 
S/MIME
S/MIMES/MIME
S/MIME
maria azam
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 

What's hot (20)

Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
cryptography
cryptographycryptography
cryptography
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Data encryption
Data encryptionData encryption
Data encryption
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Security in e commerce
Security in e commerceSecurity in e commerce
Security in e commerce
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
 
Email security
Email securityEmail security
Email security
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 
S/MIME
S/MIMES/MIME
S/MIME
 
Network security
Network securityNetwork security
Network security
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 

Viewers also liked

NEURAL Network Design Training
NEURAL Network Design  TrainingNEURAL Network Design  Training
NEURAL Network Design TrainingESCOM
 
Sublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir SabharwalSublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir Sabharwal
Sukhvir Sabharwal
 
Virtual manufacturing
Virtual manufacturingVirtual manufacturing
Virtual manufacturing
Anurag Chaudhary
 
How does rotary heat machine work on fabric
How does rotary heat machine work on fabricHow does rotary heat machine work on fabric
How does rotary heat machine work on fabric
Fei Yue Paper Industrial Co.,Ltd.
 
Cryptography
CryptographyCryptography
Cryptography
gueste4c97e
 
Analysis and applications of artificial neural networks
Analysis and applications of artificial neural networksAnalysis and applications of artificial neural networks
Analysis and applications of artificial neural networks
Snehil Rastogi
 
Lessons from Software for Synthetic Biology
Lessons from Software for Synthetic BiologyLessons from Software for Synthetic Biology
Lessons from Software for Synthetic Biology
Tim O'Reilly
 
Smartplug ppt
Smartplug pptSmartplug ppt
Smartplug ppt
Agniv Mukherjee
 
artificial neural network
artificial neural networkartificial neural network
artificial neural network
Pallavi Yadav
 
Micromachining Technology Seminar Presentation
Micromachining Technology Seminar PresentationMicromachining Technology Seminar Presentation
Micromachining Technology Seminar Presentation
Orange Slides
 
Laser Assisted Micro Machining (lamm)
Laser Assisted Micro Machining (lamm)Laser Assisted Micro Machining (lamm)
Laser Assisted Micro Machining (lamm)
Pratik Gandhi
 
IBA Admission - Mystery Revealed (Infographics)
IBA Admission - Mystery Revealed (Infographics)IBA Admission - Mystery Revealed (Infographics)
IBA Admission - Mystery Revealed (Infographics)
Ayman Sadiq
 
Artificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKSArtificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKS
REHMAT ULLAH
 
Introduction Of Artificial neural network
Introduction Of Artificial neural networkIntroduction Of Artificial neural network
Introduction Of Artificial neural network
Nagarajan
 
neural network
neural networkneural network
neural network
STUDENT
 
Cryptography
CryptographyCryptography
Cryptography
Darshini Parikh
 
Artificial neural networks
Artificial neural networksArtificial neural networks
Artificial neural networksstellajoseph
 
Neural network & its applications
Neural network & its applications Neural network & its applications
Neural network & its applications
Ahmed_hashmi
 

Viewers also liked (19)

NEURAL Network Design Training
NEURAL Network Design  TrainingNEURAL Network Design  Training
NEURAL Network Design Training
 
Sublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir SabharwalSublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir Sabharwal
 
Virtual manufacturing
Virtual manufacturingVirtual manufacturing
Virtual manufacturing
 
How does rotary heat machine work on fabric
How does rotary heat machine work on fabricHow does rotary heat machine work on fabric
How does rotary heat machine work on fabric
 
Cryptography
CryptographyCryptography
Cryptography
 
Analysis and applications of artificial neural networks
Analysis and applications of artificial neural networksAnalysis and applications of artificial neural networks
Analysis and applications of artificial neural networks
 
Lessons from Software for Synthetic Biology
Lessons from Software for Synthetic BiologyLessons from Software for Synthetic Biology
Lessons from Software for Synthetic Biology
 
Thesis presentation
Thesis presentationThesis presentation
Thesis presentation
 
Smartplug ppt
Smartplug pptSmartplug ppt
Smartplug ppt
 
artificial neural network
artificial neural networkartificial neural network
artificial neural network
 
Micromachining Technology Seminar Presentation
Micromachining Technology Seminar PresentationMicromachining Technology Seminar Presentation
Micromachining Technology Seminar Presentation
 
Laser Assisted Micro Machining (lamm)
Laser Assisted Micro Machining (lamm)Laser Assisted Micro Machining (lamm)
Laser Assisted Micro Machining (lamm)
 
IBA Admission - Mystery Revealed (Infographics)
IBA Admission - Mystery Revealed (Infographics)IBA Admission - Mystery Revealed (Infographics)
IBA Admission - Mystery Revealed (Infographics)
 
Artificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKSArtificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKS
 
Introduction Of Artificial neural network
Introduction Of Artificial neural networkIntroduction Of Artificial neural network
Introduction Of Artificial neural network
 
neural network
neural networkneural network
neural network
 
Cryptography
CryptographyCryptography
Cryptography
 
Artificial neural networks
Artificial neural networksArtificial neural networks
Artificial neural networks
 
Neural network & its applications
Neural network & its applications Neural network & its applications
Neural network & its applications
 

Similar to Cryptography and E-Commerce

Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
Sumit Satam
 
MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)Neelabja Manna
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
ppd1961
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
Techglyphs
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
Saif Kassim
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
tahirilyas92
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
Mona Rajput
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
Pavithra renu
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Gayathridevi120
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
editor1knowledgecuddle
 
Unit 1 QB.docx
Unit 1 QB.docxUnit 1 QB.docx
Unit 1 QB.docx
karthikaparthasarath
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
ijtsrd
 
Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxLecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptx
mustafaenayat
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
Aditya Raina
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
Durlove Kumbhakar
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
PayalChopra9
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptx
magoigamtatiro1
 
Cryptography
CryptographyCryptography
Cryptography
Vicky Kamboj
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
mariuse18nolet
 

Similar to Cryptography and E-Commerce (20)

Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Otp
OtpOtp
Otp
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
Unit 1 QB.docx
Unit 1 QB.docxUnit 1 QB.docx
Unit 1 QB.docx
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxLecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptx
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
 

More from Hiep Luong

Youth in Community at Youth for Cause Dialogue Session 10 June 2011
Youth in Community  at Youth for Cause Dialogue Session 10 June 2011Youth in Community  at Youth for Cause Dialogue Session 10 June 2011
Youth in Community at Youth for Cause Dialogue Session 10 June 2011Hiep Luong
 
Lin at youth for cause dialogue session 10 june 2011
Lin at youth for cause dialogue session 10 june 2011Lin at youth for cause dialogue session 10 june 2011
Lin at youth for cause dialogue session 10 june 2011Hiep Luong
 
Gop Sang at Youth for Cause Dialogue Session 10 June 2011
Gop Sang at Youth for Cause Dialogue Session 10 June 2011Gop Sang at Youth for Cause Dialogue Session 10 June 2011
Gop Sang at Youth for Cause Dialogue Session 10 June 2011Hiep Luong
 
Gop sang at youth for cause dialogue session 10 june 2011
Gop sang  at youth for cause dialogue session 10 june 2011Gop sang  at youth for cause dialogue session 10 june 2011
Gop sang at youth for cause dialogue session 10 june 2011Hiep Luong
 
Eco profile at youth for cause dialogue session 10 june 2011
Eco profile at youth for cause dialogue session 10 june 2011Eco profile at youth for cause dialogue session 10 june 2011
Eco profile at youth for cause dialogue session 10 june 2011Hiep Luong
 
Be a guardian evg at youth for cause dialogue session 10 june 2011
Be a guardian   evg at youth for cause dialogue session 10 june 2011Be a guardian   evg at youth for cause dialogue session 10 june 2011
Be a guardian evg at youth for cause dialogue session 10 june 2011Hiep Luong
 
Touch group at youth for cause dialogue session 10 june 2011
Touch group at youth for cause dialogue session 10 june 2011Touch group at youth for cause dialogue session 10 june 2011
Touch group at youth for cause dialogue session 10 june 2011Hiep Luong
 
Structured teaching
Structured teachingStructured teaching
Structured teachingHiep Luong
 
S211 conference pr presentation jg master
S211 conference pr presentation jg masterS211 conference pr presentation jg master
S211 conference pr presentation jg masterHiep Luong
 
Presentation Layer
Presentation LayerPresentation Layer
Presentation LayerHiep Luong
 
Defining business process and workflows
Defining business process and workflowsDefining business process and workflows
Defining business process and workflows
Hiep Luong
 
ECM Introduction
ECM IntroductionECM Introduction
ECM Introduction
Hiep Luong
 
Collaboration
CollaborationCollaboration
Collaboration
Hiep Luong
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business Intelligence
Hiep Luong
 
Search overview
Search overviewSearch overview
Search overviewHiep Luong
 
Communication Training
Communication TrainingCommunication Training
Communication TrainingHiep Luong
 
Time management
Time managementTime management
Time managementHiep Luong
 

More from Hiep Luong (20)

Youth in Community at Youth for Cause Dialogue Session 10 June 2011
Youth in Community  at Youth for Cause Dialogue Session 10 June 2011Youth in Community  at Youth for Cause Dialogue Session 10 June 2011
Youth in Community at Youth for Cause Dialogue Session 10 June 2011
 
Lin at youth for cause dialogue session 10 june 2011
Lin at youth for cause dialogue session 10 june 2011Lin at youth for cause dialogue session 10 june 2011
Lin at youth for cause dialogue session 10 june 2011
 
Gop Sang at Youth for Cause Dialogue Session 10 June 2011
Gop Sang at Youth for Cause Dialogue Session 10 June 2011Gop Sang at Youth for Cause Dialogue Session 10 June 2011
Gop Sang at Youth for Cause Dialogue Session 10 June 2011
 
Gop sang at youth for cause dialogue session 10 june 2011
Gop sang  at youth for cause dialogue session 10 june 2011Gop sang  at youth for cause dialogue session 10 june 2011
Gop sang at youth for cause dialogue session 10 june 2011
 
Eco profile at youth for cause dialogue session 10 june 2011
Eco profile at youth for cause dialogue session 10 june 2011Eco profile at youth for cause dialogue session 10 june 2011
Eco profile at youth for cause dialogue session 10 june 2011
 
Be a guardian evg at youth for cause dialogue session 10 june 2011
Be a guardian   evg at youth for cause dialogue session 10 june 2011Be a guardian   evg at youth for cause dialogue session 10 june 2011
Be a guardian evg at youth for cause dialogue session 10 june 2011
 
Touch group at youth for cause dialogue session 10 june 2011
Touch group at youth for cause dialogue session 10 june 2011Touch group at youth for cause dialogue session 10 june 2011
Touch group at youth for cause dialogue session 10 june 2011
 
Structured teaching
Structured teachingStructured teaching
Structured teaching
 
SSL
SSLSSL
SSL
 
S211 conference pr presentation jg master
S211 conference pr presentation jg masterS211 conference pr presentation jg master
S211 conference pr presentation jg master
 
Presentation Layer
Presentation LayerPresentation Layer
Presentation Layer
 
E-Commerce
E-CommerceE-Commerce
E-Commerce
 
Ptit tmdt
Ptit   tmdtPtit   tmdt
Ptit tmdt
 
Defining business process and workflows
Defining business process and workflowsDefining business process and workflows
Defining business process and workflows
 
ECM Introduction
ECM IntroductionECM Introduction
ECM Introduction
 
Collaboration
CollaborationCollaboration
Collaboration
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business Intelligence
 
Search overview
Search overviewSearch overview
Search overview
 
Communication Training
Communication TrainingCommunication Training
Communication Training
 
Time management
Time managementTime management
Time management
 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

Cryptography and E-Commerce

  • 1. Cryptography & E-Commerce Keeping your Secrets secret! © University of Glamorgan  SLIDE “ Some simple yet secure cipher, easily acquired and easily read, should be introduced by which messages might to all intents and purposes be ‘sealed’ to any person but the recipient” Quarterly Review 1853, [The Victorian Internet, Tom Standage]
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. The Caesar Substitution Cipher © University of Glamorgan The Caesar cipher is named after Julius Caesar, said to be the first to use it. In the Caesar cipher each character is substituted by another. This technique is called a monoalphabetic cipher. Plaintext: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Ciphertext: O P Q R S T U V W X Y Z A B C D E F G H I J K L M N Thus using a Caesar cipher, the message “Mission Impossible” would be encoded as “ AWGGWN WADCGGWPZS” So what do the following ciphertexts mean ? 1) sbwuao 2) gpkioc 3) kohqv cih tcf pfihig  SLIDE  WEB
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. Cryptography and e-commerce Examples © University of Glamorgan  WEB  SLIDE
  • 21.
  • 22.
  • 23. Symmetric Key Digital Signatures © University of Glamorgan S sends sealed M to Arbiter SENDER K S M ARBITER Arbiter retrieves plaintext M from S M K S M K R S M Arbiter seals [ Message received from Sender E ( M , K S ), Identify of Sender S , and copy of plaintext M ] and sends all to R RECIPIENT  WEB  SLIDE 1 2 3
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. Certificates (2) © University of Glamorgan
  • 36. Certificates (3) © University of Glamorgan
  • 37. Certificates (4) © University of Glamorgan
  • 38.
  • 39.
  • 40.

Editor's Notes

  1. Simple example of cryptography
  2. Example of a digital crypto system