- Cryptography and Security
- Methods of Encryption and Decryption
- What is an Algorithm?
- Symmetric Algorithm
- Asymmetric Algorithm
- Hybrid Encryption
- Hashing Algorithm
- Securing the Algorithm or the Key
- Hash Value and Rainbow Table
- Digital Signature
- PKI
A short introduction to cryptography. What is public and private key cryptography? What is a Caesar Cipher and how do we decrypt it? How does RSA work?
We use it every day and we rely on it. But what are the roots of cryptography? How were, for example, the ancient Greeks able to protect information from their enemies? In this talk we will go through 5500 years of developing encryption technologies and look at how these work.
From the Un-Distinguished Lecture Series (http://ws.cs.ubc.ca/~udls/). The talk was given Mar. 23, 2007
In this project we develop an application for translation of information in any language to Cipher/Encrypted , which otherwise is done by using different software in the present scenario. Our attempt is to overcome the various shortcomings in different software available in the market and develop the best (Encryptor/Decryptor) with most useful algorithms. We explore and implement Tiny Algorith, Neural Algorithm, A hybrid blend Neural and Tiny algorithm, Rijandel Agorithm, Stegnography (for Image and Audio files), Video Encryption and Decryption, and a Chat server for secret Communication oiver the software.
A short introduction to cryptography. What is public and private key cryptography? What is a Caesar Cipher and how do we decrypt it? How does RSA work?
We use it every day and we rely on it. But what are the roots of cryptography? How were, for example, the ancient Greeks able to protect information from their enemies? In this talk we will go through 5500 years of developing encryption technologies and look at how these work.
From the Un-Distinguished Lecture Series (http://ws.cs.ubc.ca/~udls/). The talk was given Mar. 23, 2007
In this project we develop an application for translation of information in any language to Cipher/Encrypted , which otherwise is done by using different software in the present scenario. Our attempt is to overcome the various shortcomings in different software available in the market and develop the best (Encryptor/Decryptor) with most useful algorithms. We explore and implement Tiny Algorith, Neural Algorithm, A hybrid blend Neural and Tiny algorithm, Rijandel Agorithm, Stegnography (for Image and Audio files), Video Encryption and Decryption, and a Chat server for secret Communication oiver the software.
We all use Wifi today. You know how much money it saves for your smart-phone data usage band-width. Connecting all your computers and gadgets with cables is not just history, even if you attempt it would be impractical!
Wifi being so pervasive, also brings along tremendous security implications. Come join us to look into details of Wifi security. How to secure your wifi network? How certain wifi encryption technologies can be hacked? We would prove that with live demos!
Join us to reflect on the security aspect of this technology, discuss about it and leave with more confidence about how 'secure' your WiFi access is?
While computer systems today have some of the best security systems ever, they are more vulnerable than ever before.
This vulnerability stems from the world-wide access to computer systems via the Internet.
Computer and network security comes in many forms, including encryption algorithms, access to facilities, digital signatures, and using fingerprints and face scans as passwords.
Cryptography is the science of using mathematics to encrypt and decrypt data. This presentation explains about the cryptography, its history, types i.e. symmetric and asymmetric cryptography.
We all use Wifi today. You know how much money it saves for your smart-phone data usage band-width. Connecting all your computers and gadgets with cables is not just history, even if you attempt it would be impractical!
Wifi being so pervasive, also brings along tremendous security implications. Come join us to look into details of Wifi security. How to secure your wifi network? How certain wifi encryption technologies can be hacked? We would prove that with live demos!
Join us to reflect on the security aspect of this technology, discuss about it and leave with more confidence about how 'secure' your WiFi access is?
While computer systems today have some of the best security systems ever, they are more vulnerable than ever before.
This vulnerability stems from the world-wide access to computer systems via the Internet.
Computer and network security comes in many forms, including encryption algorithms, access to facilities, digital signatures, and using fingerprints and face scans as passwords.
Cryptography is the science of using mathematics to encrypt and decrypt data. This presentation explains about the cryptography, its history, types i.e. symmetric and asymmetric cryptography.
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
In the past Enterprise Mobility Management (EMM) has focused primarily on MDM, MAM and MCM. Recently there has been a lot of focus on the fourth pillar of EMM - Mobile Identity Management (MIM). This session will cover the primary use cases and discuss current solutions available for managed/un-managed, internal/public and mobile/web apps for iOS/Android devices.
AssureBridge - SSO to Many B2B Service Providers - Marketing presentationAssureBridge
A popular growth strategy for many companies is to broaden their online offerings by making other B2B providers' services accessible to their customer on their Web Sites. To make the customer online experience pleasant and secure, these companies are required to implement complex Internet Single Sign-On (SSO) integration with many B2B partners. AssureBridge solutions help to deliver these integrations quickly, painlessly, and efficiently.
First class of four-part series developed for introducing engineers to cryptography.
Delivered at AMC Theater in Tyson's Corner for Microstrategy, 4 October 2013.
OpenIG Webinar: Your Swiss Army Knife for Protecting and Securing Web Apps, A...ForgeRock
Description:
This webinar will explore how to improve security by enforcing identity, ensuring the requests are correctly authorized to access the resources it’s requesting. How to leverage standards based identity, such as OAuth2, SAML or OpenID Connect or even social login, to make it easier for users, devices, things and API’s to interact with your digital services while improving security.
Webinar Highlights:
Overview of OpenIG
Demo on the power of OpenIG’s gateway integration capabilities
Demo of upcoming features in OpenIG 4.0, including throttling
Q&A
Join ForgeRock’s Product Manager of OpenDJ and OpenIG, Ludovic Poitou and Senior Product Marketing Manager, Justin Pirie, to discuss OpenIG.
OpenAM product manager Andy Hall covers some of the major new components in OpenAM 12.0, such as the Scripting Engine, Policy Editor, XUI user interface framework, and Secure Token transformation service.
The webinar can be watched here: http://go.forgerock.com/webinar-openam-12.html
Enabling Data Protection through PKI encryption in IoT m-Health DevicesCharalampos Doukas
Short presentation about a gateway-based solution for medical data encryption and the Internet of Things. Paper presented at 12th IEEE International Conference on BioInformatics and BioEngineering
An IAM for Beginners session led by Dr. Matthias Tristl, Senior Instructor, ForgeRock
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
A brief overview of historical cryptography, moving into modern methods and a few How-To examples for PHP.
Talk given to @phpbelfast PHP User Group - Feb 2014 by @faffyman
[CONFidence 2016] Marco Ortisi - Recover a RSA private key from a TLS session...PROIDEA
They always taught us that the only thing it can be pulled out from a SSL/TLS session using strong authentication and latest state-of-art (Perfect Forward Secrecy) ciphersuites is the public key of the certificate exchanged during the TLS handshake, an insufficient condition to place a MiTM attack without to generate alarms on the validity of the TLS connection and certificate itself. Anyway, this is not always true. In certain circumstances it is possible to derive the private key of server regardless the size of modulus used. Even RSA keys of 4096 bits can be factored at the cost of a few CPU cycles and
computational resources. All that needed is the generation of a faulty digital signature from server, an event that can be observed when occuring error conditions such as CPU overheating and/or hardware faults. Because of these premises devices like firewall, switch, router and other embedded appliances are more exposed than traditional IT servers or clients. During the talk, the author will explain the theory behind the attack, how common are the factors that make it possible, and his customized implementation of the technique. At the end a proof-of-concept able to work both in passive mode (i.e. only sniffing the network traffic) and in active mode (namely, partecipating directly in the establishment of TLS handshakes) will be released.
The presentation covers the following:
Basic Terms
Cryptography
The General Goals of Cryptography
Common Types of Attacks
Substitution Ciphers
Transposition Cipher
Steganography- “Concealed Writing”
Symmetric Secret Key Encryption
Types of Symmetric Algorithms
Common Symmetric Algorithms
Asymmetric Secret Key Encryption
Common Asymmetric Algorithms
Public Key Cryptography
Hashing Techniques
Hashing Algorithms
Digital Signatures
Transport Layer Security
Public key infrastructure (PKI)
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
2. • Rabei Hassan
• CISSP-ISSAP, CCSP, CRISC, CISM, CISA, CEH, ECSA, CHFI, Security+
• MCTS, MCSE: Security, MCDBA, MCSA: Messaging
• More than 18 years working experience at various IT fields
• Infrastructure and Info Security Consultation and Training
• IT Management
• Web and Windows Application Development
• Systems and Database Administration
• https://au.linkedin.com/in/rabei-hassan-564b3214
3. Session Objectives
• Cryptography and Security
• Methods of Encryption and Decryption
• What is an Algorithm?
• Symmetric Algorithm
• Asymmetric Algorithm
• Hybrid Encryption
• Hashing Algorithm
• Securing the Algorithm or the Key
• Hash Value and Rainbow Table
• Digital Signature
• PKI
5. Methods of Encryption and Decryption
• Symmetric
• Use ONLY One Key for encryption and decryption
• Asymmetric
• Use Two Keys,
• One key will be used for encryption
• The other key will be used for decryption.
• Hashing
• One-Way encryption ..!
6. What is an Algorithm ?
• Instructions; the steps that we need to follow to do the operation.
• In general, it will has two types of instructions:
• Instructions for how to do the encryption
• Instruction for how to do the decryption
Symmetric
Algorithms
Encryption
Instructions
using Key X
Step 1 - ……..
Step 2 - ……..
Step 3 - ……..
Step 4 - ……..
Decryption
Instructions
using Key X
Step 1 - ……..
Step 2 - ……..
Step 3 - ……..
Step 4 - ……..
Asymmetric
Algorithms
Encryption
Instructions
using Key X
Step 1 - ……..
Step 2 - ……..
Step 3 - ……..
Step 4 - ……..
Decryption
Instructions
Using Key Y
Step 1 - ……..
Step 2 - ……..
Step 3 - ……..
Step 4 - ……..
Hashing
Algorithms
Instructions for
One-Way Encryption
No-KEY
Step 1 - ……..
Step 2 - ……..
Step 3 - ……..
Step 4 - ……..
Plain Text Cipher Text
Plain Text Hash Value
7. Symmetric Algorithms (1/3)
• Vigenere Cipher
• Plain Text : Welcome To Cryptography
• Key: RAMGuide
Encryption Instructions
1. Put the plain text in a raw.
2. Put the Key in a second line raw below the plain text raw.
3. If the key-size is smaller than the plain text size, then repeat it until it become the
same size as the plain text.
4. According to the table on the right section, the cipher text will be the inter section
between the character in the plain text raw and the character in the key raw.
Plain Text W E L C O M E T O C R Y P T O G R A P H Y
Key R A M G U I D E R A M G U I D E R A M G U
Cipher Text N E X I . . . . . . . . . . . . . . . . .
Decryption
Instructions
8. Binary Mathematics
X AND Y
X OR Y
X XOR Y
Both values need
to be true, so the
output will be
true.
One OR Two
values need to be
true so the final
value will be true.
One and Only One
value need to be
true so the final
value will be true.
9. Symmetric Algorithms (2/3)
• Vernam (One-Time Pad) Cipher
• Plain Text : Welcome
• Key: RAMGuid
Encryption Instructions
1. The key must be the same size as the plain text.
2. Put the Key in a second line raw below the plain text raw.
3. XOR between them on the bit level.
Plain Text
W
0101 0111
E
0100 0101
L
0100 1100
C
0100 0011
O
0100 1111
M
0100 1101
E
0100 0101
Key
R
0101 0010
A
0100 0001
M
0100 1101
G
0100 0111
U
0101 0101
I
0100 1001
D
0100 0100
Cipher Text 0000 0101 0000 0100 . . . . .
W 0 1 0 1 0 1 1 1
R 0 1 0 1 0 0 1 0
0 0 0 0 0 1 0 1
E 0 1 0 0 0 1 0 1
A 0 1 0 0 0 0 0 1
0 0 0 0 0 1 0 0
Decryption
Instructions
10. Symmetric Algorithms (3/3)
• DES …………………. [Key Size is …. 56-bit]
• 3DES ……………….. [Key Size could be …… 112-bit …… 168-bit]
• AES …………………. [Key Size could be ……. 128-bit ..… 192-bit …. 256-bit]
11. Asymmetric Algorithms
• Will use two keys:
• Public Key ……………………. [Any one can get a copy of it]
• Private Key ………………….. [Maintained by the owner]
• Public/Private key is for one entity/individual only.
Amr
Jana
1. Amr will send his Public Key to Jana 2. Jana will
encrypt the
message with
Amr Public Key3. Jana will send the secret message to Amr
4. Amr will
decrypt the
secret message
with his own
Private Key
Amr Public Key
Amr Private Key
Jana Private Key
Amr need to receive something securely from Jana
Amr Public Key
12. Asymmetric Algorithms
• Diffie-Hellman ………..[Key Exchange]
• EL Gamal …………………[Key Exchange – Encryption – Digital Signature]
• RSA ………………………….[Key Exchange – Encryption – Digital Signature]
• Elliptic Curve ………….. [Key Exchange – Encryption – Digital Signature]
13. Symmetric vs. Asymmetric Algorithms
Symmetric Asymmetric
Key Distribution X
Performance Fast
Slow
1000 ~ 10,000 slower than Symmetric
Scalability X A
B
C
D
E
F
5 Keys
4 Keys
3 Keys
2 Keys
1 Key
Total number of Keys = 5 + 4 + 3 + 2 + 1 = 15
6 Entities (Individuals)
Symmetric
6 Entities (Individual) – each one will has two keys (Public/Private)
6 X 2 = 12
Asymmetric
14. Hybrid Encryption (Symmetric + Asymmetric)
HTTPS://www.Amazon.com
You want to Transfer your Credit-Card information securely
Amazon Public Key
Amazon Private Key
Amazon will send its Public Key
A session Symmetric
Key will be generated
locally on your own
machine
Credit Card
Information The Encrypted Credit-Card Information will be transferred to Amazon.com
Symmetric
Key The Session Symmetric Key will be transferred one time only during the whole session
15. Hash Algorithm (1/2)
• One-way encryption, that will generate a fixed length value.
ABC
Funny Hashing Algorithm
1. Get the ASCII Code of each character
2. Multiply by the position
3. Get the Sum
1. A(65) B(66) C(67)
2. 65 X 1 66X2 67X3
3. 65 + 132 + 201
398
Securing
PasswordsIntegrity
[File Transfer]
17. Securing the Algorithm or the Key ?
• Pros/Cos of securing the algorithm
• Pros/Cos of making the algorithms publicly accessible and securing
only the key
• The longer the key, the harder to be compromised.
Algorithm
Instructions
Know the exact algorithm
Know the exact key
4 Digits Key
[0110]
0000
0001
0010
0100
1000
.
.
.
.
2x = 24 = 16
128-bit Key = 2128 =
3.4028236692093846346337460743177e+38
Brute-force
Attack
Key need to be
changed from
time to time
18. Hash Value and Rainbow Table
ABC
398Hashing
1. Generate “AAA”
2. Generate the Hash-Value for …… “AAA”
3. Compare the Hash-Value of ….. “AAA” …. with the stolen one
“BBB”
“BBB”
“BBB”
Value MD5 SHA1
AAA 3c01… 6f358…
BBB a2c9a… bb27f…
. . .
. . .
. . .
Demo: Generate and Crack Hash Value
Rainbow Table
19. Digital Signature
Amr
Jana
Jan Public Key
Amr Private Key
Amr Public Key
Jana Private Key
Amr want to send something securely to Jana
Modification to be detected / To be sure it is from Amr
1. Type a message “ABC”
2. Hash the message and get the hash value
3. Encrypt the hash value using the Amr Private Key
ABC
Hash
Value
ABC
Hash
Value
Hash
Value
Integrity
Authenticity
Non-Repudiation
Amr Public Key
20. Public Key Infrastructure – PKI
Public/Private
Public/Private
Public/Private
Public/Private
X.509
How can we transfer the Public Key / File Format
21. Public Key Infrastructure – PKI
Public/Private
Public/Private
Public/Private
Public/Private
Certificate Authority (CA)
Who Create/Generate this Certificate
Public Key
X.509
How can we transfer the Public Key / File Format
1. How can you trust this certificate ... ?
2. Does this site really belong to ... ?
Trust
A Trust B
B Trust C
Trust
Then A will Trust B
22. Public Key Infrastructure – PKI
Public/Private
Public/Private
Public/Private
Public/Private
Certificate Authority (CA)
Who Create/Generate this Certificate
How can we transfer the Public Key / File Format
1. How can you trust this certificate ... ?
2. Does this site really belong to ... ?
Does this certificate really generated by a Trusted CA ?
23. Public Key Infrastructure – PKI
Public/Private
Certificate Authority (CA)
Public Key
Does this certificate really generated by a Trusted CA ?
Hash
Value
DS
Hash
Value
Public Key
Hash
Value
CA Public Key
Public Trusted CA Local Trusted CA
Demo: Where we can find Trusted CAs
25. Hybrid Encryption (Symmetric + Asymmetric)
HTTPS://www.Amazon.com
You want to Transfer your Credit-Card information securely
Amazon Public Key
Amazon Private Key
Amazon will send its Certificate (which contain its Public Key)
A session Symmetric
Key will be generated
locally on your own
machine
Credit Card
Information The Encrypted Credit-Card Information will be transferred to Amazon.com
Symmetric
Key The Session Symmetric Key will be transferred one time only during the whole session
Authenticity & Confidentiality
26. Digital Signature
Amr
Jana
Jan Public Key
Amr Private Key
Amr Public Key
Jana Private Key
Amr want to send something securely to Jana
Modification to be detected / To be sure it is from Amr
1. Type a message “ABC”
2. Hash the message and get the hash value
3. Encrypt the hash value using the Amr Private Key
ABC
Hash
Value
ABC
Hash
Value
Hash
Value
Integrity
Authenticity
Non-Repudiation
Amr Public Key
27. Public Key Infrastructure – PKI
Certificate Authority (CA)
Public Trusted CA Local Trusted CA
Number / Location
Administration
Servers/Computers
Users
Application/Services
Network Devices
Certificates
&
Backup
Confidentiality
Integrity
Authenticity
Non-Repudiation
Issue Policy and Methods
Distribution Policy and Methods
28. Session Objectives
• Cryptography and Security
• Methods of Encryption and Decryption
• What is an Algorithm?
• Symmetric Algorithm
• Asymmetric Algorithm
• Hybrid Encryption
• Hashing Algorithm
• Securing the Algorithm or the Key
• Hash Value and Rainbow Table
• Digital Signature
• PKI
Editor's Notes
I need to cover Internet Footprint and Offline Footprint
http://pubs.vmware.com/view-52/index.jsp?topic=%2Fcom.vmware.view.certificates.doc%2FGUID-3A8CFE07-0A1A-4AB1-B2B6-41DA8E592EFB.html
Tell them first that we need to get a public/private key for each person, computer, device, service/application
Now we need to transfer this public key to the recipient, what will the format of the file that will hold the public key.
Move the certificate from the CA to the webserver and then to the client
How the client can trust that this certificate really came from a CA
http://pubs.vmware.com/view-52/index.jsp?topic=%2Fcom.vmware.view.certificates.doc%2FGUID-3A8CFE07-0A1A-4AB1-B2B6-41DA8E592EFB.html
Tell them first that we need to get a public/private key for each person, computer, device, service/application
Now we need to transfer this public key to the recipient, what will the format of the file that will hold the public key.
Move the certificate from the CA to the webserver and then to the client
How the client can trust that this certificate really came from a CA
http://pubs.vmware.com/view-52/index.jsp?topic=%2Fcom.vmware.view.certificates.doc%2FGUID-3A8CFE07-0A1A-4AB1-B2B6-41DA8E592EFB.html
Tell them first that we need to get a public/private key for each person, computer, device, service/application
Now we need to transfer this public key to the recipient, what will the format of the file that will hold the public key.
Move the certificate from the CA to the webserver and then to the client
How the client can trust that this certificate really came from a CA
Certmgr.msc
http://pubs.vmware.com/view-52/index.jsp?topic=%2Fcom.vmware.view.certificates.doc%2FGUID-3A8CFE07-0A1A-4AB1-B2B6-41DA8E592EFB.html
Tell them first that we need to get a public/private key for each person, computer, device, service/application
Now we need to transfer this public key to the recipient, what will the format of the file that will hold the public key.
Move the certificate from the CA to the webserver and then to the client
How the client can trust that this certificate really came from a CA