SlideShare a Scribd company logo
Zeeshan Khalid
ENCRYPTION
SYMMETRIC KEY ENCRYPTION
Also known as secret key encryption
• Both the sender and receiver use the same
digital key to encrypt and decrypt message
• Requires a different set of keys for each
transaction
• Advanced Encryption Standard (AES):
– Most widely used symmetric key encryption
today; offers 128-, 192-, and 256-bit encryption
keys; other standards use keys with up to 2,048
bits
PUBLIC KEY ENCRYPTION
Solves symmetric key encryption problem of having to exchange
secret key
• Uses two mathematically related digital keys – public key (widely
disseminated) and private key (kept secret by owner)
• Both keys used to encrypt and decrypt message
• Once key used to encrypt message, same key cannot be used to
decrypt message
• For example, sender uses recipient’s public key to encrypt
message;
recipient uses his/her private key to decrypt it
PUBLIC KEY CRYPTOGRAPHY – A SIMPLE CASE
PUBLIC KEY ENCRYPTION USING
DIGITAL SIGNATURES AND HASH DIGESTS
• Application of hash function (mathematical
algorithm) by sender prior to encryption
produces hash digest that recipient can use
to verify integrity of data
• Double encryption with sender’s private key
(digital signature) helps ensure authenticity
and nonrepudiation
LIMITS TO ENCRYPTION SOLUTIONS
• PKI applies mainly to protecting messages in
transit
• PKI is not effective against insiders
• Protection of private keys by individuals may
be haphazard
• No guarantee that verifying computer of
merchant is secure
• CAs are unregulated, self-selecting
organizations
SECURING CHANNELS OF COMMUNICATION
Secure Sockets Layer (SSL):
– Most common form of securing channels of
communication; used to
establish a secure negotiated session (client-server session
in which URL of requested document, along with
contents, is encrypted)
• S-HTTP:
– Alternative method; provides a secure message-oriented
communications protocol designed for use in conjunction
with HTTP
• Virtual Private Networks (VPNs):
– Allow remote users to securely access internal networks
via the Internet, using Point-to-Point Tunneling Protocol
(PPTP)
SECURE NEGOTIATED SESSIONS USING SSL
PROTECTING NETWORKS: FIREWALLS AND
PROXY SERVERS
• Firewall: Hardware or software filters
communications packets; prevents some
packets from entering the network based on a
security policy
• Firewall methods include:
– Packet filters
– Application gateways
• Proxy servers: Software servers that handle all
communications originating from or being sent
to the Internet
FIREWALLS AND PROXY SERVERS
PROTECTING SERVERS AND CLIENTS
Operating system controls: Authentication and
access control mechanisms
• Anti-virus software: Easiest and least
expensive way to prevent threats to system
integrity
POLICIES, PROCEDURES & LAW:
DEVELOPING AN E-COMMERCE SECURITY PLAN

More Related Content

What's hot

Incident response, Hacker Techniques and Countermeasures
Incident response, Hacker Techniques and CountermeasuresIncident response, Hacker Techniques and Countermeasures
Incident response, Hacker Techniques and Countermeasures
Jose L. Quiñones-Borrero
 
B.Rosenblatt presentation of LCP, epub summit
B.Rosenblatt presentation of LCP, epub summitB.Rosenblatt presentation of LCP, epub summit
B.Rosenblatt presentation of LCP, epub summit
Laurent Le Meur
 
Network security
Network securityNetwork security
Network security
Donald West Rock
 
CNIT 141: 13. TLS
CNIT 141: 13. TLSCNIT 141: 13. TLS
CNIT 141: 13. TLS
Sam Bowne
 
Using advanced security and data-protection features
Using advanced security and data-protection featuresUsing advanced security and data-protection features
Using advanced security and data-protection features
MariaDB plc
 
Overview of NSA Security Enhanced Linux - FOSS.IN/2005
Overview of NSA Security Enhanced Linux - FOSS.IN/2005Overview of NSA Security Enhanced Linux - FOSS.IN/2005
Overview of NSA Security Enhanced Linux - FOSS.IN/2005
James Morris
 
CNIT 123 12: Cryptography
CNIT 123 12: CryptographyCNIT 123 12: Cryptography
CNIT 123 12: Cryptography
Sam Bowne
 
Open ssl heart bleed weakness.
Open ssl heart bleed weakness.Open ssl heart bleed weakness.
Open ssl heart bleed weakness.
Khaled Mosharraf
 
Encryption & decryption of sound presentation
Encryption & decryption of sound presentationEncryption & decryption of sound presentation
Encryption & decryption of sound presentation
Muhammad Saif Ul Islam
 
Protect Association event 20th Jan 2017
Protect Association event 20th Jan 2017Protect Association event 20th Jan 2017
Protect Association event 20th Jan 2017
Steve Devine
 
Introduction to Cryptography Training – Level 1
Introduction to Cryptography Training – Level 1Introduction to Cryptography Training – Level 1
Introduction to Cryptography Training – Level 1
Bryan Len
 
HMAC a signature alternative
HMAC a signature alternativeHMAC a signature alternative
HMAC a signature alternative
Hubert Gregoire
 
Echoworx Encryption Delivery Methods
Echoworx Encryption Delivery MethodsEchoworx Encryption Delivery Methods
Echoworx Encryption Delivery Methods
Echoworx
 
APIdays Barcelona 2019 - Introduction to Onion Services to secure APIs with P...
APIdays Barcelona 2019 - Introduction to Onion Services to secure APIs with P...APIdays Barcelona 2019 - Introduction to Onion Services to secure APIs with P...
APIdays Barcelona 2019 - Introduction to Onion Services to secure APIs with P...
apidays
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
Sam Bowne
 
CNIT 123: 6: Enumeration
CNIT 123: 6: EnumerationCNIT 123: 6: Enumeration
CNIT 123: 6: Enumeration
Sam Bowne
 
Solving Document Security
Solving Document SecuritySolving Document Security
Solving Document SecurityZia Consulting
 
Cryptography101
Cryptography101Cryptography101
Cryptography101NCC Group
 

What's hot (20)

Incident response, Hacker Techniques and Countermeasures
Incident response, Hacker Techniques and CountermeasuresIncident response, Hacker Techniques and Countermeasures
Incident response, Hacker Techniques and Countermeasures
 
B.Rosenblatt presentation of LCP, epub summit
B.Rosenblatt presentation of LCP, epub summitB.Rosenblatt presentation of LCP, epub summit
B.Rosenblatt presentation of LCP, epub summit
 
Sw2 b12
Sw2 b12Sw2 b12
Sw2 b12
 
Firewall
FirewallFirewall
Firewall
 
Network security
Network securityNetwork security
Network security
 
CNIT 141: 13. TLS
CNIT 141: 13. TLSCNIT 141: 13. TLS
CNIT 141: 13. TLS
 
Using advanced security and data-protection features
Using advanced security and data-protection featuresUsing advanced security and data-protection features
Using advanced security and data-protection features
 
Overview of NSA Security Enhanced Linux - FOSS.IN/2005
Overview of NSA Security Enhanced Linux - FOSS.IN/2005Overview of NSA Security Enhanced Linux - FOSS.IN/2005
Overview of NSA Security Enhanced Linux - FOSS.IN/2005
 
CNIT 123 12: Cryptography
CNIT 123 12: CryptographyCNIT 123 12: Cryptography
CNIT 123 12: Cryptography
 
Open ssl heart bleed weakness.
Open ssl heart bleed weakness.Open ssl heart bleed weakness.
Open ssl heart bleed weakness.
 
Encryption & decryption of sound presentation
Encryption & decryption of sound presentationEncryption & decryption of sound presentation
Encryption & decryption of sound presentation
 
Protect Association event 20th Jan 2017
Protect Association event 20th Jan 2017Protect Association event 20th Jan 2017
Protect Association event 20th Jan 2017
 
Introduction to Cryptography Training – Level 1
Introduction to Cryptography Training – Level 1Introduction to Cryptography Training – Level 1
Introduction to Cryptography Training – Level 1
 
HMAC a signature alternative
HMAC a signature alternativeHMAC a signature alternative
HMAC a signature alternative
 
Echoworx Encryption Delivery Methods
Echoworx Encryption Delivery MethodsEchoworx Encryption Delivery Methods
Echoworx Encryption Delivery Methods
 
APIdays Barcelona 2019 - Introduction to Onion Services to secure APIs with P...
APIdays Barcelona 2019 - Introduction to Onion Services to secure APIs with P...APIdays Barcelona 2019 - Introduction to Onion Services to secure APIs with P...
APIdays Barcelona 2019 - Introduction to Onion Services to secure APIs with P...
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
 
CNIT 123: 6: Enumeration
CNIT 123: 6: EnumerationCNIT 123: 6: Enumeration
CNIT 123: 6: Enumeration
 
Solving Document Security
Solving Document SecuritySolving Document Security
Solving Document Security
 
Cryptography101
Cryptography101Cryptography101
Cryptography101
 

Viewers also liked

Depliant Consapevolezza Dell Essere Apr09
Depliant Consapevolezza Dell Essere Apr09Depliant Consapevolezza Dell Essere Apr09
Depliant Consapevolezza Dell Essere Apr09
fryttaj
 
Serfor: Bosques productivos para la vida
Serfor: Bosques productivos para la vidaSerfor: Bosques productivos para la vida
Serfor: Bosques productivos para la vida
Serfor Perú
 
CAVE Language Presentation for AI Camp
CAVE Language Presentation for AI CampCAVE Language Presentation for AI Camp
CAVE Language Presentation for AI Camp
Loren Davie
 
2016 and 2017 IEEE For MTech @ TMKS Infotech
2016 and 2017 IEEE For MTech @ TMKS Infotech2016 and 2017 IEEE For MTech @ TMKS Infotech
2016 and 2017 IEEE For MTech @ TMKS Infotech
Manju Nath
 
Project acp composites gold
Project acp composites goldProject acp composites gold
Project acp composites gold
VINK BVBA
 
2016 and 2017 Networking Projects @ TMKS Infotech
2016 and 2017 Networking Projects @ TMKS Infotech2016 and 2017 Networking Projects @ TMKS Infotech
2016 and 2017 Networking Projects @ TMKS Infotech
Manju Nath
 
Estrategiasdepublicidadypromocin
Estrategiasdepublicidadypromocin Estrategiasdepublicidadypromocin
Estrategiasdepublicidadypromocin
R L Polk
 
Displasia De Cadera Del Adulto. Clinica Universidad De Navarra
Displasia De Cadera Del Adulto. Clinica Universidad De Navarra
Displasia De Cadera Del Adulto. Clinica Universidad De Navarra
Displasia De Cadera Del Adulto. Clinica Universidad De Navarra
redundantdungeo0
 
Hardware concepts
Hardware conceptsHardware concepts
Hardware concepts
Gaurav Mishra
 
Drunkoressia
Drunkoressia Drunkoressia
Drunkoressia
Dina Malgieri
 
L’azzardo non e’ un gioco
L’azzardo non e’ un giocoL’azzardo non e’ un gioco
L’azzardo non e’ un gioco
Dina Malgieri
 
Ansia Ed Incertezza Identitaria In Adolescenza Elisabetta Crocetti
Ansia Ed  Incertezza Identitaria In  Adolescenza  Elisabetta  CrocettiAnsia Ed  Incertezza Identitaria In  Adolescenza  Elisabetta  Crocetti
Ansia Ed Incertezza Identitaria In Adolescenza Elisabetta Crocetti
Ellepi Associati Ancona
 
Resume ellucian-vishal matta
Resume ellucian-vishal mattaResume ellucian-vishal matta
Resume ellucian-vishal matta
Vishal Matta
 
Assertiveness
AssertivenessAssertiveness
Assertivenessivaturi69
 
Esercizio modulo2 strategie_fronteggiamento_1
Esercizio modulo2 strategie_fronteggiamento_1Esercizio modulo2 strategie_fronteggiamento_1
Esercizio modulo2 strategie_fronteggiamento_1Luoghi di Prevenzione
 
Competenze trasversali nella gestione del rischio
Competenze trasversali nella gestione del rischioCompetenze trasversali nella gestione del rischio
Competenze trasversali nella gestione del rischioLuoghi di Prevenzione
 

Viewers also liked (20)

Depliant Consapevolezza Dell Essere Apr09
Depliant Consapevolezza Dell Essere Apr09Depliant Consapevolezza Dell Essere Apr09
Depliant Consapevolezza Dell Essere Apr09
 
Serfor: Bosques productivos para la vida
Serfor: Bosques productivos para la vidaSerfor: Bosques productivos para la vida
Serfor: Bosques productivos para la vida
 
CAVE Language Presentation for AI Camp
CAVE Language Presentation for AI CampCAVE Language Presentation for AI Camp
CAVE Language Presentation for AI Camp
 
2016 and 2017 IEEE For MTech @ TMKS Infotech
2016 and 2017 IEEE For MTech @ TMKS Infotech2016 and 2017 IEEE For MTech @ TMKS Infotech
2016 and 2017 IEEE For MTech @ TMKS Infotech
 
Project acp composites gold
Project acp composites goldProject acp composites gold
Project acp composites gold
 
図面1.htm
図面1.htm図面1.htm
図面1.htm
 
2016 and 2017 Networking Projects @ TMKS Infotech
2016 and 2017 Networking Projects @ TMKS Infotech2016 and 2017 Networking Projects @ TMKS Infotech
2016 and 2017 Networking Projects @ TMKS Infotech
 
Estrategiasdepublicidadypromocin
Estrategiasdepublicidadypromocin Estrategiasdepublicidadypromocin
Estrategiasdepublicidadypromocin
 
Displasia De Cadera Del Adulto. Clinica Universidad De Navarra
Displasia De Cadera Del Adulto. Clinica Universidad De Navarra
Displasia De Cadera Del Adulto. Clinica Universidad De Navarra
Displasia De Cadera Del Adulto. Clinica Universidad De Navarra
 
Hardware concepts
Hardware conceptsHardware concepts
Hardware concepts
 
Identità personale
Identità personaleIdentità personale
Identità personale
 
Drunkoressia
Drunkoressia Drunkoressia
Drunkoressia
 
L’azzardo non e’ un gioco
L’azzardo non e’ un giocoL’azzardo non e’ un gioco
L’azzardo non e’ un gioco
 
Modulo3a ruolo operatori_parte 4
Modulo3a ruolo operatori_parte 4Modulo3a ruolo operatori_parte 4
Modulo3a ruolo operatori_parte 4
 
Ansia Ed Incertezza Identitaria In Adolescenza Elisabetta Crocetti
Ansia Ed  Incertezza Identitaria In  Adolescenza  Elisabetta  CrocettiAnsia Ed  Incertezza Identitaria In  Adolescenza  Elisabetta  Crocetti
Ansia Ed Incertezza Identitaria In Adolescenza Elisabetta Crocetti
 
Resume ellucian-vishal matta
Resume ellucian-vishal mattaResume ellucian-vishal matta
Resume ellucian-vishal matta
 
Assertiveness
AssertivenessAssertiveness
Assertiveness
 
Esercizio modulo2 strategie_fronteggiamento_1
Esercizio modulo2 strategie_fronteggiamento_1Esercizio modulo2 strategie_fronteggiamento_1
Esercizio modulo2 strategie_fronteggiamento_1
 
Competenze trasversali nella gestione del rischio
Competenze trasversali nella gestione del rischioCompetenze trasversali nella gestione del rischio
Competenze trasversali nella gestione del rischio
 
Uso di alcol e consumi a rischio
Uso di alcol e consumi a rischioUso di alcol e consumi a rischio
Uso di alcol e consumi a rischio
 

Similar to Encryption

CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
Kathirvel Ayyaswamy
 
CNS ppt.pdf
CNS ppt.pdfCNS ppt.pdf
CNS ppt.pdf
ChaitanyaK65
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
Kathirvel Ayyaswamy
 
cryptographydiksha.pptx
cryptographydiksha.pptxcryptographydiksha.pptx
cryptographydiksha.pptx
DIKSHABORKAR8
 
Seminar on ECommerce
Seminar on ECommerce Seminar on ECommerce
Seminar on ECommerce
STS
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
Online
 
ssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptx
jithu26327
 
Module 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptxModule 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptx
AliMohamed855266
 
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdfSECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
NiharikaDubey17
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
sravya raju
 
ch22.ppt
ch22.pptch22.ppt
ch22.ppt
ImXaib
 
SecureSocketLayer.ppt
SecureSocketLayer.pptSecureSocketLayer.ppt
SecureSocketLayer.ppt
PranavUndre1
 
Lesson 2
Lesson 2Lesson 2
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Sachintha Gunasena
 

Similar to Encryption (20)

Unit08
Unit08Unit08
Unit08
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
 
CNS ppt.pdf
CNS ppt.pdfCNS ppt.pdf
CNS ppt.pdf
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
 
cryptographydiksha.pptx
cryptographydiksha.pptxcryptographydiksha.pptx
cryptographydiksha.pptx
 
Seminar on ECommerce
Seminar on ECommerce Seminar on ECommerce
Seminar on ECommerce
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
E mail security
E   mail securityE   mail security
E mail security
 
ssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptx
 
Module 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptxModule 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptx
 
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdfSECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
ch22.ppt
ch22.pptch22.ppt
ch22.ppt
 
Info security & crypto
Info security & cryptoInfo security & crypto
Info security & crypto
 
SecureSocketLayer.ppt
SecureSocketLayer.pptSecureSocketLayer.ppt
SecureSocketLayer.ppt
 
Secure socket later
Secure socket laterSecure socket later
Secure socket later
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 

Recently uploaded

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
amberjdewit93
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
christianmathematics
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 

Recently uploaded (20)

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 

Encryption

  • 2. SYMMETRIC KEY ENCRYPTION Also known as secret key encryption • Both the sender and receiver use the same digital key to encrypt and decrypt message • Requires a different set of keys for each transaction • Advanced Encryption Standard (AES): – Most widely used symmetric key encryption today; offers 128-, 192-, and 256-bit encryption keys; other standards use keys with up to 2,048 bits
  • 3. PUBLIC KEY ENCRYPTION Solves symmetric key encryption problem of having to exchange secret key • Uses two mathematically related digital keys – public key (widely disseminated) and private key (kept secret by owner) • Both keys used to encrypt and decrypt message • Once key used to encrypt message, same key cannot be used to decrypt message • For example, sender uses recipient’s public key to encrypt message; recipient uses his/her private key to decrypt it
  • 4. PUBLIC KEY CRYPTOGRAPHY – A SIMPLE CASE
  • 5. PUBLIC KEY ENCRYPTION USING DIGITAL SIGNATURES AND HASH DIGESTS • Application of hash function (mathematical algorithm) by sender prior to encryption produces hash digest that recipient can use to verify integrity of data • Double encryption with sender’s private key (digital signature) helps ensure authenticity and nonrepudiation
  • 6. LIMITS TO ENCRYPTION SOLUTIONS • PKI applies mainly to protecting messages in transit • PKI is not effective against insiders • Protection of private keys by individuals may be haphazard • No guarantee that verifying computer of merchant is secure • CAs are unregulated, self-selecting organizations
  • 7. SECURING CHANNELS OF COMMUNICATION Secure Sockets Layer (SSL): – Most common form of securing channels of communication; used to establish a secure negotiated session (client-server session in which URL of requested document, along with contents, is encrypted) • S-HTTP: – Alternative method; provides a secure message-oriented communications protocol designed for use in conjunction with HTTP • Virtual Private Networks (VPNs): – Allow remote users to securely access internal networks via the Internet, using Point-to-Point Tunneling Protocol (PPTP)
  • 9. PROTECTING NETWORKS: FIREWALLS AND PROXY SERVERS • Firewall: Hardware or software filters communications packets; prevents some packets from entering the network based on a security policy • Firewall methods include: – Packet filters – Application gateways • Proxy servers: Software servers that handle all communications originating from or being sent to the Internet
  • 11. PROTECTING SERVERS AND CLIENTS Operating system controls: Authentication and access control mechanisms • Anti-virus software: Easiest and least expensive way to prevent threats to system integrity
  • 12. POLICIES, PROCEDURES & LAW: DEVELOPING AN E-COMMERCE SECURITY PLAN