SlideShare uma empresa Scribd logo
1 de 12
Zeeshan Khalid
ENCRYPTION
SYMMETRIC KEY ENCRYPTION
Also known as secret key encryption
• Both the sender and receiver use the same
digital key to encrypt and decrypt message
• Requires a different set of keys for each
transaction
• Advanced Encryption Standard (AES):
– Most widely used symmetric key encryption
today; offers 128-, 192-, and 256-bit encryption
keys; other standards use keys with up to 2,048
bits
PUBLIC KEY ENCRYPTION
Solves symmetric key encryption problem of having to exchange
secret key
• Uses two mathematically related digital keys – public key (widely
disseminated) and private key (kept secret by owner)
• Both keys used to encrypt and decrypt message
• Once key used to encrypt message, same key cannot be used to
decrypt message
• For example, sender uses recipient’s public key to encrypt
message;
recipient uses his/her private key to decrypt it
PUBLIC KEY CRYPTOGRAPHY – A SIMPLE CASE
PUBLIC KEY ENCRYPTION USING
DIGITAL SIGNATURES AND HASH DIGESTS
• Application of hash function (mathematical
algorithm) by sender prior to encryption
produces hash digest that recipient can use
to verify integrity of data
• Double encryption with sender’s private key
(digital signature) helps ensure authenticity
and nonrepudiation
LIMITS TO ENCRYPTION SOLUTIONS
• PKI applies mainly to protecting messages in
transit
• PKI is not effective against insiders
• Protection of private keys by individuals may
be haphazard
• No guarantee that verifying computer of
merchant is secure
• CAs are unregulated, self-selecting
organizations
SECURING CHANNELS OF COMMUNICATION
Secure Sockets Layer (SSL):
– Most common form of securing channels of
communication; used to
establish a secure negotiated session (client-server session
in which URL of requested document, along with
contents, is encrypted)
• S-HTTP:
– Alternative method; provides a secure message-oriented
communications protocol designed for use in conjunction
with HTTP
• Virtual Private Networks (VPNs):
– Allow remote users to securely access internal networks
via the Internet, using Point-to-Point Tunneling Protocol
(PPTP)
SECURE NEGOTIATED SESSIONS USING SSL
PROTECTING NETWORKS: FIREWALLS AND
PROXY SERVERS
• Firewall: Hardware or software filters
communications packets; prevents some
packets from entering the network based on a
security policy
• Firewall methods include:
– Packet filters
– Application gateways
• Proxy servers: Software servers that handle all
communications originating from or being sent
to the Internet
FIREWALLS AND PROXY SERVERS
PROTECTING SERVERS AND CLIENTS
Operating system controls: Authentication and
access control mechanisms
• Anti-virus software: Easiest and least
expensive way to prevent threats to system
integrity
POLICIES, PROCEDURES & LAW:
DEVELOPING AN E-COMMERCE SECURITY PLAN

Mais conteúdo relacionado

Mais procurados

Incident response, Hacker Techniques and Countermeasures
Incident response, Hacker Techniques and CountermeasuresIncident response, Hacker Techniques and Countermeasures
Incident response, Hacker Techniques and CountermeasuresJose L. Quiñones-Borrero
 
B.Rosenblatt presentation of LCP, epub summit
B.Rosenblatt presentation of LCP, epub summitB.Rosenblatt presentation of LCP, epub summit
B.Rosenblatt presentation of LCP, epub summitLaurent Le Meur
 
CNIT 141: 13. TLS
CNIT 141: 13. TLSCNIT 141: 13. TLS
CNIT 141: 13. TLSSam Bowne
 
Using advanced security and data-protection features
Using advanced security and data-protection featuresUsing advanced security and data-protection features
Using advanced security and data-protection featuresMariaDB plc
 
Overview of NSA Security Enhanced Linux - FOSS.IN/2005
Overview of NSA Security Enhanced Linux - FOSS.IN/2005Overview of NSA Security Enhanced Linux - FOSS.IN/2005
Overview of NSA Security Enhanced Linux - FOSS.IN/2005James Morris
 
CNIT 123 12: Cryptography
CNIT 123 12: CryptographyCNIT 123 12: Cryptography
CNIT 123 12: CryptographySam Bowne
 
Open ssl heart bleed weakness.
Open ssl heart bleed weakness.Open ssl heart bleed weakness.
Open ssl heart bleed weakness.Khaled Mosharraf
 
Encryption & decryption of sound presentation
Encryption & decryption of sound presentationEncryption & decryption of sound presentation
Encryption & decryption of sound presentationMuhammad Saif Ul Islam
 
Protect Association event 20th Jan 2017
Protect Association event 20th Jan 2017Protect Association event 20th Jan 2017
Protect Association event 20th Jan 2017Steve Devine
 
Introduction to Cryptography Training – Level 1
Introduction to Cryptography Training – Level 1Introduction to Cryptography Training – Level 1
Introduction to Cryptography Training – Level 1Bryan Len
 
HMAC a signature alternative
HMAC a signature alternativeHMAC a signature alternative
HMAC a signature alternativeHubert Gregoire
 
Echoworx Encryption Delivery Methods
Echoworx Encryption Delivery MethodsEchoworx Encryption Delivery Methods
Echoworx Encryption Delivery MethodsEchoworx
 
APIdays Barcelona 2019 - Introduction to Onion Services to secure APIs with P...
APIdays Barcelona 2019 - Introduction to Onion Services to secure APIs with P...APIdays Barcelona 2019 - Introduction to Onion Services to secure APIs with P...
APIdays Barcelona 2019 - Introduction to Onion Services to secure APIs with P...apidays
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesSam Bowne
 
CNIT 123: 6: Enumeration
CNIT 123: 6: EnumerationCNIT 123: 6: Enumeration
CNIT 123: 6: EnumerationSam Bowne
 
Solving Document Security
Solving Document SecuritySolving Document Security
Solving Document SecurityZia Consulting
 
Cryptography101
Cryptography101Cryptography101
Cryptography101NCC Group
 

Mais procurados (20)

Incident response, Hacker Techniques and Countermeasures
Incident response, Hacker Techniques and CountermeasuresIncident response, Hacker Techniques and Countermeasures
Incident response, Hacker Techniques and Countermeasures
 
B.Rosenblatt presentation of LCP, epub summit
B.Rosenblatt presentation of LCP, epub summitB.Rosenblatt presentation of LCP, epub summit
B.Rosenblatt presentation of LCP, epub summit
 
Sw2 b12
Sw2 b12Sw2 b12
Sw2 b12
 
Firewall
FirewallFirewall
Firewall
 
Network security
Network securityNetwork security
Network security
 
CNIT 141: 13. TLS
CNIT 141: 13. TLSCNIT 141: 13. TLS
CNIT 141: 13. TLS
 
Using advanced security and data-protection features
Using advanced security and data-protection featuresUsing advanced security and data-protection features
Using advanced security and data-protection features
 
Overview of NSA Security Enhanced Linux - FOSS.IN/2005
Overview of NSA Security Enhanced Linux - FOSS.IN/2005Overview of NSA Security Enhanced Linux - FOSS.IN/2005
Overview of NSA Security Enhanced Linux - FOSS.IN/2005
 
CNIT 123 12: Cryptography
CNIT 123 12: CryptographyCNIT 123 12: Cryptography
CNIT 123 12: Cryptography
 
Open ssl heart bleed weakness.
Open ssl heart bleed weakness.Open ssl heart bleed weakness.
Open ssl heart bleed weakness.
 
Encryption & decryption of sound presentation
Encryption & decryption of sound presentationEncryption & decryption of sound presentation
Encryption & decryption of sound presentation
 
Protect Association event 20th Jan 2017
Protect Association event 20th Jan 2017Protect Association event 20th Jan 2017
Protect Association event 20th Jan 2017
 
Introduction to Cryptography Training – Level 1
Introduction to Cryptography Training – Level 1Introduction to Cryptography Training – Level 1
Introduction to Cryptography Training – Level 1
 
HMAC a signature alternative
HMAC a signature alternativeHMAC a signature alternative
HMAC a signature alternative
 
Echoworx Encryption Delivery Methods
Echoworx Encryption Delivery MethodsEchoworx Encryption Delivery Methods
Echoworx Encryption Delivery Methods
 
APIdays Barcelona 2019 - Introduction to Onion Services to secure APIs with P...
APIdays Barcelona 2019 - Introduction to Onion Services to secure APIs with P...APIdays Barcelona 2019 - Introduction to Onion Services to secure APIs with P...
APIdays Barcelona 2019 - Introduction to Onion Services to secure APIs with P...
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
 
CNIT 123: 6: Enumeration
CNIT 123: 6: EnumerationCNIT 123: 6: Enumeration
CNIT 123: 6: Enumeration
 
Solving Document Security
Solving Document SecuritySolving Document Security
Solving Document Security
 
Cryptography101
Cryptography101Cryptography101
Cryptography101
 

Destaque

Depliant Consapevolezza Dell Essere Apr09
Depliant Consapevolezza Dell Essere Apr09Depliant Consapevolezza Dell Essere Apr09
Depliant Consapevolezza Dell Essere Apr09fryttaj
 
Serfor: Bosques productivos para la vida
Serfor: Bosques productivos para la vidaSerfor: Bosques productivos para la vida
Serfor: Bosques productivos para la vidaSerfor Perú
 
CAVE Language Presentation for AI Camp
CAVE Language Presentation for AI CampCAVE Language Presentation for AI Camp
CAVE Language Presentation for AI CampLoren Davie
 
2016 and 2017 IEEE For MTech @ TMKS Infotech
2016 and 2017 IEEE For MTech @ TMKS Infotech2016 and 2017 IEEE For MTech @ TMKS Infotech
2016 and 2017 IEEE For MTech @ TMKS InfotechManju Nath
 
Project acp composites gold
Project acp composites goldProject acp composites gold
Project acp composites goldVINK BVBA
 
2016 and 2017 Networking Projects @ TMKS Infotech
2016 and 2017 Networking Projects @ TMKS Infotech2016 and 2017 Networking Projects @ TMKS Infotech
2016 and 2017 Networking Projects @ TMKS InfotechManju Nath
 
Estrategiasdepublicidadypromocin
Estrategiasdepublicidadypromocin Estrategiasdepublicidadypromocin
Estrategiasdepublicidadypromocin R L Polk
 
Displasia De Cadera Del Adulto. Clinica Universidad De Navarra
Displasia De Cadera Del Adulto. Clinica Universidad De Navarra
Displasia De Cadera Del Adulto. Clinica Universidad De Navarra
Displasia De Cadera Del Adulto. Clinica Universidad De Navarra redundantdungeo0
 
L’azzardo non e’ un gioco
L’azzardo non e’ un giocoL’azzardo non e’ un gioco
L’azzardo non e’ un giocoDina Malgieri
 
Ansia Ed Incertezza Identitaria In Adolescenza Elisabetta Crocetti
Ansia Ed  Incertezza Identitaria In  Adolescenza  Elisabetta  CrocettiAnsia Ed  Incertezza Identitaria In  Adolescenza  Elisabetta  Crocetti
Ansia Ed Incertezza Identitaria In Adolescenza Elisabetta CrocettiEllepi Associati Ancona
 
Resume ellucian-vishal matta
Resume ellucian-vishal mattaResume ellucian-vishal matta
Resume ellucian-vishal mattaVishal Matta
 
Assertiveness
AssertivenessAssertiveness
Assertivenessivaturi69
 
Esercizio modulo2 strategie_fronteggiamento_1
Esercizio modulo2 strategie_fronteggiamento_1Esercizio modulo2 strategie_fronteggiamento_1
Esercizio modulo2 strategie_fronteggiamento_1Luoghi di Prevenzione
 
Competenze trasversali nella gestione del rischio
Competenze trasversali nella gestione del rischioCompetenze trasversali nella gestione del rischio
Competenze trasversali nella gestione del rischioLuoghi di Prevenzione
 

Destaque (20)

Depliant Consapevolezza Dell Essere Apr09
Depliant Consapevolezza Dell Essere Apr09Depliant Consapevolezza Dell Essere Apr09
Depliant Consapevolezza Dell Essere Apr09
 
Serfor: Bosques productivos para la vida
Serfor: Bosques productivos para la vidaSerfor: Bosques productivos para la vida
Serfor: Bosques productivos para la vida
 
CAVE Language Presentation for AI Camp
CAVE Language Presentation for AI CampCAVE Language Presentation for AI Camp
CAVE Language Presentation for AI Camp
 
2016 and 2017 IEEE For MTech @ TMKS Infotech
2016 and 2017 IEEE For MTech @ TMKS Infotech2016 and 2017 IEEE For MTech @ TMKS Infotech
2016 and 2017 IEEE For MTech @ TMKS Infotech
 
Project acp composites gold
Project acp composites goldProject acp composites gold
Project acp composites gold
 
図面1.htm
図面1.htm図面1.htm
図面1.htm
 
2016 and 2017 Networking Projects @ TMKS Infotech
2016 and 2017 Networking Projects @ TMKS Infotech2016 and 2017 Networking Projects @ TMKS Infotech
2016 and 2017 Networking Projects @ TMKS Infotech
 
Estrategiasdepublicidadypromocin
Estrategiasdepublicidadypromocin Estrategiasdepublicidadypromocin
Estrategiasdepublicidadypromocin
 
Displasia De Cadera Del Adulto. Clinica Universidad De Navarra
Displasia De Cadera Del Adulto. Clinica Universidad De Navarra
Displasia De Cadera Del Adulto. Clinica Universidad De Navarra
Displasia De Cadera Del Adulto. Clinica Universidad De Navarra
 
Hardware concepts
Hardware conceptsHardware concepts
Hardware concepts
 
Identità personale
Identità personaleIdentità personale
Identità personale
 
Drunkoressia
Drunkoressia Drunkoressia
Drunkoressia
 
L’azzardo non e’ un gioco
L’azzardo non e’ un giocoL’azzardo non e’ un gioco
L’azzardo non e’ un gioco
 
Modulo3a ruolo operatori_parte 4
Modulo3a ruolo operatori_parte 4Modulo3a ruolo operatori_parte 4
Modulo3a ruolo operatori_parte 4
 
Ansia Ed Incertezza Identitaria In Adolescenza Elisabetta Crocetti
Ansia Ed  Incertezza Identitaria In  Adolescenza  Elisabetta  CrocettiAnsia Ed  Incertezza Identitaria In  Adolescenza  Elisabetta  Crocetti
Ansia Ed Incertezza Identitaria In Adolescenza Elisabetta Crocetti
 
Resume ellucian-vishal matta
Resume ellucian-vishal mattaResume ellucian-vishal matta
Resume ellucian-vishal matta
 
Assertiveness
AssertivenessAssertiveness
Assertiveness
 
Esercizio modulo2 strategie_fronteggiamento_1
Esercizio modulo2 strategie_fronteggiamento_1Esercizio modulo2 strategie_fronteggiamento_1
Esercizio modulo2 strategie_fronteggiamento_1
 
Competenze trasversali nella gestione del rischio
Competenze trasversali nella gestione del rischioCompetenze trasversali nella gestione del rischio
Competenze trasversali nella gestione del rischio
 
Uso di alcol e consumi a rischio
Uso di alcol e consumi a rischioUso di alcol e consumi a rischio
Uso di alcol e consumi a rischio
 

Semelhante a Encryption

CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
cryptographydiksha.pptx
cryptographydiksha.pptxcryptographydiksha.pptx
cryptographydiksha.pptxDIKSHABORKAR8
 
Seminar on ECommerce
Seminar on ECommerce Seminar on ECommerce
Seminar on ECommerce STS
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocolsOnline
 
ssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxjithu26327
 
Module 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptxModule 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptxAliMohamed855266
 
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdfSECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdfNiharikaDubey17
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell pptsravya raju
 
ch22.ppt
ch22.pptch22.ppt
ch22.pptImXaib
 
SecureSocketLayer.ppt
SecureSocketLayer.pptSecureSocketLayer.ppt
SecureSocketLayer.pptPranavUndre1
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionSachintha Gunasena
 

Semelhante a Encryption (20)

Unit08
Unit08Unit08
Unit08
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
 
CNS ppt.pdf
CNS ppt.pdfCNS ppt.pdf
CNS ppt.pdf
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
 
cryptographydiksha.pptx
cryptographydiksha.pptxcryptographydiksha.pptx
cryptographydiksha.pptx
 
Seminar on ECommerce
Seminar on ECommerce Seminar on ECommerce
Seminar on ECommerce
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
E mail security
E   mail securityE   mail security
E mail security
 
ssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptx
 
Module 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptxModule 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptx
 
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdfSECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
ch22.ppt
ch22.pptch22.ppt
ch22.ppt
 
Info security & crypto
Info security & cryptoInfo security & crypto
Info security & crypto
 
SecureSocketLayer.ppt
SecureSocketLayer.pptSecureSocketLayer.ppt
SecureSocketLayer.ppt
 
Secure socket later
Secure socket laterSecure socket later
Secure socket later
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 

Último

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 

Último (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

Encryption

  • 2. SYMMETRIC KEY ENCRYPTION Also known as secret key encryption • Both the sender and receiver use the same digital key to encrypt and decrypt message • Requires a different set of keys for each transaction • Advanced Encryption Standard (AES): – Most widely used symmetric key encryption today; offers 128-, 192-, and 256-bit encryption keys; other standards use keys with up to 2,048 bits
  • 3. PUBLIC KEY ENCRYPTION Solves symmetric key encryption problem of having to exchange secret key • Uses two mathematically related digital keys – public key (widely disseminated) and private key (kept secret by owner) • Both keys used to encrypt and decrypt message • Once key used to encrypt message, same key cannot be used to decrypt message • For example, sender uses recipient’s public key to encrypt message; recipient uses his/her private key to decrypt it
  • 4. PUBLIC KEY CRYPTOGRAPHY – A SIMPLE CASE
  • 5. PUBLIC KEY ENCRYPTION USING DIGITAL SIGNATURES AND HASH DIGESTS • Application of hash function (mathematical algorithm) by sender prior to encryption produces hash digest that recipient can use to verify integrity of data • Double encryption with sender’s private key (digital signature) helps ensure authenticity and nonrepudiation
  • 6. LIMITS TO ENCRYPTION SOLUTIONS • PKI applies mainly to protecting messages in transit • PKI is not effective against insiders • Protection of private keys by individuals may be haphazard • No guarantee that verifying computer of merchant is secure • CAs are unregulated, self-selecting organizations
  • 7. SECURING CHANNELS OF COMMUNICATION Secure Sockets Layer (SSL): – Most common form of securing channels of communication; used to establish a secure negotiated session (client-server session in which URL of requested document, along with contents, is encrypted) • S-HTTP: – Alternative method; provides a secure message-oriented communications protocol designed for use in conjunction with HTTP • Virtual Private Networks (VPNs): – Allow remote users to securely access internal networks via the Internet, using Point-to-Point Tunneling Protocol (PPTP)
  • 9. PROTECTING NETWORKS: FIREWALLS AND PROXY SERVERS • Firewall: Hardware or software filters communications packets; prevents some packets from entering the network based on a security policy • Firewall methods include: – Packet filters – Application gateways • Proxy servers: Software servers that handle all communications originating from or being sent to the Internet
  • 11. PROTECTING SERVERS AND CLIENTS Operating system controls: Authentication and access control mechanisms • Anti-virus software: Easiest and least expensive way to prevent threats to system integrity
  • 12. POLICIES, PROCEDURES & LAW: DEVELOPING AN E-COMMERCE SECURITY PLAN