SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
Security Overview
 Cryptography functions
   Secret key (e.g., DES)
   Public key (e.g., RSA)
   Message digest (e.g., MD5)
 Security services
   Privacy: preventing unauthorized release of information
   Authentication: verifying identity of the remote participant
   Integrity: making sure message has not been altered
                                            Security


                     Cryptography                               Security
                      algorithms                                services


          Secret        Public        Message      Privacy   Authentication   Message
           key           key            digest                                integrity
       (e.g., DES)   (e.g., RSA)    (e.g., MD5)




Secret Key (DES)


      Plaintext                                                            Plaintext


    Encrypt with                                                     Decrypt with
     secret key                                                       secret key
                                        Ciphertext
Public Key (RSA)
         Plaintext                         Plaintext


       Encrypt with                      Decrypt with
        public key                        private key
                           Ciphertext



 Encryption & Decryption
                      c = memod n
                      m = cdmod n




Message Digest
  Cryptographic checksum
     just as a regular checksum protects the receiver from
     accidental changes to the message, a cryptographic
     checksum protects the receiver from malicious
     changes to the message.
  One-way function
    given a cryptographic checksum for a message, it is
    virtually impossible to figure out what message
    produced that checksum; it is not computationally
    feasible to find two messages that hash to the same
    cryptographic checksum.
  Relevance
     if you are given a checksum for a message and you
     are able to compute exactly the same checksum for
     that message, then it is highly likely this message
     produced the checksum you were given.
Public key authentication
                A                          B

                         E(x ,
                               Publ
                                   ic )
                                    B

                             x




Key Distribution
 Certificate
   special type of digitally signed document:
      “I certify that the public key in this document belongs to
         the entity named in this document, signed X.”
   the name of the entity being certified
   the public key of the entity
   the name of the certified authority
   a digital signature
 Certified Authority (CA)
   administrative entity that issues certificates
   useful only to someone that already holds the CA’s
   public key.

Mais conteúdo relacionado

Mais procurados

Seamless Guest Experience with Kafka Streams (Ramaraju Indukurir and Himani A...
Seamless Guest Experience with Kafka Streams (Ramaraju Indukurir and Himani A...Seamless Guest Experience with Kafka Streams (Ramaraju Indukurir and Himani A...
Seamless Guest Experience with Kafka Streams (Ramaraju Indukurir and Himani A...confluent
 
MongoDB World 2019: Using Client Side Encryption in MongoDB 4.2 Link
MongoDB World 2019: Using Client Side Encryption in MongoDB 4.2 LinkMongoDB World 2019: Using Client Side Encryption in MongoDB 4.2 Link
MongoDB World 2019: Using Client Side Encryption in MongoDB 4.2 LinkMongoDB
 
Cryptography Presentation
Cryptography PresentationCryptography Presentation
Cryptography PresentationDonte Francis
 
Cryptography For The Average Developer
Cryptography For The Average DeveloperCryptography For The Average Developer
Cryptography For The Average DeveloperAnthony Ferrara
 
Thotcon 2019 - When Strong Encryption Isn't
Thotcon 2019 - When Strong Encryption Isn'tThotcon 2019 - When Strong Encryption Isn't
Thotcon 2019 - When Strong Encryption Isn'tsifukurt
 
solutions.hamburg | web3 // smart contracts // ethereum
solutions.hamburg | web3 // smart contracts // ethereumsolutions.hamburg | web3 // smart contracts // ethereum
solutions.hamburg | web3 // smart contracts // ethereumMaximilian Reichel
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key CryptosystemDevakumar Kp
 
Quantum Computing & Cryptography: A Brief Introduction
Quantum Computing & Cryptography: A Brief IntroductionQuantum Computing & Cryptography: A Brief Introduction
Quantum Computing & Cryptography: A Brief IntroductionHedera Hashgraph
 
MongoDB .local Chicago 2019: Using Client Side Encryption in MongoDB 4.2
MongoDB .local Chicago 2019: Using Client Side Encryption in MongoDB 4.2MongoDB .local Chicago 2019: Using Client Side Encryption in MongoDB 4.2
MongoDB .local Chicago 2019: Using Client Side Encryption in MongoDB 4.2MongoDB
 

Mais procurados (14)

Seamless Guest Experience with Kafka Streams (Ramaraju Indukurir and Himani A...
Seamless Guest Experience with Kafka Streams (Ramaraju Indukurir and Himani A...Seamless Guest Experience with Kafka Streams (Ramaraju Indukurir and Himani A...
Seamless Guest Experience with Kafka Streams (Ramaraju Indukurir and Himani A...
 
Stallings Kurose and Ross
Stallings Kurose and RossStallings Kurose and Ross
Stallings Kurose and Ross
 
Json Web Token - JWT
Json Web Token - JWTJson Web Token - JWT
Json Web Token - JWT
 
Ethereum Intro
Ethereum IntroEthereum Intro
Ethereum Intro
 
Network Security
Network SecurityNetwork Security
Network Security
 
MongoDB World 2019: Using Client Side Encryption in MongoDB 4.2 Link
MongoDB World 2019: Using Client Side Encryption in MongoDB 4.2 LinkMongoDB World 2019: Using Client Side Encryption in MongoDB 4.2 Link
MongoDB World 2019: Using Client Side Encryption in MongoDB 4.2 Link
 
Cryptography Presentation
Cryptography PresentationCryptography Presentation
Cryptography Presentation
 
Cryptography For The Average Developer
Cryptography For The Average DeveloperCryptography For The Average Developer
Cryptography For The Average Developer
 
Thotcon 2019 - When Strong Encryption Isn't
Thotcon 2019 - When Strong Encryption Isn'tThotcon 2019 - When Strong Encryption Isn't
Thotcon 2019 - When Strong Encryption Isn't
 
solutions.hamburg | web3 // smart contracts // ethereum
solutions.hamburg | web3 // smart contracts // ethereumsolutions.hamburg | web3 // smart contracts // ethereum
solutions.hamburg | web3 // smart contracts // ethereum
 
Id32
Id32Id32
Id32
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Quantum Computing & Cryptography: A Brief Introduction
Quantum Computing & Cryptography: A Brief IntroductionQuantum Computing & Cryptography: A Brief Introduction
Quantum Computing & Cryptography: A Brief Introduction
 
MongoDB .local Chicago 2019: Using Client Side Encryption in MongoDB 4.2
MongoDB .local Chicago 2019: Using Client Side Encryption in MongoDB 4.2MongoDB .local Chicago 2019: Using Client Side Encryption in MongoDB 4.2
MongoDB .local Chicago 2019: Using Client Side Encryption in MongoDB 4.2
 

Destaque

Lean Start-up Business Tactics Seminar - Who Owns Your Company?
Lean Start-up Business Tactics Seminar - Who Owns Your Company?Lean Start-up Business Tactics Seminar - Who Owns Your Company?
Lean Start-up Business Tactics Seminar - Who Owns Your Company?UNHInnovation
 
Cutting a cavetto mould
Cutting a cavetto mouldCutting a cavetto mould
Cutting a cavetto moulddoogstone
 
Edmodo chavis
Edmodo chavisEdmodo chavis
Edmodo chavistlhenley
 
Implementation training updated 9.27.13
Implementation training updated 9.27.13Implementation training updated 9.27.13
Implementation training updated 9.27.13progroup
 
Specific campaign
Specific campaignSpecific campaign
Specific campaignCentrecom
 
Four Ways to Leverage Social Media in Your Marketing
Four Ways to Leverage Social Media in Your MarketingFour Ways to Leverage Social Media in Your Marketing
Four Ways to Leverage Social Media in Your MarketingJocelyn Murray
 
Finding Mrs Simon Storyboard
Finding Mrs Simon StoryboardFinding Mrs Simon Storyboard
Finding Mrs Simon StoryboardAmyLongworth
 
Boosting innovation through collaborative online ideations
Boosting innovation through collaborative online ideationsBoosting innovation through collaborative online ideations
Boosting innovation through collaborative online ideationsFrank Hatzack
 
положение сердце отдаю детям (1)
положение сердце отдаю детям (1)положение сердце отдаю детям (1)
положение сердце отдаю детям (1)Valentina Lambertova
 
2016 April Announcements
2016 April Announcements2016 April Announcements
2016 April AnnouncementsWayne Irwin
 
Статья журнал Фотоника - Аддитивные технологии Часть 1. - Металл
Статья журнал Фотоника - Аддитивные технологии Часть 1. - МеталлСтатья журнал Фотоника - Аддитивные технологии Часть 1. - Металл
Статья журнал Фотоника - Аддитивные технологии Часть 1. - МеталлMaxim Makarov
 
Snecked rubble step by step angled
Snecked rubble step by step angledSnecked rubble step by step angled
Snecked rubble step by step angleddoogstone
 
Lean Start-up Business Tactics - Start-up Infrastructure on a Budget
Lean Start-up Business Tactics - Start-up Infrastructure on a BudgetLean Start-up Business Tactics - Start-up Infrastructure on a Budget
Lean Start-up Business Tactics - Start-up Infrastructure on a BudgetUNHInnovation
 

Destaque (20)

Lean Start-up Business Tactics Seminar - Who Owns Your Company?
Lean Start-up Business Tactics Seminar - Who Owns Your Company?Lean Start-up Business Tactics Seminar - Who Owns Your Company?
Lean Start-up Business Tactics Seminar - Who Owns Your Company?
 
Cutting a cavetto mould
Cutting a cavetto mouldCutting a cavetto mould
Cutting a cavetto mould
 
Edmodo chavis
Edmodo chavisEdmodo chavis
Edmodo chavis
 
Implementation training updated 9.27.13
Implementation training updated 9.27.13Implementation training updated 9.27.13
Implementation training updated 9.27.13
 
Lecture11 b
Lecture11 bLecture11 b
Lecture11 b
 
23 7242
23 724223 7242
23 7242
 
7 vi
7 vi7 vi
7 vi
 
Rmi
RmiRmi
Rmi
 
Specific campaign
Specific campaignSpecific campaign
Specific campaign
 
Uk Tribes
Uk TribesUk Tribes
Uk Tribes
 
Four Ways to Leverage Social Media in Your Marketing
Four Ways to Leverage Social Media in Your MarketingFour Ways to Leverage Social Media in Your Marketing
Four Ways to Leverage Social Media in Your Marketing
 
Finding Mrs Simon Storyboard
Finding Mrs Simon StoryboardFinding Mrs Simon Storyboard
Finding Mrs Simon Storyboard
 
Boosting innovation through collaborative online ideations
Boosting innovation through collaborative online ideationsBoosting innovation through collaborative online ideations
Boosting innovation through collaborative online ideations
 
Lecture10
Lecture10Lecture10
Lecture10
 
Hokkaido.pm.casual 22
Hokkaido.pm.casual 22Hokkaido.pm.casual 22
Hokkaido.pm.casual 22
 
положение сердце отдаю детям (1)
положение сердце отдаю детям (1)положение сердце отдаю детям (1)
положение сердце отдаю детям (1)
 
2016 April Announcements
2016 April Announcements2016 April Announcements
2016 April Announcements
 
Статья журнал Фотоника - Аддитивные технологии Часть 1. - Металл
Статья журнал Фотоника - Аддитивные технологии Часть 1. - МеталлСтатья журнал Фотоника - Аддитивные технологии Часть 1. - Металл
Статья журнал Фотоника - Аддитивные технологии Часть 1. - Металл
 
Snecked rubble step by step angled
Snecked rubble step by step angledSnecked rubble step by step angled
Snecked rubble step by step angled
 
Lean Start-up Business Tactics - Start-up Infrastructure on a Budget
Lean Start-up Business Tactics - Start-up Infrastructure on a BudgetLean Start-up Business Tactics - Start-up Infrastructure on a Budget
Lean Start-up Business Tactics - Start-up Infrastructure on a Budget
 

Semelhante a Security overview

Cryptography by gaurav singh
Cryptography by gaurav singhCryptography by gaurav singh
Cryptography by gaurav singhGaurav Singh
 
Cryptography /Sankar jayam
Cryptography /Sankar jayamCryptography /Sankar jayam
Cryptography /Sankar jayamtasankar14
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.pptPrabhat Kumar
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI TechnologySylvain Maret
 
Security via Java
Security via JavaSecurity via Java
Security via JavaBahaa Zaid
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography FundamentalsDuy Do Phan
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityNagendra Um
 
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSSURBHI SAROHA
 
Network Security: Standards and Cryptography
Network Security: Standards and CryptographyNetwork Security: Standards and Cryptography
Network Security: Standards and CryptographyJack Davis
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowBrijesh Vishwakarma
 

Semelhante a Security overview (20)

Cryptography by gaurav singh
Cryptography by gaurav singhCryptography by gaurav singh
Cryptography by gaurav singh
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography /Sankar jayam
Cryptography /Sankar jayamCryptography /Sankar jayam
Cryptography /Sankar jayam
 
Sankar jayam
Sankar jayamSankar jayam
Sankar jayam
 
Java Crypto
Java CryptoJava Crypto
Java Crypto
 
Cryptography
CryptographyCryptography
Cryptography
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.ppt
 
Network Security
Network SecurityNetwork Security
Network Security
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
1329 n 9460
1329 n 94601329 n 9460
1329 n 9460
 
Security via Java
Security via JavaSecurity via Java
Security via Java
 
Iss lecture 4
Iss lecture 4Iss lecture 4
Iss lecture 4
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
 
Cryptography
Cryptography Cryptography
Cryptography
 
Network Security: Standards and Cryptography
Network Security: Standards and CryptographyNetwork Security: Standards and Cryptography
Network Security: Standards and Cryptography
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
Cryptography
CryptographyCryptography
Cryptography
 
Crypt
CryptCrypt
Crypt
 

Mais de vantinhkhuc (20)

Url programming
Url programmingUrl programming
Url programming
 
Servlets intro
Servlets introServlets intro
Servlets intro
 
Servlet sessions
Servlet sessionsServlet sessions
Servlet sessions
 
Md5
Md5Md5
Md5
 
Lecture17
Lecture17Lecture17
Lecture17
 
Lecture9
Lecture9Lecture9
Lecture9
 
Lecture6
Lecture6Lecture6
Lecture6
 
Jsse
JsseJsse
Jsse
 
Jsf intro
Jsf introJsf intro
Jsf intro
 
Jsp examples
Jsp examplesJsp examples
Jsp examples
 
Jpa
JpaJpa
Jpa
 
Ejb examples
Ejb examplesEjb examples
Ejb examples
 
Corba
CorbaCorba
Corba
 
Ajax
AjaxAjax
Ajax
 
Ejb intro
Ejb introEjb intro
Ejb intro
 
Chc6b0c6a1ng 12
Chc6b0c6a1ng 12Chc6b0c6a1ng 12
Chc6b0c6a1ng 12
 
Ch06
Ch06Ch06
Ch06
 
Bai4
Bai4Bai4
Bai4
 
Ajas11 alok
Ajas11 alokAjas11 alok
Ajas11 alok
 
Java
JavaJava
Java
 

Security overview

  • 1. Security Overview Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy: preventing unauthorized release of information Authentication: verifying identity of the remote participant Integrity: making sure message has not been altered Security Cryptography Security algorithms services Secret Public Message Privacy Authentication Message key key digest integrity (e.g., DES) (e.g., RSA) (e.g., MD5) Secret Key (DES) Plaintext Plaintext Encrypt with Decrypt with secret key secret key Ciphertext
  • 2. Public Key (RSA) Plaintext Plaintext Encrypt with Decrypt with public key private key Ciphertext Encryption & Decryption c = memod n m = cdmod n Message Digest Cryptographic checksum just as a regular checksum protects the receiver from accidental changes to the message, a cryptographic checksum protects the receiver from malicious changes to the message. One-way function given a cryptographic checksum for a message, it is virtually impossible to figure out what message produced that checksum; it is not computationally feasible to find two messages that hash to the same cryptographic checksum. Relevance if you are given a checksum for a message and you are able to compute exactly the same checksum for that message, then it is highly likely this message produced the checksum you were given.
  • 3. Public key authentication A B E(x , Publ ic ) B x Key Distribution Certificate special type of digitally signed document: “I certify that the public key in this document belongs to the entity named in this document, signed X.” the name of the entity being certified the public key of the entity the name of the certified authority a digital signature Certified Authority (CA) administrative entity that issues certificates useful only to someone that already holds the CA’s public key.