Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Unit-III - E-Commerce and Its Application

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 90

E-Commerce and its Application

Unit-III
Network Security/Firewall
Network Security/ Firewall

1. Client Server Security


2. Firewalls and network Security
3. Data and message security
4. Encrypted documents and electronic
mail.
Introduction of Network Security/Firewalls
 In most common problem in network is Security, privacy,
authentication and anonymity.
 A security threat is defined as a circumstance, condition,
or event with the potential to cause economic hardship to
data or network resources in the form of destruction,
disclosure, modification of data, denial of service, and/or
fraud, waste, and abuse.
 The discussion of security concerns in electronic
commerce can be divided into two broad types.
 Client –Server security
 Data and transaction security
Introduction of Network Security/Firewalls
 Client –Server security uses various authorization
methods to make sure that only valid users and programs
have access to information resources such as databases.
 Access control mechanisms must be set up to ensure that
properly authenticated users are allowed access only to
those resources that they are entitled to use.
 Such mechanisms include password protection, encrypted
smart cards, biometrics, and firewalls.
 Data and transaction security ensures the privacy and
confidentiality in electronic messages and data packets,
including the authentication of remote users in network
transactions for activities such as on-line payments.
 Such mechanisms include data encryption using various
cryptographic methods.
Network Security/ Firewall

1. Client Server Security


1. Trust-based security
2. Security Through Obscurity
3. Password Schemes
4. Biometric Systems
Client-Server Network Security
 Client-server network security is one of the biggest
headaches system administrators face as they balance the
opposing goals of user maneuverability and easy access
and site security and confidentiality of local information.
 Network security on the Internet is a major concern for
commercial organizations, especially top management.
 Recently the internet has raised many new security
concerns. By connecting to the Internet, a local network
organization may be exposing itself to the entire
population on the Internet.
 The figure illustrates, an Internet connection effectively
breaches the physical security perimeter of the corporate
network and opens itself to access from other networks
comprising the public Internet.
Client-Server Network Security
 For many commercial operations, security will simply be
a matter of making sure that existing system features,
such as passwords and privileges.
 Hackers can use password guessing, password trapping,
security holes in programs, or common network access
procedures to impersonate users and thus pose a threat to
the server.
 Client server network security problems manifest
themselves in three ways.
 Physical security holes
 Software security holes
 Inconsistent usage hoels.
Client-Server Network Security
 For many commercial operations, security will simply be
a matter of making sure that existing system features,
such as passwords and privileges.
 Hackers can use password guessing, password trapping,
security holes in programs, or common network access
procedures to impersonate users and thus pose a threat to
the server.
 Client server network security problems manifest
themselves in three ways.
 Physical security holes
 Software security holes
 Inconsistent usage holes.
Client-Server Network Security
 Physical security holes result when individuals gain
unauthorized physical access to a computer. A good example
would be a public workstation room, where it would be easy for
a wandering hacker to reboot a machine into single user mode
and tamper with the files, if precautions are not taken.
 On the network, this is also a common problem, as hackers gain
access to network systems by guessing passwords of various users.
 Software security holes result when badly written program or
“privileged” software are “compromised” into doing things they
shouldn’t.
 The most famous example of this category is the “sendmail” hole,
which brought the Internet to its knees in 1988.
 A more recent problem was the “rlogin” hole in the IBM Rs-6000
workstations, which enabled a cracker to create a “root” shell or
supersuer access mode.
Client-Server Network Security
 This is the highest level of access possible and could be
used to delete the entire file system, or create a new account
or password file resulting in incalculable damage.
 Inconsistent usage hole result when a system
administrator assembles a combination of hardware and
software such that the system is seriously flawed from a
security point of view.
 The incompatibility of attempting two unconnected but
useful things creates the security hole. Problems like this are
difficult to isolate once a system is set up and running, so it
is better to carefully build the system with them in mind
 This type of problem is becoming common as software
becomes more complex.
Client-Server Network Security
 To reduce these security threats, various protection
methods are used.
 At the file level, operating systems typically offer
mechanisms such as access control lists that specify the
resources various users and groups are entitled to access.
 Protection- also called authorization or access control-
grants privileges to the system or resource by checking
user-specific information such as passwords.
 The problem in the case of e-commerce is very simple: if
consumers connect a computer to the Internet, they can
easily log into it from anywhere that the network reaches.
That’s the good news. The bad news is that without
proper access control, anyone else can too.
Client-Server Network Security
 Trust-based Security
 It means to trust everyone and do nothing extra for
protection.
 It is possible not to provide access restrictions of any
kind and to assume that all users are trustworthy and
component in their use of the shared network.
 This approach worked in the past, today this is no
longer the case.
Client-Server Network Security
 Security Through Obscurity (STO)
 Any network can be secure as long as nobody outside its
management group is allowed to find out anything about
its operational details and users are provided information
on a need-to-know basis.
 Hiding account passwords in binary files or scripts with
the presumption that “nobody will ever find them” is a
prime case of STO. (Somewhat like hiding the house key
under the doormat and telling only family and friends)
 In short, STO provides a false sense of security in
computing systems by hiding information.
 This method was quite successful with stand-alone
systems that run operating systems such as IBM MVS or
CMS and DEC VAX.
Client-Server Network Security
 Password Scheme.
 One Straightforward security solution, a password scheme.
 Password Schemes do little about deliberate attack, especially
when common words or proper names are selected as
passwords.
 This simplest method used by most hackers is dictionary
comparison-comparing a list of encrypted user passwords
against a dictionary of encrypted common words.
 This scheme often works because users tend to choose
relatively simple or familiar words as passwords.
 To beat the dictionary comparison method, experts often
recommended using a minimum of eight-characters length
mixed-case passwords containing at least one non-
alphanumeric character and changing passwords every 60 to
90 days.
Client-Server Network Security
 Password Scheme.
 Even so, because passwords in a remote log-in session
usually pass over the network in unencrypted form, any
eavesdropper on the network means can simply record the
password any time it is used.
 Having distinct passwords for distinct devices is sometimes
a problem, because people will write them down, share them
or include them in automatic scripts.
 To counter these threats, various approaches have been
suggested for creating one-time passwords, including smart
cards, randomized tokens, and challenge-response schemes.
 Some devices generate a visually displayed token that can be
entered as a one-time password, and other provide direct
electronic input. These devices typically symmetric
algorithm and asymmetric algorithm.
Client-Server Network Security
 Biometric System.
 Biometric system, the most secure level of authorization,
involve some unique aspect of a person’s body.
 Past biometric authentification was based on comparisons
of fingerprints, palm prints, retinal patterns, or on
signature verification or voice recognition.
 Biometric systems are very expensive to implement:
many biometric devices also carry a high price in terms
of inconvenience; for example, some systems take 10 to
30 seconds to verify an access request.
 Moreover users see such systems as unduly intrusive;
people are reluctant to stick a finger or a hand into a slot,
or sign their name, or sit still while an optical systems
scans their eyeball.
Network Security/ Firewall

2. Firewalls and Network Security


1. Firewall in Practice
2. IP packet Screening Routers
3. Proxy Application Gateways
4. Hardened Firewall Hosts
5. Security Policies and Firewall
Management.
Firewalls and Network Security
 The most commonly accepted network protection is a
barrier-a firewall-between the corporate network and
the outside world (un trusted network).
 The term firewall can mean many things to many
people, but basically it is a method of placing a
device-a computer or a router-between the network
and the Internet to control and monitor all traffic
between the outside world and the local network.
 Typically, the device allows insiders to have full
access to services on the outside while granting
access from the outside only selectively, based on
long-on name, password, IP address or other
identifiers. (see the figure).
Firewalls and Network Security
Firewalls and Network Security
 Firewall is a protection device to shield vulnerable
areas from some form of danger.
 In the context of Internet, a firewall is a system-a
router, a personal computer, a host, or a collections of
hosts-set up specifically to shield a site or subnet
from protocols and services that can be abused from
hosts on the outside of the subnet.
 A firewall system is usually located at a gateway
point, such as site’s connection to the Internet, but
can be located at internal gateways to provide
protection for smaller collection of hosts or subnets.
Firewalls and Network Security
 Firewalls come in several types and offer various levels of
security.
 Generally, firewalls operate by screening packets and/or
the applications that pass through them, provide
controllable filtering of network traffic, allow restricted
access to certain applications, and block access to
everything else.
 The firewall can be thought of as a pair of mechanisms
 One to block incoming traffic and
 To permit outgoing traffic.
 The general reasoning behind firewall usage is that, without a
firewall, network security is a function of each host on the
network and all hosts must cooperate to achieve a uniformly
high level of security.
Firewalls and Network security
 Firewalls in Practice.
 Firewalls ranger from simple traffic logging systems that
record all network traffic flowing through the firewall in
a file or database for auditing purpose to more complex
methods such as IP packet screening routers, hardened
firewall hosts, and proxy application gateways.
 The simplest firewall is a packet filtering gateway or
screening router. Configured with filters to restrict
packet traffic to designated addresses, screening routers
also limit the type of services that can pass through them.
 More complex and secure are application gateways.They
are essentially PCs or UNIX boxes that sit between the
Internet and a company's internal network to provide
proxy services to users on either side.
Firewalls and Network security
 Firewalls in Practice.
 For example, a user who want to FTP in or out through
the gateway would connect to FTP software running on
firewall, which then connects to machines on the other
side of gateway.
 Screening routers and application gateway firewalls are
frequently used in combination when security concerns
are very high.
 In case of heavy traffic, sub networks or hardened
firewall machines are set up between the Internet and a
company’s private network.
Firewalls and Network security
 IP Packet Screening Routers.
 This is a static traffic routing services placed between
the network service provider’s router and the internal
network.
 The traffic routing service may be implemented at an IP
level screening rules in a router or at an application
level via proxy gateways and services.
 The figure shows a secure firewall with an IP packet
Screening router.
Firewalls and Network security
 IP Packet Screening Routers.
Firewalls and Network security
 IP Packet Screening Routers.
 The firewall router filters incoming packets to permit or
deny IP packets based on several screening rules.
 These screening rules, implemented into the router are
automatically performed.
 Rules include target interface to which the packet is
routed know source IP address, and incoming packet
protocol (TCP, UDP, ICMP).
 ICMP stands for Internet Control Message Protocal
 TCP stands for Transmission Control Protocol
 UDP stands for User Datagram Protocol.
Firewalls and Network security
 IP Packet Screening Routers.
 Configured routers can plug many security holes, they
do have several disadvantages.
 First screening rules are difficult to specify, given the
vastly diverse needs of users.
 Second, screening routers are fairly inflexible and do
not easily extend to deal with functionality different
from that preprogrammed by the vendor.
 Lastly, if the screening router is circumvented by a
hacker, the rest of the network is open to attack.
Firewalls and Network security
 Proxy Application Gateways
 It is a special server that typically runs on a firewall machine.
 Their primary use is access to applications such as the World
Wide Web from within a secure perimeter.
 Instead of talking directly to external WWW servers, each
request from the client would be routed to a proxy on the
firewall that is defined by the user.
 Proxy knows how to get through the firewall. An application
level proxy makes a firewall safely permeable for users in an
organization, without creating a potential security hole
through which hackers can get into corporate networks.
 The proxy wait for a request from inside the firewall, forwards
the request to the remote server outside the firewall, reads the
response, and then returns it to the client.
Firewalls and Network security
 Proxy Application Gateways
Firewalls and Network security
 Proxy Application Gateways
 In the usual case, all clients within a given subnet use
the same proxy. This makes it possible for the proxy to
execute efficient caching of documents that are
requested by a number of clients.
 Advantages: They allow browser programmers to
ignore the complex networking code necessary to
support every firewall protocol and concentrate on
important client issues.
 For instance, by using HTTP between client and proxy,
no protocol functionality is lost, since FTP, Gopher, and
other Web protocols map well into HTTP methods.
 Proxies can manage network functions.
Firewalls and Network security
 Proxy Application Gateways
 Proxies allows for creating audit trails of client
transactions, including client IP addresses, date and
time, byte count, and success code.
 The proxy also can control access to services for
individual methods, host and domain, and the like.
 Given this firewall design in which the proxy acts as an
intermediary, it is natural to design security-relevant
mediation within the proxy.
Firewalls and Network security
 Proxy Application Gateways
 Proxy mediation helps mitigate security concerns by
 Limiting dangerous subsets of the HTTP protocol
.
 Enforcing client and/or server access to
designated hosts.
 Implementing access control for network services
that is lost when the proxy is installed.
 Checking various protocols for well-formed
commands.
Firewalls and Network security
 Hardened Firewall Hosts
 It is a stripped-down machine that has been configured
for increased security.
 This type of firewall requires inside or outside users to
connect to the trusted applications on the firewall
machine before connecting further.
 Generally these firewalls are configured to protect
against unauthenticated interactive log-ins from the
external worlds.
 This, more than anything, helps prevent unauthorized
users from logging into machines on the network.
 Creating a hardened host requires several steps, among
them:
Firewalls and Network security
 Hardened Firewall Hosts : Steps
 Removing all user accounts except those necessary for
operation of the firewall, the logic being that, if users
cannot log in to the firewall host, they cannot subvert
the security measures.
 Removing all non crucial files and executables,
especially network servers programs and client
programs like FTP and Telnet.
 Extending traffic logging and monitoring to check
remote access.
 Disabling IP forwarding to prevent the firewall from
forwarding unauthorized packets between the Internet
and the enterprise network.
Firewalls and Network security
 Hardened Firewall Hosts : Advantages
 Concentration of Security: All modified software and
logging is located on the firewall system as opposed to
being distributed on many hosts.
 Information Hiding: A firewall can “hide” names of
internal systems or e-mail addresses, thereby revealing
less information to outside hosts.
 Centralized and simplified network services
management: Services such as FTP, e-mail, Gopher,
and other similar services are located on the firewall
systems as opposed to being maintained on many
systems.
Firewalls and Network security
 Hardened Firewall Hosts : Design Problems
 The most obvious being that certain types of network
access may be blocked for some hosts, including
Telnet, FTP and X windows.
 It concentrates security in one spot as opposed to
distributing it among systems.
 Another potential problem is that relatively few
vendors have offered firewall system until very
recently.
Firewalls and Network security
 Security Policies and Firewall Management
 The firewall method of protection spans a continuum between
ease of use and paranoid security.
 Before putting a firewall in place, the administrator who has
the responsibility of designing, specifying, and implementing
or overseeing the installation of a firewall must address a
number of management issue.
 The first issue reflects the security policy of the organization.
Is the firewall in place explicitly to deny all services except
those integral to the mission of connecting to the Internet or is
the firewall in place to provide a metered and audited method
of regulating access in a nonthreatening manner?
 Many corporations and data centers have computing security
policies and practices that dictate how data must be protected.
A firewall is an embodiment of this security policy.
Firewalls and Network security
 Security Policies and Firewall Management
 The second issue is: what is the level of monitoring,
redundancy, and control? Having established the acceptable
risk level by resolving the first issue, a checklist is made of
what should be monitored, permitted, and denied.
 For instance, the firewall computer can control access based
on time of day, organizations might allow employees to run
e-mail or FTP at any time, but to read USENET new groups
only between
7 P.M and 8 A.M.
 Frequently technical design is dictated by financial
concerns: How much will it cost either to buy or to
implement? For example, a complete firewall product may
cost anywhere between $0 to $200,000.
Firewalls and Network security
 Security Policies and Firewall Management
 Firewall are poor protection against threat such as viruses.
The ways of encoding binary files for transfer over
networks are too numerous, and the formats and viruses
too varied, to monitor them all.
 In other words, a firewall cannot replace user security
consciousness. In general a firewall cannot protect against
data-driven attacks – attacks in which something is mailed
or copied to an internal host and then executed.
 A firewall provides more than real security – it often plays
an important role as security blanket for management.
 A firewall also acts as the corporate “ambassador” to the
other users of Internet.
Network Security/ Firewall
3. Data and Message Security
1. Data Security
2. Message Security
Message confidentiality
1.
2. Message and System Integrity
3. Message Sender Authentication/Identification
3. Encryption as the Basis for Data and Message Security
1. Secret-key cryptography
2. Data Encryption Standard (DES)
3. Public-key Cryptography
4. RSA and Public Key Cryptography
5. Mixing RSA and DES
6. Digital Public-key certificates
7. Clipper chip
8. Digital Signatures
1. Digital Signature Standards(DSS).
Data and Message Security
 One of the main problem in Internets is lack of data
and message security.
 For instance, credit card numbers in their plain text
form create a risk when transmitted across the internet
where the possibility of the number falling into the
wrong hands is relatively high.
 Computer security was provided by the use of account
passwords and limited physical access to a facility to
bona fide user.
 This is sufficient for local users, but not for remote
users.
 Simple password schemes are not sufficient for remote
users.
Data and Message Security
 Today’s hacker has an array of tools to reach and
manipulate information from remote sites as well as
to engage in unauthorized eavesdropping.
 Transaction security issues can be divided into two
types.
 Data security and
 Message security.
eavesdropping
Data and Message Security
 Data Security
 Electronic data security is of paramount importance at a
time when people are considering banking and other
financial transactions by PCs.
 One major threat to data security is unauthorized
network monitoring, also called packet sniffing.
 Sniffer attacks begin when a computer is compromised
and the cracker installs a packet sniffing program that
monitors the network to which the machine is attached.
 The sniffer program watches for certain kinds of
network traffic, typically for the first part of any Telnet,
FTP, or rlogin sessions- sessions that legitimate users
initiate to gain access to another system.
Data and Message Security
 Data Security
 The first part of the session contains the log-in ID,
password, and user name of the person logging into
another machine, all the necessary information a sniffer
needs to log into other machines.
 One insecure system on a network can expose to
intrusion not only other local machine but also any
remote systems to which the users connect.
 The fact that some one can extract meaningful
information form network traffic is nothing new.
 If the compromised system is on a backbone network,
intruders can monitor any transit traffic traversing
between nodes on that network.
Data and Message Security
 Data Security
 Network monitoring car rapidly expand the number of
systems intruders are able to access, all with only
minimal impact on the systems being monitored.
 Users who accounts and passwords are collected will
not be aware that their sessions are being monitored,
and subsequent intrusions will happen via legitimate
accounts on the machines involved.
Data and Message Security
 Message Security
 Threats to message security fall into three
categories:
 Confidentiality
 Integrity
 Authentication
Data and Message Security
 Message Security
 Message Confidentiality
Data and Message Security
 Message Security
 Message Confidentiality
 Confidentiality is important for uses involving sensitive data
such as credit card numbers.
 This requirements will be amplified when other kinds of data,
such as employee records, government files, and social security
numbers, begin traversing the network.
 Confidentiality precludes access to, or release of, such
information to unauthorized users.
 The environment must protect all message traffic. After
successful delivery to their destination gateways, messages must
be removed from the public environment.
 All that remains is the accounting record of entry and delivery,
including message length, authentication data, and perhaps the
audit trail of message transfer agents that processed the message,
but no more.
Data and Message Security
 Message Security
 All message archiving must be performed in well-
protected systems.
 Provision must be made for the irrevocable emergency
destruction of stored, undelivered messages, where
necessary and when needed.
 The vulnerability of data communications and message
data to interception is exacerbated with the use of
distributed networks and wireless links.
 The need for securing the communications link
between computers via encryption is expected to rise.
Data and Message Security
 Message Security
 Message and System Integrity
 Business transactions require that their contents remain
unmodified during transport. In other words, information
received must have the same content and organization as
information sent.
 It must be clear that no one has added, deleted, or
modified any part of the message.
 Unauthorized combining of messages either by
intermixing or concatenating during submission,
validation, processing, or delivery should not be allowed.
 While confidentiality protects against the passive
monitoring of data, mechanisms for integrity must prevent
active attacks involving the modification of data.
Data and Message Security
 Message Security
 Message and System Integrity
 Error detection codes or checksums, sequence numbers,
and encryption techniques are methods to enhance
information integrity.
 Error detection codes operate on the entire message or
selected fields within a message.
 Sequence numbers prevent reordering, loss, or
replaying of messages by an attacker.
 Encryption techniques such as digital signatures can
detect modifications of a message.
Data and Message Security
 Message Security
 Message and System Integrity
 Digital signature
Data and Message Security
 Message Security
 Message Sender Authentication/Identification
Data and Message Security
 Message Security
 Message Sender Authentication/Identification
 For e-commerce, it is important that clients authenticate
themselves to servers, that servers authenticate to clients,
that both authenticate to each other.
 Authentication is a mechanism whereby the receiver of a
transactions or message can be confident of the identity of
the sender and/or the integrity of the message.
 In other words, authentication verifies the identity of an
entity(a user or a service) using certain encrypted
information transferred from the sender to the receiver.
 The form of authentication, such as cryptographically
signed certificates, must not be easily spoofed (falsified).
Data and Message Security
 Message Security
 Message Sender Authentication/Identification
 Whenever a message enters the public Internet for
transfer, it must bear some unambiguous identification of
the system from which it came.
 On the network this identification often takes the form of
the IP address. If the identification is lacking, the delivery
program will insert it.
 Sender authentication will be performed at the time a
sender submits a message and / or by a gateway system
when a message has been delivered to it.
 Consumer devices attached to the Internet will be
expected to generate an unambiguous origin
identification.
Data and Message Security
 Message Security
 Message Sender Authentication/Identification
 Authentication in e-commerce basically requires the
user to prove his or her identity for each requested
service.
 The race among various vendors in the e-commerce
today is provide an authentication method that is easy
to use, secure, reliable, and scalable.
 Third-party authentication services must exist within a
distributed network environment where a sender cannot
be trusted to identify itself correctly to a receiver.
 In short, authentication plays an important role in the
implementation of business transaction security.
Data and Message Security
 Encryption as the basis for Data and Message
Security
 Sensitive information that must travel over public
channels can be defended by encrypting it.
 Encryption is the mutation of information in any
form(text, video, graphics) into a representation
unreadable by anyone without a decryption key.
 Suppose Ram wants to send you a message but doesn’t
want anyone but you to read it.
 Ram can encrypt or encipher, the message, which
means that Ram can scramble it in a hopelessly
complicated way, rendering it unreadable to anyone
except you, the intended recipient.
Data and Message Security
 Encryption as the basis for Data and Message Security
 Ram supplies a cryptographic “key” to encrypt the message,
and you have to use the same key to decipher or decrypt it.
 These are the basics of single-key cryptography.
 The general scenario in the case of business transactions is
as follows
 A wishes to send a purchase order(PO) to B in such a way
that only B can read it.
 A encrypts the PO, called the plaintext, with an encryption
key and sends the encrypted PO, called the cipher text, to B.
 B decrypts the cipher text with the decryption key and reads
the PO.
 A hacker C may obtain the cipher text as it passes on the
network, but without the decryption key it is impossible to
recover the message even if C has access to supercomputers.
Data and Message Security
 Encryption as the basis for Data and Message
Security
Encryption is the conversion of data into a form, called
a cipher text, that cannot be easily understood by
unauthorized people.
Decryption is the process of converting encrypted data
back into its original form, so it can be understood.
Data and Message Security
 Encryption as the basis for Data and Message
Security
Data and Message Security
 Encryption as the basis for Data and Message
Security
There are two types of encryption methods
Secret-key cryptography
Public-key cryptography
Data and Message Security
 Secret-Key Cryptography
 It is also called Symmetric Key encryption.
 Secret-Key cryptography uses the same key for both
encryption and decryption.
Data and Message Security
 Secret-Key Cryptography
 Shared-key techniques suffer from the problem of key
distribution, since shared keys must be securely
distributed to each pair of communicating parties.
 Secure-key distribution becomes cumbersome in large
networks.
 A encrypts a message with a secret key and e-mails the encrypted
message to B. on receiving the message, B checks the header to
indentify the sender, the unlocks his electronic key storage area
and take out the duplicate of the secret key. B then uses the secret
key to decrypt the message.
 Here the problem is there is a chance to hacking the
secret key by the third person, because A has to send the
secret key to B, he has to use any one of the public
transmission system(Phone, or Postal).
Data and Message Security
 Secret-Key Cryptography
 The generation, transmission, and storage of keys is
called key management; all cryptosystems must deal
with key management issues.
 Although the secret-key method is quite feasible and
practical for one-on-one document interchange; it does
not scale.
 In a business environment where a company deals with
thousands of on-line customers, it is impractical to
assume that key management will be flawless.
 One of the Secret-key algorithm is DES, Data
Encryption Standard.
Data and Message Security
 Secret-Key Cryptography: Data Encryption Standard.
 The DES software is readily available at free of cost in the
internet.
 Introduced in 1975 by IBM, the National Security Agency
(NSA), and the National Bureau of Standards(NBS).
 DES is the most well-known and widely used
cryptosystem in the world.
 DES is a secret-key, symmetric cryptosystem: when used
for communication, both sender and the receiver must
know the same secret key, which is used both to encrypt
and decrypt the message.
 DES can also be used for single user encryption, for
example, to store files on a hard disk in encrypted form.
Data and Message Security
 Secret-Key Cryptography: Data Encryption Standard.
 In a multiuser environment, however, secure-key
distribution becomes difficult.
 DES operates on 64-bit blocks with a 56-bit secret key.
 Designed for hardware implementation, its operation is
relatively fast and works well for large bulk documents
or encryption.
 It was the first encryption algorithm approved by the
U.S. government for public disclosure.
 The simplicity of DES also saw it used in a wide variety
of embedded systems, smart cards, SIM cards and
network devices requiring encryption like modems, set-
top boxes and routers.
Data and Message Security
 Secret-Key Cryptography: Data Encryption Standard.
 DES uses a 64-bit key, but eight of those bits are
used for parity checks, effectively limiting the key to
56-bits. Hence, it would take a maximum of 2^56, or
72,057,594,037,927,936, attempts to find the correct
key.
 So it is possible to find out the key using a brute
force attack(trying to break the cypher by using all
possible keys).
 A new technique for improving the security of DES
is triple encryption (Triple DES), that is, encrypting
each message block using three different keys in
succession.
Data and Message Security
 Secret-Key Cryptography: Data Encryption
Standard.
 Triple DES, thought to be equivalent to doubling
the key size of DES, to 112 bits, should prevent
decryption by a third party capable of single key
exhaustive search.
 Of course, using triple encryption takes three times
as long as single-encryption DES.
Data and Message Security
 Public-Key Cryptography:
Data and Message Security
 Public-Key Cryptography:
 Public-key techniques involve a pair of keys; a
private key and a public key.
 Information encrypted by the public key can be
decrypted only using the corresponding decrypted
only using the corresponding private key.
 The private key, used to decrypt transmitted
information, is kept secret.
 The public key is used to encrypt information and is
not kept secret.
 Pubic keys can be maintained in some central
repository and retrieved to decode or encode
information.
Data and Message Security
 Public-Key Cryptography:
 Each party to a public key pairing receives a pair of
keys, the public key and the private key.
 When A wishes to send a message to B, A looks up
B’s public key in a directory, A then uses the public
key to encrypt the message and mail it to B.
 B uses the secret private key to decrypt the message
and read it.
 Anyone can send an encrypted message to B but
only B can read it. Unless, a third party(C), has access
to B’s private key, it is impossible to decrypt the
message sent by A. this ensures Confidentiality
Data and Message Security
 Public-Key Cryptography: Advantages
 It is that no one can figure out the private key from
the corresponding public key.
 The need for sender and receiver to share secret
information over public channels is completely
eliminated.
 Public key cryptography can be used for sender
authentication, known as digital signatures.
Data and Message Security
 Public-Key Cryptography:
 Digital Signature:
 A wishes to send digitally sign a document, puts his
private key and the document together and performs a
computation on the composite (key + document) to
generate a unique number called the digital signature.
 When an electronic document, such as an order form
with a credit card number, is run through the method, the
output is a unique “fingerprint” of the document.
 This “fingerprint” is attached to the original message and
further encrypted with the signer A’s private key.
 The result of the second encryption is then sent to B,
who then first decrypts the document using A’s public
key.
Data and Message Security
 Public-Key Cryptography:
 Digital Signature:
 B checks whether the message has been tampered with or
is coming from a third party C, posing as A.
 To verify the signature, B does some further computation
involving the original document, the purported signature,
and A’s public key.
 If the results of the computation generate a matching
“ fingerprint” of the document, the digital signature is
verified as genuine; otherwise, the signature may be
fraudulent or the message altered, and they are discarded.
 This method is the basis for secure e-commerce, variations
of which are being explored by several companies.
Data and Message Security
 Public-Key Cryptography: RSA.
 RSA is a public-key cryptosystem for both encryption
and authentication developed in 1977 by Ron Rivest,
Adi Shamir, and Leonard Adlemen.
 RSA’s system uses a matched pair of encryption and
decryption keys, each performing a one-way
transformation of the data.
 RSA is also developing digital signatures, which are
mathematical algorithms that encrypt an entire
document.
 RSA is important because it enables digital signatures,
which can be used to authenticate electronic documents
the same way handwritten signatures are used to
authenticate paper documents.
Data and Message Security
 Public-Key Cryptography: RSA.
 Here’s how a digital signature works for an electronic
document to be sent from the sender X to the receiver Y:
 X runs a program that uses a has algorithm to generate a
digital fingerprint – a pattern of bits that uniquely
identifies a much larger pattern of bits – for the document
and encrypts the fingerprint with his private key.
 This is X’s digital signature, which is transmitted along
with the data.
 Y decrypts the signature with X’s public key and runs the
same hash program on the document.
 If the digital fingerprint output by the hash program does
not match the fingerprint sent by X(after that has been
decrypted), then Y can be signature is invalid.
Data and Message Security
 Public-Key Cryptography: RSA.
 If the fingerprints do match, however, then Y can be
quite sure that the digital signature is authentic.
 If the document were altered en route, the fingerprints
will not match (the output from the hash programs will
be different) and the receiver will know that data
tampering occurred.
 If the sender’s signature has been forged, the fingerprint
won’t match either.
 Therefore the digital signature verifies both the identity
of the sender and the authenticity of the data in the
document.
Data and Message Security
 Public-Key Cryptography: RSA.
 RSA is currently used in a wide variety of products,
platforms, and industries around the world.
 It is being incorporated into the World Wide Web
browsers such as Netscape, giving it wider audience.
 In hardware, RSA can be found in secure telephones,
on Ethernet network cards, and on smart cards.
 Adoption of RSA seems to be processing more quickly
for authentication (digital signatures) than for privacy
(encryption).
Data and Message Security
 Mixing RSA and DES.
 RSA allows two important functions not provided by
DES:
 Secure key exchange without prior exchange of keys, and
 Digital signatures.
 For encrypting messages, RSA and DES are usually
combined as follows:
 First the message is encrypted with a random DES key, then,
before being sent over an insecure communications channel,
the DES key is encrypted with RSA.
 Together, the DES – encrypted message and the RSA encrypted
DES key are sent.
 This protocol is known as an RSA Digital Envelope.
Data and Message Security
 Mixing RSA and DES.
 RSA may be fine for small messages, DES is preferable
for larger messages due to its greater speed.
 In some situations, RSA is not necessary and DES
alone is sufficient, for example, in multiuser
environments where secure DES-key agreement can
take place.
 RSA is usually not necessary in a single-user
environment; for example, if your want to keep your
personal files encrypted, just do so with DES using,
say, a password as the DES key.
 RSA and public-key cryptography is general, is best
suited for a multi user environment.
Data and Message Security
 Digital Public-key Certificates.
 A public key certificate (also known as a digital
certificate or identity certificate) is an electronic
document used to prove ownership of a public key.
 Keys are intended to be public and widely distributed,
secrecy is not a concern; anyone should be able to get a
copy of a public key. Rather, the primary concern is
authenticity.
 If A in England is doing business with B in Canada and
wants to encrypt information so that only B can read it, A
must first get the public key of B from a key directory.
That’s where the problem lies.
 There is nothing that says that this public key information
is valid and not a forgery put there by C impersonating B.
Data and Message Security
 Digital Public-key Certificates.
 One solution to this problem is a public-key certificate.
A public key certificate is a data structure, digitally
signed by a certification authority, that binds a public –
key value to the identify of the entity holding the
corresponding private key.
 The latter entity is known as the subject of the
certificate. In essence, a certificate is a copy of a public
key and an identifier, digitally signed by a trusted party.
 The problem is then transformed into finding a trusted
third party to create these certificates.
 A public key user needs to obtain and validate a
certificate containing the required public key. This is
where its complicated.
Data and Message Security
 Digital Public-key Certificates.
 If the public key user does not already have a copy of
the public key of the trusted party that signed the
certificate, then the user may need an additional
certificate to get that public key.
 I such cases, a chain of multiple certificated may be
needed, comprising a certificate of the public-key
owner signed by one certification authority, and
additional certificates of certification authorities by
other certification authorities.
Data and Message Security
 Clipper Chip.
 Chipper is an encryption chip developed as part of the
Capstone project.
 Announced by the White House in April 1993, clipper
was designed to balance the competing concerns of
federal law enforcement agencies with those of private
citizens and industry.
 Law enforcement agencies wish to have access – for
example, by wire tapping – to the communications of
suspected criminals, and these needs are threatened by
secure cryptography.
 Clipper technology is used in telecommunications.
Data and Message Security
 Clipper Chip.
 The communications would be encrypted with a secure
algorithm, but he keys would be kept by one or more third
parties ( the “escrow agencies”) and made available to law
enforcement agencies when authorized by a court-issued
warrant.
 Skipjack was invented by the National Security Agency of
the U.S. Government; this algorithm was initially classified
SECRET.
 It is the encryption algorithm contained in the Clipper chip.
 It uses one 80-bit key to encrypt and decrypt 64-bit blocks
of data.
 Skipjack can be used in the same way as DES and may be
more secure than DES.
Data and Message Security
 Clipper Chip.
 Since, it uses 80-bit keys and scrambles the data for 32
steps, or “rounds”; by contrast, DES uses 56 bit keys
and scrambles the data for only 16 rounds.
 Skipjack is not public, the same scrutiny cannot be
applied, and thus a corresponding level of confidence
may not arise.
 Aware of such criticism, the government invited a small
group of independent cryptographers to examine the
Skipjack algorithm.
 Skipjack is cannot be implemented in software, but
only in hardware by government-authorized chip
manufacturers.
Data and Message Security
 Digital Signatures. (Digital Signature Standard)
 The signature is an unforgeable piece of data asserting
that a named person wrote or otherwise agreed to the
document to which the signature is attached.
 A secure digital signature system thus consists of two
parts: a method of signing a document such that forgery
is infeasible, and a method of verifying that a signature
was actually generated by whomever it represents.
 Digital Signature Standard (DSS)
 The Digital Signature Standard specifies a Digital
Signature Algorithm (DSA) as part of the U.S
government’s Capstone project.
Data and Message Security
 Digital Signatures: Digital Signature Standard
 It was selected to be the digital authentication standard
of the U.S government; whether the government should
in fact adopt it as the official standard is still under
debate.

You might also like