Documente Academic
Documente Profesional
Documente Cultură
DES Algorithm
Data Encryption Standard - Lucipher Developed by IBM with the help of NIST - 1977 adopted by NSA to US government and DoD Symmetric Cryptography (secret key) - One secret key is used to encrypt and decrypt Encryption based on 64 bit block size of data -56 bits are randomly generated and used directly by algorithm Key -8 bit for error detection
DES Algorithm
There is 72,000,000,000,000,000 (72 Quadrillion) encryption keys available For each message the key is chosen at random Sender and receiver must know & use the same key In 1997 by brute-force DES key was broken using 14,000 computer deciphered the message
Symmetric Algorithms
DES Algo based on 64 bit block with 56 bit key Triple-DES Algo with 168 bit key Skipjack Algorithm with 80 bit key -Fortezza Using MYK82 chip Advanced Encryption Standard (AES) - Based on 128 bit block with 128, 196 and 256 bit key - Proposed Algos (MARS, RC6,Twofish,serpent,Rijndael)
Asymmetric Cryptography
Whitfield diffie and Martin Hellman developed the concept of public key cryptosystem New direction of cryptography. Implementation of public key RSA Algorithm -Ron Rivest, Adi Shamir and Le Adleman Public Key cryptosystem A pair of Keys is extract one Public and one Private Based on 128 bit key Algorithm Private Key to remain secret and Public key to be given to any one
Encryption Algorithms
3 Type of Encryption methods available Symmetric Algorithms - DES , 3DES, Skipjack and AES Asymmetric Algorithm - RSA 1000 slower in HW &100 slower in SW Hash Function Algorithms -MD2, MD4, MD5 and SHA
Security Infrastructure
Information Technology eSecurity RSA public Key Cryptosystem -email, Netscape Browser, VPN
PKI Applications
E-mail with customers, partners and Employees e-Commerce including data exchange and financial transactions. Digital contract including loans, leases and Mortgages. Remote Access to corporate databases.
Validity period User Public Key User unique identifier Digital signature
Signature algorithm ID
Issuer name User name
3. 4. 5.
6.
Certificate Authority CA 1 2
Subscriber 4
Message
Hash Function
Private key of sender Encrypts Digest
Digital Signature
Message Digest
Message
Digital Signature
Message Digest 2
Original Digest compared to second Digest for identical Match to confirm Message Integrity Message Digest
Message Digest
Digital Signature
Authentication Methods
Smart card VS Token -iKey VS smart card Biometrics -Finger prints, voice print, Iris patterns, face print Wireless -Pagers, Cell phones, PDA
Conclusion
A secure eCommerce web site can provide businesses with powerful competitive advantage. Today the business done on the internet is estimated to $25 billion and will reach 300 billion by 2005, securing the Internet will bring the following: New customers Cost effective delivery channel Streamlined enrollment paper-based enrollment Better marketing through better customer knowledge.
1. 2. 3. 4.