UNIT - 4 Notes
UNIT - 4 Notes
1
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
1. Basic Cryptography
Cryptography — the science of secret writing .Cryptography basically
means keeping information in secret or hidden. Cryptography is
technique of securing information and communications through use of
codes so that only those person for whom the information is intended
can understand it and process it. Thus preventing unauthorized access
to information. The prefix “crypt” means “hidden” and suffix graph
means “writing”.
2
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
2.Basic Terminology
3
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
3. Types Of Cryptography
4
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
5
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
6
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
II. Compute n = p × q = 3 × 11 = 33
III. Compute Ф (n) = (p - 1) × (q - 1) = 2 × 10 = 20
IV. Choose e such that 1 < e < Ф(n), and e is co-prime
to Ф(n), let e = 7.
V. Select d such that e × d ≡ 1 mod (φ(n). one solution is d
= 3.
VI. Public key is (e, n) (7, 33).
VII. Private key is (d, n) (3, 33).
VIII. The encryption of M = 2 is C = 27 mod 33 = 29.
IX. The decryption of C = 29 is M = 293 mod 33 = 2.
8
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
9
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
11
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
12
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
III. Only the certificate authority can create and update certif
icates.
IV. Any participant can verify the currency of the certificate.
A certificate scheme is illustrated in Figure. Each participant a
pplies to the certificate authority, supplying a public key and
requesting a certificate.
13
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
6. Digital Signature
14
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
Saves time
Cost savings
Workflow efficiency
15
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
Security
Legal validity
16
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
Environmental benefits
Business efficiency
17
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
18
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
19
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
20
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
21
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
23
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
Requirements in SET :
SET protocol has some requirements to meet, some of the
important requirements are :
It has to provide mutual authentication i.e., customer (or
cardholder) authentication by confirming if the customer
is intended user or not and merchant authentication.
It has to keep the PI (Payment Information) and OI (Order
Information) confidential by appropriate encryptions.
It has to be resistive against message modifications i.e., no
changes should be allowed in the content being
transmitted.
SET also needs to provide interoperability and make use
of best security mechanisms
Participants in SET :
24
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
Uses of IP Security –
IPsec can be used to do the following things:
To encrypt application layer data.
Components of IP Security –
Encapsulating Security Payload (ESP)
25
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
26
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
Algorithm flexibility:
TLS/SSL provides operations for authentication
mechanism, encryption algorithms and hashing algorithm
that are used during the secure session.
Ease of Deployment:
Many applications TLS/SSL temporarily on a windows
server 2003 operating systems.
Ease of Use:
Because we implement TLS/SSL beneath the application
layer, most of its operations are completely invisible to
client.
27
BBDITM-054 COMPUTER SYSTEM SECURITY UNIT - 4
28