““More damage could be done by a mouse click than a bomb”More damage could be done by a mouse click than a bomb”
……………………. Are we. Are we reallyreally prepared ??prepared ??
Cryptography
Why Encryption needed ?Why Encryption needed ?
How Does CyberSecurity Differs Fromconventional security?How Does CyberSecurity Differs Fromconventional security?
• The parties to the transaction cannot be certain of each other’s
identities
– Email addresses can be spoofed
• They cannot be sure that the messages between themhave not
been intercepted by third parties
– Confidentiality(privacy) of the transaction (read by outsiders)
– Integrity of the transaction (changed by outsiders)
• How do we achieve unequivocal agreement?
– Both parties have the authority to do the transaction
– Assurance that neither side can later repudiate the transaction
– How do the parties sign their acceptance of the deal?
• Do we have adequate evidence to the transaction?
Pillars of reliable e- SecurityPillars of reliable e- Security
Security Infrastructure
Security Policies
Authentication
Privacy
Authorization
Integrity
ofData
Non-
Repudiation
Reliable
e-Transaction/
e-Business
Technology
Management
A PAIN ….
Authentication
• be sure you know who you are communicating with
Privacy (Confidentiality)
• keep secrets secret
Authorization(Access Control)
• ensure users do not exceed their allowed authority
Integrity (of the Data)
• be sure nothing is changed behind your back
Non-Repudiation
• have the evidence in the event of a dispute
Pillars of reliable e- SecurityPillars of reliable e- Security
Cryptography Principles
• The science of scrambling a message so that only authorized parties can read it
• Process must be reversible
– Hiding is called e ncryptio n
– Retrieving the hidden message is de cryptio n
• Converts the original message (“plaintext”) into a scrambled message (“cipher text”)
CONSEQUENCES OF WEAKENCRYPTION ….
• World War I, Russian Army at Tannenberg
– Two Russian armies couldn’t communicate securely
– Germans could read their communications and attack them separately
– Result: defeat!
• Allied cracked German Enigma Cipher machine in World War 2
– Montgomery (Monty) often read Rommel’s (Desert Fox) orders before he did
– Result: tide turned in North Africa
• U.S. Navy cryptographers cracked Japanese convoy codes (“Purple”)WW2
– U.S. subs could destroy Japanese submarine ships
– Surprise attack on Midway Pacific Island
• Germans also cracked Allied codes
– U-boats were devastated in the Atlantic
Cosmetic Encryption ??
Ancient Encryption Techniques
A. Secret/Symmetric Key Cryptography
Uses a secret key known to both parties (“symmetric”)
1) Caesar Cipher: (Skip 2 letters)
A Þ D, B Þ E, etc.
- Easy to “crack” by elementary cryptanalyst
2) Mono-Alphabetic Substitution: A long sequence of key consisting of 26 alphabets.
Alphabets : a b c d e f … k t .. z
Key : Q W E R A B S N C
eg: Plain Text a t t a c k
Cipher Text Q N N Q E S
English Letter Frequencies
• Symmetric/Secret Key Cryptography(Modern)
– DES (Data Encryption Standard)
– Triple DES
– AES (Advanced Encryption Standard)
– SkipJack
– RC2, RC4, RC5, RC6(Rivest Ciphers)
• Asymmetric Cryptography
-Public Private Key Pairs Cryptography
Encryption Techniques (Modern)Encryption Techniques (Modern)
Common Symmetric Key Algorithms
Algorithm Supporter Length Availability Comments
DES NSA, NIST, 40 & 56 bits Public Domain Most widely used;
ANSI now too weak
Triple-DES - same - 80 & 112 bits Public Domain Stronger variant of DES
Skipjack NSA 80 bits Recently Planned for the
declassified US Govt’s Clipper
RC2, RC4 RSA variable Proprietary Very strong;
Websites: rsasecurity.com, nsa.com, nist.com
NSA: Netwk Security Agency
NIST: National Institute of Standarad & Technology
ANSI: American National Standards Institute.
SHA: Secure Hash Algo
NSI :Netwk Solutions Incorporation
Symmetric/Secret Cryptography System
EncryptEncrypt
Symmetric key (sharedSymmetric key (shared
secret,secret,
known to A & B)known to A & B)
DecryptDecrypt
CiphertextCiphertext
aN!3q
* nB5+
C=E(M, K)
C = Ciphertext
M= Message (plaintext)
K= Secret Key
E = Encryption function
AliceAlice
PlaintextPlaintext
Hi Bob
Alice
!!??
EavesdropperEavesdropper
M=D(C, K)
D= Decryption function
BobBob
PlaintextPlaintext
Hi Bob
Alice
Strength OF Symmetric Key Encryption Method ?
• Strength of encryption = difficulty of cracking
• Length of key (Modern Symmetric Key Encryption uses 128, 256, 1024 bits as key)
• Strength of the mathematical algorithm (Modern method uses Hash function)
Cracking Symmetric Key EncryptionCracking Symmetric Key Encryption
Brute Force = Exhaustive search, trying all possible keys, starts at 0000…..1, etc.
• Successful attacks are now possible by using thousands of networked computers linked on the
Internet
Digital signatures vs Digital certificate
Digital certificate is a form of an electronic credential for the Internet. Similar to
a driver's license, employee ID card, a Digital certificate is issued by a trusted
third party to establish the identity of the certificate holder. The third party who
issues the Digital Certificate is known as the Certifying Authority (CA).
Digital signatures are electronically generated and can be used to
ensure the integrity and authenticity of some data, such as an e-mail
message and protect against non-repudiation
Key Size No of Possible Keys Crack Time(*)
40 bits 1 x 1012
(1 trillion) 2 hours
56 7 x 1016
20 hrs (12/98)
64 2 x 1019
9 years
112 5 x 1033
1015
years
128 3 x 1038
1019
years
256 1 x 1077
1058
years
* Time required for a “brute force” attack, using a hypothetical special-
purpose, “cracking” computer
Strength of Symmetric Key EncryptionStrength of Symmetric Key Encryption
Quote
“The problem with bad cryptography is that it looks just
like good cryptography”
- Bruce Schneider
2) Asymmetric Key Encryption: [Public-Private key pairs]
• No shared secret
• Bob has two co m plim e ntary ke ys
• What one key encrypts, only the other key can
decrypt
• Bob keeps one key private (Private Key).
• Bob shares the other key (Public Key).
Asymmetric Key Encryption: Public-Private key pairs
Scenario 1
If Alice needs to send Bob a message:
- Alice encrypts message with Bob’s public key,
- Bob decrypts message with his private key
Problem:
• How would Bob ensure that the message has been sent by Alice?How would Bob ensure that the message has been sent by Alice?
• Anybody can encrypt the message using Bob’s public key as this key is publicly available.Anybody can encrypt the message using Bob’s public key as this key is publicly available.
[[Alice’s key not used at all]Alice’s key not used at all]
CiphertextCiphertext
B's public keyB's public key B's private keyB's private key
DecryptDecrypt
BobBob
#d%G
*!ki4i
EncryptEncrypt
PlaintextPlaintext
AliceAlice
Hi Bob
Alice
Hi
Bob
Alice
Public-Private key pairs:
Scenario 2:
•Alice encrypts message with her private key & sends to Bob. Identity attached
•Bob is confirm that the message is from Alice. The message is authentic.
•Message is not confidential as anybody can decrypt it using Alice’s public key.
Problem:
Bob’s key not used at allBob’s key not used at all
Putting It All Together
Let’s put Encryption and Authentication together
PROPERTIES OF A MESSAGE DIGEST (MD)/ HASH FUNCTION
• Properties of MD (or hash) functions :
– Sho rt o utput: reduces a message to a fixed length, say 16 to 20 characters
– One way: impractical to determine a message from its hash
– Uniq ue : impractical to find 2 messages with the same hash
– Se nsitive : checksum changes if one bit changes or one bit is added to or removed
from the message
Hash Algo: MD-5(128 bits), SHA1(160bits)
• An MD is like a fingerprint
– Less information than the original (me)
– Unique to me
– Unlikely to find 2 individuals with identical fingerprints
– Given the fingerprint, can’t reconstruct the person
DIGITAL SIGNATURE WITHA MESSAGE
DIGEST
Plaintext
Alice
Hi Bob
Alice
Plaintext
Bob
Hi Bob
Alice
=?
Hi Bob
Alice
A's public key 17648902381764890238
5. Alice’s5. Alice’s
Message DigestMessage Digest
Encrypted MD
(“signature”)
Unencrypted message
A’s private key
Digest
1. Message
Digest
17648902381764890238
MD
17648902381764890238
MD 3. Compute
the MD
Digitally
Sign
2.Sign it
(Encrypt
the MD)
Decrypt
Alice’s
MD
Decrypt
Alice’s
MD
4.
Certifying Authorities
• Certifying Authority is a trusted third party
– similar to Passport Office
• Certifying Authorities issue digital certificates. Controller of Certifying Authority is
the custodian of the following repositories:
-National Repository of Digital Certificates
-Certificate Revocation List
• A certificate contains the following:
– Bob’s public key, Bob’s name, address, other info
– Expiration date & serial number
– The certificate authority’s name, etc.
• A digital certificate is “signed” with the Certifying Authority’s private key, to ensure
authenticity
• Everyone has CA’s public key
Basic Certificate Contents as perInternational Standard ITU-T X.509 v3
Version
Serial number
Signature algorithm
Issuername
Validity period
Subject name
Subject public key
Identifies certificate format
Identifies this certificate
Algorithm
used to sign
certificate
Name of
certification
authority
Start date
and
end date
Public key value and
indicatorof its algorithm
Identifies the owner
of the key pair
Ensures cert. dataEnsures cert. data
can’t be changedcan’t be changed
VERISIGN CERTIFICATE CLASSES
1
Class
• email address, charges Rs 500/-
• Real name, real address, locale, email address
• Verified using a “trusted” database (credentials like ration card,
passport
ClassClass
22
• Real name, real address, locale, email address
• Verified using “trusted” database
• Verified in person, with notarization
ClassClass
33
https: //www. nco de so lutio ns. co m /ce rtificate s. asp
CAs licensed underthe Govt. of India IT Act, 2000
(www.cca.gov.in)
•Controller of CAs
•IDRBT CA(Instt fo r De v & Re se arch in Banking Te ch. , IT Te ch Arm o f RBI)
•TCS Certifying Authority (CA) Services
•National Informatics Center CA
•SafeScrypt
•MTNL
•Customs & Central Excise
•GNFC (n)Code Solutions Ltd., (A division of Gujarat Narmada Valley Fertilizers Company Ltd.)
Countermeasures
Some of the measures that the Government has decided to take up to counterattack
Cyber Terrorism are:
• Establishment of National Level Cyber Emergency Response Units
• Conducting Security Training & Awareness Programs
• Developing Indigenous Security Software
• Deploying of Cyber Cops or Cyber Cells to keep a track of various online
activities
• Deployment of PKI Infrastructure
Tools:
1. Wondercrypt: A PKI Solution (wondercrypt.com)
2. PGP (Pretty Good Privacy)
Resources:
Wikipedia
Webopedia
Security fresh
Zdnet
D3pak KumarD3pak Kumar
IT security & Forensic Consultant
@D3pak
Fb/D3pak
Deepakniit14@gmail.com
“BETHECHANGEYOU WISHTOSEEIN THISWORLD”
- MahatmaGandhi

More Related Content

PPT
Whatisdigitalsignature
PPTX
Dark Side of the Net Lecture 2 Cryptography
PPTX
Tales From the Crypt(ography)
PPT
Cryptography al-hamadi111
PPT
National Certificate Digital Media Computing
PPTX
Impact of digital certificate in network security
PPTX
Kumkum digital certificate
PPT
Digital Certificate
Whatisdigitalsignature
Dark Side of the Net Lecture 2 Cryptography
Tales From the Crypt(ography)
Cryptography al-hamadi111
National Certificate Digital Media Computing
Impact of digital certificate in network security
Kumkum digital certificate
Digital Certificate

Similar to Cryptography & Digital certificate (20)

PPT
cryptography.ppt by karthika kumar hirehegaalla
PPT
cryptography.pptcryptography.pptcryptography.ppt
PPTX
aacyberessential3cryptography-131067585699078884.pptx
PPT
enkripsi and authentication
PPT
Crypt
PPT
1329 n 9460
PPT
Cryptography and DNS-Computer network.ppt
PDF
5.3. Undercover communications
PPTX
20 security
PPT
Introduction to cryptography and Network Security
PDF
Fundamentals of Cryptography: Securing Data in the Digital Age
PPT
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
PPT
HifnCrypto101
PPT
PPT
Security.ppt
PDF
CyberSecurity_Cryptography and its fundamentals
PPTX
Cryptography
PPTX
Cryptography & Steganography
PDF
Digital Security 101
PPT
Secure Communication (Distributed computing)
cryptography.ppt by karthika kumar hirehegaalla
cryptography.pptcryptography.pptcryptography.ppt
aacyberessential3cryptography-131067585699078884.pptx
enkripsi and authentication
Crypt
1329 n 9460
Cryptography and DNS-Computer network.ppt
5.3. Undercover communications
20 security
Introduction to cryptography and Network Security
Fundamentals of Cryptography: Securing Data in the Digital Age
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
HifnCrypto101
Security.ppt
CyberSecurity_Cryptography and its fundamentals
Cryptography
Cryptography & Steganography
Digital Security 101
Secure Communication (Distributed computing)
Ad

More from Deepak Kumar (D3) (20)

PDF
Dark Web Forensics
PDF
Cyber Threat Intel : Overview
PDF
Cyber of things 2.0
PDF
Cyber Forensics
PDF
Threat Intelligence
PDF
Cyber Security Tips
PDF
CISSP INFORGRAPH MINDMAP
PDF
Cyber Forensics & Challenges
PDF
Cyber Crime Types & Tips
PDF
Cyber Security India & Cyber Crime
PDF
21st Century Cyber Forensics
PDF
PPTX
PDF
PDF
Ransomware
PDF
Success Mantra
PDF
Facebook Security Tips
Dark Web Forensics
Cyber Threat Intel : Overview
Cyber of things 2.0
Cyber Forensics
Threat Intelligence
Cyber Security Tips
CISSP INFORGRAPH MINDMAP
Cyber Forensics & Challenges
Cyber Crime Types & Tips
Cyber Security India & Cyber Crime
21st Century Cyber Forensics
Ransomware
Success Mantra
Facebook Security Tips
Ad

Recently uploaded (20)

PDF
THE CHILD AND ADOLESCENT LEARNERS & LEARNING PRINCIPLES
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
PDF
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
PPTX
What’s under the hood: Parsing standardized learning content for AI
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PPTX
UNIT_2-__LIPIDS[1].pptx.................
PPTX
Reproductive system-Human anatomy and physiology
PDF
0520_Scheme_of_Work_(for_examination_from_2021).pdf
PPTX
CAPACITY BUILDING PROGRAMME IN ADOLESCENT EDUCATION
PDF
Journal of Dental Science - UDMY (2021).pdf
PDF
Solved Past paper of Pediatric Health Nursing PHN BS Nursing 5th Semester
PDF
Civil Department's presentation Your score increases as you pick a category
PDF
African Communication Research: A review
PDF
Controlled Drug Delivery System-NDDS UNIT-1 B.Pharm 7th sem
PPTX
Climate Change and Its Global Impact.pptx
PPTX
2025 High Blood Pressure Guideline Slide Set.pptx
PDF
Everyday Spelling and Grammar by Kathi Wyldeck
DOCX
Ibrahim Suliman Mukhtar CV5AUG2025.docx
PPTX
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
THE CHILD AND ADOLESCENT LEARNERS & LEARNING PRINCIPLES
Environmental Education MCQ BD2EE - Share Source.pdf
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
What’s under the hood: Parsing standardized learning content for AI
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
UNIT_2-__LIPIDS[1].pptx.................
Reproductive system-Human anatomy and physiology
0520_Scheme_of_Work_(for_examination_from_2021).pdf
CAPACITY BUILDING PROGRAMME IN ADOLESCENT EDUCATION
Journal of Dental Science - UDMY (2021).pdf
Solved Past paper of Pediatric Health Nursing PHN BS Nursing 5th Semester
Civil Department's presentation Your score increases as you pick a category
African Communication Research: A review
Controlled Drug Delivery System-NDDS UNIT-1 B.Pharm 7th sem
Climate Change and Its Global Impact.pptx
2025 High Blood Pressure Guideline Slide Set.pptx
Everyday Spelling and Grammar by Kathi Wyldeck
Ibrahim Suliman Mukhtar CV5AUG2025.docx
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx

Cryptography & Digital certificate

  • 1. ““More damage could be done by a mouse click than a bomb”More damage could be done by a mouse click than a bomb” ……………………. Are we. Are we reallyreally prepared ??prepared ?? Cryptography
  • 2. Why Encryption needed ?Why Encryption needed ? How Does CyberSecurity Differs Fromconventional security?How Does CyberSecurity Differs Fromconventional security? • The parties to the transaction cannot be certain of each other’s identities – Email addresses can be spoofed • They cannot be sure that the messages between themhave not been intercepted by third parties – Confidentiality(privacy) of the transaction (read by outsiders) – Integrity of the transaction (changed by outsiders) • How do we achieve unequivocal agreement? – Both parties have the authority to do the transaction – Assurance that neither side can later repudiate the transaction – How do the parties sign their acceptance of the deal? • Do we have adequate evidence to the transaction?
  • 3. Pillars of reliable e- SecurityPillars of reliable e- Security Security Infrastructure Security Policies Authentication Privacy Authorization Integrity ofData Non- Repudiation Reliable e-Transaction/ e-Business Technology Management
  • 4. A PAIN …. Authentication • be sure you know who you are communicating with Privacy (Confidentiality) • keep secrets secret Authorization(Access Control) • ensure users do not exceed their allowed authority Integrity (of the Data) • be sure nothing is changed behind your back Non-Repudiation • have the evidence in the event of a dispute Pillars of reliable e- SecurityPillars of reliable e- Security
  • 5. Cryptography Principles • The science of scrambling a message so that only authorized parties can read it • Process must be reversible – Hiding is called e ncryptio n – Retrieving the hidden message is de cryptio n • Converts the original message (“plaintext”) into a scrambled message (“cipher text”)
  • 6. CONSEQUENCES OF WEAKENCRYPTION …. • World War I, Russian Army at Tannenberg – Two Russian armies couldn’t communicate securely – Germans could read their communications and attack them separately – Result: defeat! • Allied cracked German Enigma Cipher machine in World War 2 – Montgomery (Monty) often read Rommel’s (Desert Fox) orders before he did – Result: tide turned in North Africa • U.S. Navy cryptographers cracked Japanese convoy codes (“Purple”)WW2 – U.S. subs could destroy Japanese submarine ships – Surprise attack on Midway Pacific Island • Germans also cracked Allied codes – U-boats were devastated in the Atlantic
  • 8. Ancient Encryption Techniques A. Secret/Symmetric Key Cryptography Uses a secret key known to both parties (“symmetric”) 1) Caesar Cipher: (Skip 2 letters) A Þ D, B Þ E, etc. - Easy to “crack” by elementary cryptanalyst 2) Mono-Alphabetic Substitution: A long sequence of key consisting of 26 alphabets. Alphabets : a b c d e f … k t .. z Key : Q W E R A B S N C eg: Plain Text a t t a c k Cipher Text Q N N Q E S
  • 10. • Symmetric/Secret Key Cryptography(Modern) – DES (Data Encryption Standard) – Triple DES – AES (Advanced Encryption Standard) – SkipJack – RC2, RC4, RC5, RC6(Rivest Ciphers) • Asymmetric Cryptography -Public Private Key Pairs Cryptography Encryption Techniques (Modern)Encryption Techniques (Modern)
  • 11. Common Symmetric Key Algorithms Algorithm Supporter Length Availability Comments DES NSA, NIST, 40 & 56 bits Public Domain Most widely used; ANSI now too weak Triple-DES - same - 80 & 112 bits Public Domain Stronger variant of DES Skipjack NSA 80 bits Recently Planned for the declassified US Govt’s Clipper RC2, RC4 RSA variable Proprietary Very strong; Websites: rsasecurity.com, nsa.com, nist.com NSA: Netwk Security Agency NIST: National Institute of Standarad & Technology ANSI: American National Standards Institute. SHA: Secure Hash Algo NSI :Netwk Solutions Incorporation
  • 12. Symmetric/Secret Cryptography System EncryptEncrypt Symmetric key (sharedSymmetric key (shared secret,secret, known to A & B)known to A & B) DecryptDecrypt CiphertextCiphertext aN!3q * nB5+ C=E(M, K) C = Ciphertext M= Message (plaintext) K= Secret Key E = Encryption function AliceAlice PlaintextPlaintext Hi Bob Alice !!?? EavesdropperEavesdropper M=D(C, K) D= Decryption function BobBob PlaintextPlaintext Hi Bob Alice
  • 13. Strength OF Symmetric Key Encryption Method ? • Strength of encryption = difficulty of cracking • Length of key (Modern Symmetric Key Encryption uses 128, 256, 1024 bits as key) • Strength of the mathematical algorithm (Modern method uses Hash function) Cracking Symmetric Key EncryptionCracking Symmetric Key Encryption Brute Force = Exhaustive search, trying all possible keys, starts at 0000…..1, etc. • Successful attacks are now possible by using thousands of networked computers linked on the Internet
  • 14. Digital signatures vs Digital certificate Digital certificate is a form of an electronic credential for the Internet. Similar to a driver's license, employee ID card, a Digital certificate is issued by a trusted third party to establish the identity of the certificate holder. The third party who issues the Digital Certificate is known as the Certifying Authority (CA). Digital signatures are electronically generated and can be used to ensure the integrity and authenticity of some data, such as an e-mail message and protect against non-repudiation
  • 15. Key Size No of Possible Keys Crack Time(*) 40 bits 1 x 1012 (1 trillion) 2 hours 56 7 x 1016 20 hrs (12/98) 64 2 x 1019 9 years 112 5 x 1033 1015 years 128 3 x 1038 1019 years 256 1 x 1077 1058 years * Time required for a “brute force” attack, using a hypothetical special- purpose, “cracking” computer Strength of Symmetric Key EncryptionStrength of Symmetric Key Encryption
  • 16. Quote “The problem with bad cryptography is that it looks just like good cryptography” - Bruce Schneider
  • 17. 2) Asymmetric Key Encryption: [Public-Private key pairs] • No shared secret • Bob has two co m plim e ntary ke ys • What one key encrypts, only the other key can decrypt • Bob keeps one key private (Private Key). • Bob shares the other key (Public Key).
  • 18. Asymmetric Key Encryption: Public-Private key pairs Scenario 1 If Alice needs to send Bob a message: - Alice encrypts message with Bob’s public key, - Bob decrypts message with his private key Problem: • How would Bob ensure that the message has been sent by Alice?How would Bob ensure that the message has been sent by Alice? • Anybody can encrypt the message using Bob’s public key as this key is publicly available.Anybody can encrypt the message using Bob’s public key as this key is publicly available. [[Alice’s key not used at all]Alice’s key not used at all] CiphertextCiphertext B's public keyB's public key B's private keyB's private key DecryptDecrypt BobBob #d%G *!ki4i EncryptEncrypt PlaintextPlaintext AliceAlice Hi Bob Alice Hi Bob Alice
  • 19. Public-Private key pairs: Scenario 2: •Alice encrypts message with her private key & sends to Bob. Identity attached •Bob is confirm that the message is from Alice. The message is authentic. •Message is not confidential as anybody can decrypt it using Alice’s public key. Problem: Bob’s key not used at allBob’s key not used at all
  • 20. Putting It All Together Let’s put Encryption and Authentication together
  • 21. PROPERTIES OF A MESSAGE DIGEST (MD)/ HASH FUNCTION • Properties of MD (or hash) functions : – Sho rt o utput: reduces a message to a fixed length, say 16 to 20 characters – One way: impractical to determine a message from its hash – Uniq ue : impractical to find 2 messages with the same hash – Se nsitive : checksum changes if one bit changes or one bit is added to or removed from the message Hash Algo: MD-5(128 bits), SHA1(160bits) • An MD is like a fingerprint – Less information than the original (me) – Unique to me – Unlikely to find 2 individuals with identical fingerprints – Given the fingerprint, can’t reconstruct the person
  • 22. DIGITAL SIGNATURE WITHA MESSAGE DIGEST Plaintext Alice Hi Bob Alice Plaintext Bob Hi Bob Alice =? Hi Bob Alice A's public key 17648902381764890238 5. Alice’s5. Alice’s Message DigestMessage Digest Encrypted MD (“signature”) Unencrypted message A’s private key Digest 1. Message Digest 17648902381764890238 MD 17648902381764890238 MD 3. Compute the MD Digitally Sign 2.Sign it (Encrypt the MD) Decrypt Alice’s MD Decrypt Alice’s MD 4.
  • 23. Certifying Authorities • Certifying Authority is a trusted third party – similar to Passport Office • Certifying Authorities issue digital certificates. Controller of Certifying Authority is the custodian of the following repositories: -National Repository of Digital Certificates -Certificate Revocation List • A certificate contains the following: – Bob’s public key, Bob’s name, address, other info – Expiration date & serial number – The certificate authority’s name, etc. • A digital certificate is “signed” with the Certifying Authority’s private key, to ensure authenticity • Everyone has CA’s public key
  • 24. Basic Certificate Contents as perInternational Standard ITU-T X.509 v3 Version Serial number Signature algorithm Issuername Validity period Subject name Subject public key Identifies certificate format Identifies this certificate Algorithm used to sign certificate Name of certification authority Start date and end date Public key value and indicatorof its algorithm Identifies the owner of the key pair Ensures cert. dataEnsures cert. data can’t be changedcan’t be changed
  • 25. VERISIGN CERTIFICATE CLASSES 1 Class • email address, charges Rs 500/- • Real name, real address, locale, email address • Verified using a “trusted” database (credentials like ration card, passport ClassClass 22 • Real name, real address, locale, email address • Verified using “trusted” database • Verified in person, with notarization ClassClass 33 https: //www. nco de so lutio ns. co m /ce rtificate s. asp
  • 26. CAs licensed underthe Govt. of India IT Act, 2000 (www.cca.gov.in) •Controller of CAs •IDRBT CA(Instt fo r De v & Re se arch in Banking Te ch. , IT Te ch Arm o f RBI) •TCS Certifying Authority (CA) Services •National Informatics Center CA •SafeScrypt •MTNL •Customs & Central Excise •GNFC (n)Code Solutions Ltd., (A division of Gujarat Narmada Valley Fertilizers Company Ltd.)
  • 27. Countermeasures Some of the measures that the Government has decided to take up to counterattack Cyber Terrorism are: • Establishment of National Level Cyber Emergency Response Units • Conducting Security Training & Awareness Programs • Developing Indigenous Security Software • Deploying of Cyber Cops or Cyber Cells to keep a track of various online activities • Deployment of PKI Infrastructure
  • 28. Tools: 1. Wondercrypt: A PKI Solution (wondercrypt.com) 2. PGP (Pretty Good Privacy) Resources: Wikipedia Webopedia Security fresh Zdnet D3pak KumarD3pak Kumar IT security & Forensic Consultant @D3pak Fb/D3pak [email protected]

Editor's Notes

  • #10: This graph is based on counts done at ADFA in the late 1980's, and used to develop the tables published in Seberry & Pieprzyk [SEBE89]. Note that all human languages have varying letter frequencies, though the number of letters and their frequencies varies. Seberry & Pieprzyk [SEBE89] Appendix A has graphs for 20 languages (most European & Japanese & Malay).