Презентация Key Management. Cryptography applications онлайн

На нашем сайте вы можете скачать и просмотреть онлайн доклад-презентацию на тему Key Management. Cryptography applications абсолютно бесплатно. Урок-презентация на эту тему содержит всего 19 слайдов. Все материалы созданы в программе PowerPoint и имеют формат ppt или же pptx. Материалы и темы для презентаций взяты из открытых источников и загружены их авторами, за качество и достоверность информации в них администрация сайта не отвечает, все права принадлежат их создателям. Если вы нашли то, что искали, отблагодарите авторов - поделитесь ссылкой в социальных сетях, а наш сайт добавьте в закладки.
Презентации » Устройства и комплектующие » Key Management. Cryptography applications



Оцените!
Оцените презентацию от 1 до 5 баллов!
  • Тип файла:
    ppt / pptx (powerpoint)
  • Всего слайдов:
    19 слайдов
  • Для класса:
    1,2,3,4,5,6,7,8,9,10,11
  • Размер файла:
    3.01 MB
  • Просмотров:
    71
  • Скачиваний:
    1
  • Автор:
    неизвестен



Слайды и текст к этой презентации:

№1 слайд
Key Management. Cryptography
Содержание слайда: Key Management. Cryptography applications.

№2 слайд
Cryptanalysis Code Breaking A
Содержание слайда: Cryptanalysis – Code Breaking A number of code breaking (cryptanalysis) methods exist, such as brute-force, ciphertext, and known-plaintext, among others.

№3 слайд
Keys With modern technology,
Содержание слайда: Keys With modern technology, security of encryption lies in the secrecy of the keys, not the algorithm. Two terms that are used to describe keys are: Key length - Also called the key size, this is measured in bits. In this course, we will use the term key length. Keyspace - This is the number of possibilities that can be generated by a specific key length. As key length increases, the keyspace increases exponentially.

№4 слайд
Integrity and Authenticity
Содержание слайда: Integrity and Authenticity Cryptographic Hash Functions Cryptographic hashes are used to verify and ensure data integrity. Hashing is based on a one-way mathematical function that is relatively easy to compute, but significantly harder to reverse. The cryptographic hashing function can also be used to verify authentication. A hash function takes a variable block of binary data, called the message, and produces a fixed-length, condensed representation, called the hash. The resulting hash is also sometimes called the message digest, digest, or digital fingerprint. With hash functions, it is computationally infeasible for two different sets of data to come up with the same hash output. Every time the data is changed or altered, the hash value also changes. 

№5 слайд
Integrity and Authenticity
Содержание слайда: Integrity and Authenticity Cryptographic Hash Operation Mathematically, the equation h= H(x) is used to explain how a hash algorithm operates. A cryptographic hash function should have the following properties: The input can be any length. The output has a fixed length. H(x) is relatively easy to compute for any given x. H(x) is one way and not reversible. H(x) is collision free, meaning that two different input values will result in different hash values.

№6 слайд
Integrity and Authenticity MD
Содержание слайда: Integrity and Authenticity MD5 and SHA Hash functions are used to ensure the integrity of a message. They ensure data has not changed accidentally or intentionally. Three well-known hashing algorithms are 128-bit MD5, SHA-1, and SHA-2. MD5 with 128-bit digest - A one-way function that produces a 128-bit hashed message. MD5 is considered to be a legacy algorithm. It is recommended that SHA-2 be used instead. SHA-1 – Very similar to the MD5 hash functions. Several versions exist. SHA-1 creates a 160 bit hashed message and is slightly slower than MD5. SHA-1 has known flaws and is a legacy algorithm. SHA-2 –Next-generation algorithm and should be used whenever possible. While hashing can be used to detect accidental changes, it cannot be used to guard against deliberate changes. There is no unique identifying information from the sender in the hashing procedure. 

№7 слайд
Integrity and Authenticity
Содержание слайда: Integrity and Authenticity Hash Message Authentication Code To add authentication to integrity assurance, a keyed-hash message authentication code (HMAC) is used. To add authentication, HMAC uses an additional secret key as input to the hash function. Only the sender and the receiver know the secret key, and the output of the hash function now depends on the input data and the secret key.  Only parties who have access to that secret key can compute the digest of an HMAC function.  If the digest that is calculated by the receiving device is equal to the digest that was sent, the message has not been altered. 

№8 слайд
Public Key Cryptography Using
Содержание слайда: Public Key Cryptography Using Digital Signatures

№9 слайд
Public Key Cryptography
Содержание слайда: Public Key Cryptography Digital Signatures for Code Signing

№10 слайд
Public Key Cryptography
Содержание слайда: Public Key Cryptography Digital Signatures for Digital Certificates

№11 слайд
Authorities and the PKI Trust
Содержание слайда: Authorities and the PKI Trust System Public Key Management When establishing an asymmetric connection between two hosts, the hosts will exchange their public key information. Trusted third parties on the Internet validate the authenticity of these public keys using digital certificates. The third party issues credentials that are difficult to forge. From that point forward, all individuals who trust the third party simply accept the credentials that the third party issues.

№12 слайд
Authorities and the PKI Trust
Содержание слайда: Authorities and the PKI Trust System The Public Key Infrastructure

№13 слайд
Authorities and the PKI Trust
Содержание слайда: Authorities and the PKI Trust System The PKI Authorities System

№14 слайд
Authorities and the PKI Trust
Содержание слайда: Authorities and the PKI Trust System The PKI Trust System

№15 слайд
Authorities and the PKI Trust
Содержание слайда: Authorities and the PKI Trust System Interoperability of Different PKI Vendors Interoperability between a PKI and its supporting services is a concern because many CA vendors have proposed and implemented proprietary solutions instead of waiting for standards to develop. To address this interoperability concern, the IETF published the Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework (RFC 2527). The X.509 version 3 (X.509v3) standard defines the format of a digital certificate.

№16 слайд
Authorities and the PKI Trust
Содержание слайда: Authorities and the PKI Trust System Certificate Enrollment, Authentication, and Revocation All systems that leverage the PKI must have the CA’s public key, called the self-signed certificate. The CA public key verifies all the certificates issued by the CA and is vital for the proper operation of the PKI. The certificate enrollment process begins when CA certificates are retrieved in-band over a network, and the authentication is done out-of-band (OOB) using the telephone. The system enrolling with the PKI contacts a CA to request and obtain a digital identity certificate for itself and to get the CA’s self-signed certificate. The final stage verifies that the CA certificate was authentic and is performed using an OOB method such as the Plain Old Telephone System (POTS) to obtain the fingerprint of the valid CA identity certificate. A digital certificate can be revoked if key is compromised or if it is no longer needed.

№17 слайд
Applications and Impacts of
Содержание слайда: Applications and Impacts of Cryptography PKI Applications Some of the many applications of PKIs are: SSL/TLS certificate-based peer authentication Secure network traffic using IPsec VPNs HTTPS Web traffic Control access to the network using 802.1x authentication Secure email using the S/MIME protocol Secure instant messaging Approve and authorize applications with Code Signing Protect user data with the Encryption File System (EFS) Implement two-factor authentication with smart cards Securing USB storage devices

№18 слайд
P Applications and the
Содержание слайда: P Applications and the Impacts of Cryptography Encrypting Network Transactions Threat actors can use SSL/TLS to introduce regulatory compliance violations, viruses, malware, data loss, and intrusion attempts in a network. Other SSL/TLS-related issues may be associated with validating the certificate of a web server. When this occurs, web browsers will display a security warning. PKI-related issues that are associated with security warnings include: Validity date range - The X.509v3 certificates specify “not before” and “not after” dates. If the current date is outside the range, the web browser displays a message. Signature validation error - If a browser cannot validate the signature on the certificate, there is no assurance that the public key in the certificate is authentic.

№19 слайд
P Applications and Impacts of
Содержание слайда: P Applications and Impacts of Cryptography Encryption and Security Monitoring Network monitoring becomes more challenging when packets are encrypted.  Because HTTPS introduces end-to-end encrypted HTTP traffic (via TLS/SSL), it is not as easy to peek into user traffic. Here is a list of some of the things that a security analyst could do: Configure rules to distinguish between SSL and non-SSL traffic, HTTPS and non-HTTPS SSL traffic. Enhance security through server certificate validation using CRLs and OCSP. Implement antimalware protection and URL filtering of HTTPS content. Deploy a Cisco SSL Appliance to decrypt SSL traffic and send it to intrusion prevention system (IPS) appliances to identify risks normally hidden by SSL.

Скачать все slide презентации Key Management. Cryptography applications одним архивом: