VIEWS: 85 PAGES: 23 CATEGORY: Communications & Networking POSTED ON: 12/13/2010
the presentation about encryption and decryption, electronic signature, digital signature, authentication, private key, public key, hashing algorithms, credit cards, online banking, smart cards.
Electronic signature & electronic paymant methods Universität Heidelberg Fachübersetzen im Kontext europäischer Normen Dozent: Dr. John Stewart Referentin: Oksana Novakova WS 2009/2010 14.12.2009 Outline Encryption and decryption Electronic signature Digital signature Authentication Private key Public key Hashing algorithms Credit cards Online banking Smart cards 13.12.2010 2 Sensitive information Credit-card information Social security numbers Private correspondence Personal details Sensitive company information Bank-account information 13.12.2010 3 Encryption and Decryption Encryption is the method of disguising plaintext in such a way as to hide its substance Decryption is the process of reverting ciphertext in its original plaintext 13.12.2010 4 Encryption and Decryption 13.12.2010 5 Electronic signature Is defined as an electronic sound, symbol or process attached to or logically associated with a record, and executed or adopted by a person with the intent to sign the record. 13.12.2010 6 Digital signature Is a way to ensure that an electronic document is authentic Rely on certain types of encryption to ensure authentication 13.12.2010 7 Difference? Electronic signature insecure way of signing documents Are vulnerable to copying and tempering, making forgery easy Digital signature is legally binding > secure Based on PKI (Public Key Infrastructure) and is the result of a cryptographic operation that guarantees signer authenticity 13.12.2010 8 How does it work You copy-and-paste the contract Using the special software, you obtain a message hash (mathematical summary) of the contract You then use a private key that you previously obtained from a public-private-key authority to encrypt the hash The encrypted hash becomes your digital signature of the message 13.12.2010 9 How does it work At the other end To make sure it is intact and from you, the recipient makes a hash of the received message The recipient then uses your public key to decrypt the message hash or summery If the hashes match, the received message is valid 13.12.2010 10 Digital signature http://www.arx.com/flash/Digital- Signatures-for-Word-2003.htm 13.12.2010 11 13.12.2010 12 Authentication Is used to verify that the information comes from a trusted source ways of authentication: Password Digital signatures Private key encryption Public key encryption Hash value Digital certificate 13.12.2010 13 Private key encryption Is the secret key of the computer Encrypts the information 13.12.2010 14 Public key encryption The combination of a private key and a public key Decodes the encrypted message 13.12.2010 15 Hashing algorithm Hashing is the transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string. the public key encryption is based on a hash value 13.12.2010 16 Hashing algorithm The value is computed from a base input number using a hashing algorithm Input number Hashing Hash value algorithm 10,667 Input # x 143 1,525,381 13.12.2010 17 Digital certificate Serves for the secure Web server The information that says the Web server is trusted by an independent source known as a Certificate Authority 13.12.2010 18 Credit cards Origin USA during 1920 Contains the identification information such as a signature and picture and authorizes the person 13.12.2010 19 Smart cards Innovative application that involves all aspects of cryptography Has an microprocessor built into the card itself Has enhanced memory and processing > several different applications on a single card 13.12.2010 20 Online banking Advantages Convenience Ubiquity Efficiency effectiveness 13.12.2010 21 Online banking Disadvantages Start-up may take time Learning curve Bank site changes The trust thing 13.12.2010 22 Sources: http://www.arx.com/digital-signatures- faq.php#digital-signature http://computer.howstuffworks.com/encryption5. htm http://money.howstuffworks.com/personal- finance/debt-management/credit-card.htm http://computer.howstuffworks.com/encryption.h tm http://www.arx.com/flash/Digital-Signatures-for- Word-2003.htm 13.12.2010 23
Pages to are hidden for
"Electronic signature _ digital signature"Please download to view full document