encryption, integrity and non-repudiation
TRANSCRIPT
![Page 1: Encryption, Integrity and non-repudiation](https://reader036.vdocument.in/reader036/viewer/2022071702/55cf20f7bb61eb5d6b8b4735/html5/thumbnails/1.jpg)
Encryption, Integrity and Non-repudiationSimplified
Mahendra Pratap SinghMS Cyber Law & Security, Lead Auditor ISO 27001Team Whitehat People
Email: [email protected]: www.linkedin.com/in/mpsingrathoreFacebook: www.facebook.com/mpsinghrathore1Website: www.mpsinghrathore.comTwitter: @mpsinghrathore
![Page 2: Encryption, Integrity and non-repudiation](https://reader036.vdocument.in/reader036/viewer/2022071702/55cf20f7bb61eb5d6b8b4735/html5/thumbnails/2.jpg)
Confidentiality
Symmetric encryption:-
In this encryption, a secret key is shared between both the parties to encrypt and decrypt message at source and destination respectively.
Asymmetric encryption:- (aka PKI)
This encryption requires 2 separate keys; one is private and another is public. In next slides usage of public and private keys is explained by flow chart to achieve confidentiality, integrity and non-repudiation.
![Page 3: Encryption, Integrity and non-repudiation](https://reader036.vdocument.in/reader036/viewer/2022071702/55cf20f7bb61eb5d6b8b4735/html5/thumbnails/3.jpg)
Confidentiality
Sender (S) Recipient (R)
Sender encrypts message using recipient’s Public key at source.
Message is decrypted at destination using recipient's Private key
01011100100110110
![Page 4: Encryption, Integrity and non-repudiation](https://reader036.vdocument.in/reader036/viewer/2022071702/55cf20f7bb61eb5d6b8b4735/html5/thumbnails/4.jpg)
Authenticity & Non-repudiation
Sender (S) Recipient (R)
Sender encrypts message using sender’s Private key at source.
Message is decrypted at destination using sender’s Public key
![Page 5: Encryption, Integrity and non-repudiation](https://reader036.vdocument.in/reader036/viewer/2022071702/55cf20f7bb61eb5d6b8b4735/html5/thumbnails/5.jpg)
Integrity: Digital Signature
Message Message Hash
Encrypted Hash
Hash Algorithm
Digital Signature
Encrypted by private key of signer.
Transmission
Encrypted Hash
Message Hash
Decrypted by public key of signer.
![Page 6: Encryption, Integrity and non-repudiation](https://reader036.vdocument.in/reader036/viewer/2022071702/55cf20f7bb61eb5d6b8b4735/html5/thumbnails/6.jpg)
Integrity: Digital Signature
If decrypted message hash value at destination matches with second message hash computed at destination, Integrity is ensured.
![Page 7: Encryption, Integrity and non-repudiation](https://reader036.vdocument.in/reader036/viewer/2022071702/55cf20f7bb61eb5d6b8b4735/html5/thumbnails/7.jpg)
By
Mahendra Pratap SinghMS Cyber Law & Security, Lead Auditor ISO 27001
Team Whitehat People
Email: [email protected]: www.linkedin.com/in/mpsingrathoreFacebook: www.facebook.com/mpsinghrathore1Website: www.mpsinghrathore.comTwitter: @mpsinghrathore
Content in slides is best of my understanding with the source.
Thank You