encryption, integrity and non-repudiation

7
Encryption, Integrity and Non- repudiation Simplified Mahendra Pratap Singh MS Cyber Law & Security, Lead Auditor ISO 27001 Team Whitehat People Email: [email protected] LinkedIn: www.linkedin.com/in/mpsingrathore Facebook: www.facebook.com/mpsinghrathore1 Website: www.mpsinghrathore.com Twitter: @mpsinghrathore

Upload: mahendra-pratap-singh

Post on 15-Aug-2015

190 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Encryption, Integrity and non-repudiation

Encryption, Integrity and Non-repudiationSimplified

Mahendra Pratap SinghMS Cyber Law & Security, Lead Auditor ISO 27001Team Whitehat People

Email: [email protected]: www.linkedin.com/in/mpsingrathoreFacebook: www.facebook.com/mpsinghrathore1Website: www.mpsinghrathore.comTwitter: @mpsinghrathore

Page 2: Encryption, Integrity and non-repudiation

Confidentiality

Symmetric encryption:-

In this encryption, a secret key is shared between both the parties to encrypt and decrypt message at source and destination respectively.

Asymmetric encryption:- (aka PKI)

This encryption requires 2 separate keys; one is private and another is public. In next slides usage of public and private keys is explained by flow chart to achieve confidentiality, integrity and non-repudiation.

Page 3: Encryption, Integrity and non-repudiation

Confidentiality

Sender (S) Recipient (R)

Sender encrypts message using recipient’s Public key at source.

Message is decrypted at destination using recipient's Private key

01011100100110110

Page 4: Encryption, Integrity and non-repudiation

Authenticity & Non-repudiation

Sender (S) Recipient (R)

Sender encrypts message using sender’s Private key at source.

Message is decrypted at destination using sender’s Public key

Page 5: Encryption, Integrity and non-repudiation

Integrity: Digital Signature

Message Message Hash

Encrypted Hash

Hash Algorithm

Digital Signature

Encrypted by private key of signer.

Transmission

Encrypted Hash

Message Hash

Decrypted by public key of signer.

Page 6: Encryption, Integrity and non-repudiation

Integrity: Digital Signature

If decrypted message hash value at destination matches with second message hash computed at destination, Integrity is ensured.

Page 7: Encryption, Integrity and non-repudiation

By

Mahendra Pratap SinghMS Cyber Law & Security, Lead Auditor ISO 27001

Team Whitehat People

Email: [email protected]: www.linkedin.com/in/mpsingrathoreFacebook: www.facebook.com/mpsinghrathore1Website: www.mpsinghrathore.comTwitter: @mpsinghrathore

Content in slides is best of my understanding with the source.

Thank You