encryption

encryption - Tools Available to Achieve Site Security 1...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Tools Available to Achieve Site Security 1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Technology Solutions Protecting Internet communications (encryption) Securing channels of communication (SSL, S-HTTP, VPNs) Protecting networks (firewalls) Protecting servers and clients 2
Background image of page 2
ePayment Security Solution Keep financial data secret from unauthorized parties (privacy) CRYPTOGRAPHY Verify that messages have not been altered in transit (integrity) HASH FUNCTIONS Prove that a party engaged in a transaction (nonrepudiation) DIGITAL SIGNATURES Verify identity of users (authentication) PASSWORDS, DIGITAL CERTIFICATES 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Protecting Internet Communications: Encryption Process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and receiver Purpose: Secure stored information and information transmission Provides: Message integrity Nonrepudiation Authentication Confidentiality 4
Background image of page 4
Encryption Components 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Symmetric Key Encryption Also known as secret key encryption Both the sender and receiver use the same digital key to encrypt and decrypt message Requires a different set of keys for each transaction Advanced Encryption Standard (AES): Most widely used symmetric key encryption today; offers 128-, 192-, and 256-bit encryption keys; other standards use keys with up to 2,048 bits 6
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 21

encryption - Tools Available to Achieve Site Security 1...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online