SlideShare ist ein Scribd-Unternehmen logo
1 von 40
Cryptography & E-Commerce Keeping your Secrets secret! © University of Glamorgan    SLIDE “ Some simple yet secure cipher, easily acquired and easily read, should be introduced by which messages might to all intents and purposes be ‘sealed’ to any person but the recipient” Quarterly Review 1853,  [The Victorian Internet, Tom Standage]
Cryptography & E-Commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    SLIDE    WEB
Why use Cryptography? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    SLIDE [Chan et al]
Cryptography in e-commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    SLIDE    WEB
Cryptography in e-commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    SLIDE    WEB
History of Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan *US DOD  orange book standard    SLIDE    WEB
[object Object],[object Object],[object Object],Cryptographic basics  © University of Glamorgan    SLIDE    WEB
Basic Encryption Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    SLIDE    WEB
The Caesar Substitution Cipher © University of Glamorgan The  Caesar cipher  is named after Julius Caesar, said to be the first to use it. In the Caesar cipher each character is substituted by another. This technique is called a monoalphabetic cipher. Plaintext: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Ciphertext:   O P Q R S T U V W X Y Z A B C D E F G H I J K L M N Thus using a Caesar cipher, the message “Mission Impossible” would be encoded as  “ AWGGWN WADCGGWPZS” So what do the following ciphertexts mean ? 1) sbwuao 2)   gpkioc 3) kohqv cih tcf pfihig    SLIDE    WEB
A Simple Transposition Cipher ,[object Object],[object Object],© University of Glamorgan    SLIDE    WEB you live you learn   yo ul iv ey ou le ar n Encryption System  yuieolanolvyuer
Types of Ciphers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    SLIDE    WEB
Asymmetric and Symmetric encryption ,[object Object],[object Object],© University of Glamorgan One form of symmetric algorithm which can be mathematically proved to be unbreakable is the  one time pad  this uses a secret key once, which is then thrown away. This is expensive and difficult to manage, due to the number of keys used.     SLIDE    WEB
[object Object],[object Object],One time Pad © University of Glamorgan    SLIDE    WEB A  B  C Plaintext 01000011  01000001  01000010 key 11010001  01111001  00101011 ciphertext 10010010  00111000  01101001 One time pads are unbreakable – However if we use a limited length key the cipher could be broken by brute force.  33 bit key - 8 billion possibilities - 1 day on  PC. 56 bit key - 3 thousand trillion possibilities - supercomputer is required. Truly random key same length as message
Symmetric Algorithms (1) ,[object Object],[object Object],[object Object],© University of Glamorgan    SLIDE    WEB
Symmetric Algorithms (2)  ,[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    SLIDE    WEB
Asymmetric Encryption Systems (1) ,[object Object],© University of Glamorgan Plaintext Ciphertext If Key 1 was used last, then use Key2 If Key 2 was used last, then use Key1 A simple example of a one way function this will encrypt the message in a way which cannot be reversed. A pair of keys can generated using prime numbers and the modulus operator.    SLIDE    WEB If Key 1 was used last, then use Key2 If Key 2 was used last, then use Key1 Plaintext A Ciphertext P ,[object Object],[object Object],[object Object]
Public & Private Key Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    SLIDE    WEB
Encryption and E-commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan
Security Requirements and Key Length ,[object Object],[object Object],[object Object],© University of Glamorgan ,[object Object],[object Object],   SLIDE    WEB Type of Traffic Lifetime Min key length Product announcements, interest rates days/weeks 64 bits Long-term business plans years 80 bits Trade secrets decades 112 bits Identification of spies > 50 years 128 bits Security Requirements for Different Information
Cryptography and e-commerce Examples © University of Glamorgan    WEB    SLIDE
Digital Signatures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    WEB    SLIDE 011110100101101
Symmetric Key Digital Signatures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    WEB    SLIDE
Symmetric Key Digital Signatures © University of Glamorgan S  sends sealed  M  to Arbiter SENDER K S M ARBITER Arbiter retrieves  plaintext  M  from  S M K S M K R S M Arbiter seals [ Message received from  Sender  E ( M , K S ), Identify of Sender  S ,  and copy of plaintext  M  ] and sends all to  R RECIPIENT    WEB    SLIDE 1 2 3
Asymmetric Key Digital Signatures ,[object Object],[object Object],[object Object],[object Object],© University of Glamorgan A PRI M Encrypts message with B PUB  and  A PRI   and then send the message SENDER M Decrypts message with  B PRI  and  A PUB   in order to derive  M . RECIPIENT B PUB    WEB    SLIDE 1 2
Digital Signatures and Timestamps ,[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan A PRI M Encrypts message with B PUB  and  A PRI   and then send the message SENDER M Decrypts message with  B PRI  and  A PUB   in order to derive  M . RECIPIENT B PUB    WEB    SLIDE 1 2
Public Keys and Digital Signatures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    WEB    SLIDE
The Electronic Communications Act 2000 ,[object Object],[object Object],[object Object],[object Object],© University of Glamorgan
The International Context ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan
Contract Signing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    WEB    SLIDE
Blind Signatures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan Original Message Envelope containing  Message and Carbon paper Envelope containing  Message and Carbon paper Original Message Blinding Process Sent to Signer Remove  Envelope  Signature Signature    WEB    SLIDE
Blind Signatures & Ecash Coins ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    WEB    SLIDE
Some Legal Stuff.. RIPA (2000) ,[object Object],[object Object],[object Object],© University of Glamorgan    WEB    SLIDE
Summary of terms © University of Glamorgan    SLIDE    WEB ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Certificates  (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan Name:  Iain Sutherland Position:  Lecturer Public Key: 71F1890ACDE45….. Name:  University of Glam Position:  Employer Public Key: 7897636361FA….. Chain of Certificates Encrypted under University of Glamorgan’s Private Key Certificate for Iain Sutherland Encrypted under HEFC’s Private Key “ Islands of Trust”    WEB    SLIDE
Certificates  (2) © University of Glamorgan
Certificates  (3) © University of Glamorgan
Certificates  (4) © University of Glamorgan
An example of Cryptography: SET ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    SLIDE    WEB
SET Transaction ,[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan 1. Request Transaction 2. Acknowledgement request 3. Purchase order 4. Purchase order verification  5. Customer Payment data 6. Verify customer data 7. Status Query 8. Purchase Status information  9. Request payment 10. Verify payment  [Redrawn from Ghosh p132]  An  overview of the purchase / payment process used by SET (Secure Electronic Transactions) Consumer Bank Vendor
B2C: SET protocol ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© University of Glamorgan    OHP    Handout Customer message to Merchant Customer message to Bank M2 Message Digest M1 Message Digest M3 Message Digest  Encrypted with Bank Key Only the bank can read it  Encrypted with Merchant Key Only the merchant can read it M3=Digest(M1+M2) Dual Customer Signature Encrypted with Private Key

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Cryptography
CryptographyCryptography
Cryptography
 
Digital signature & certificate
Digital signature & certificateDigital signature & certificate
Digital signature & certificate
 
Set Secure Electronic Transaction (SET)
Set Secure Electronic Transaction(SET)Set Secure Electronic Transaction(SET)
Set Secure Electronic Transaction (SET)
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Security in e commerce
Security in e commerceSecurity in e commerce
Security in e commerce
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Presentation - Electronic Data Interchange
Presentation - Electronic Data InterchangePresentation - Electronic Data Interchange
Presentation - Electronic Data Interchange
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Secure Electronic Transaction
Secure Electronic TransactionSecure Electronic Transaction
Secure Electronic Transaction
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Electronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceElectronic Payment Systems in E Commerce
Electronic Payment Systems in E Commerce
 
Cyber cash
Cyber cashCyber cash
Cyber cash
 
Digital signature
Digital signatureDigital signature
Digital signature
 
M-Commerce
M-CommerceM-Commerce
M-Commerce
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message Security
 

Andere mochten auch

NEURAL Network Design Training
NEURAL Network Design  TrainingNEURAL Network Design  Training
NEURAL Network Design TrainingESCOM
 
Sublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir SabharwalSublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir SabharwalSukhvir Sabharwal
 
Analysis and applications of artificial neural networks
Analysis and applications of artificial neural networksAnalysis and applications of artificial neural networks
Analysis and applications of artificial neural networksSnehil Rastogi
 
Lessons from Software for Synthetic Biology
Lessons from Software for Synthetic BiologyLessons from Software for Synthetic Biology
Lessons from Software for Synthetic BiologyTim O'Reilly
 
artificial neural network
artificial neural networkartificial neural network
artificial neural networkPallavi Yadav
 
Micromachining Technology Seminar Presentation
Micromachining Technology Seminar PresentationMicromachining Technology Seminar Presentation
Micromachining Technology Seminar PresentationOrange Slides
 
Laser Assisted Micro Machining (lamm)
Laser Assisted Micro Machining (lamm)Laser Assisted Micro Machining (lamm)
Laser Assisted Micro Machining (lamm)Pratik Gandhi
 
IBA Admission - Mystery Revealed (Infographics)
IBA Admission - Mystery Revealed (Infographics)IBA Admission - Mystery Revealed (Infographics)
IBA Admission - Mystery Revealed (Infographics)Ayman Sadiq
 
Artificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKSArtificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKSREHMAT ULLAH
 
Introduction Of Artificial neural network
Introduction Of Artificial neural networkIntroduction Of Artificial neural network
Introduction Of Artificial neural networkNagarajan
 
neural network
neural networkneural network
neural networkSTUDENT
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Artificial neural networks
Artificial neural networksArtificial neural networks
Artificial neural networksstellajoseph
 

Andere mochten auch (20)

NEURAL Network Design Training
NEURAL Network Design  TrainingNEURAL Network Design  Training
NEURAL Network Design Training
 
Sublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir SabharwalSublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir Sabharwal
 
Virtual manufacturing
Virtual manufacturingVirtual manufacturing
Virtual manufacturing
 
How does rotary heat machine work on fabric
How does rotary heat machine work on fabricHow does rotary heat machine work on fabric
How does rotary heat machine work on fabric
 
Cryptography
CryptographyCryptography
Cryptography
 
Analysis and applications of artificial neural networks
Analysis and applications of artificial neural networksAnalysis and applications of artificial neural networks
Analysis and applications of artificial neural networks
 
Lessons from Software for Synthetic Biology
Lessons from Software for Synthetic BiologyLessons from Software for Synthetic Biology
Lessons from Software for Synthetic Biology
 
Thesis presentation
Thesis presentationThesis presentation
Thesis presentation
 
Smartplug ppt
Smartplug pptSmartplug ppt
Smartplug ppt
 
artificial neural network
artificial neural networkartificial neural network
artificial neural network
 
Micromachining Technology Seminar Presentation
Micromachining Technology Seminar PresentationMicromachining Technology Seminar Presentation
Micromachining Technology Seminar Presentation
 
Laser Assisted Micro Machining (lamm)
Laser Assisted Micro Machining (lamm)Laser Assisted Micro Machining (lamm)
Laser Assisted Micro Machining (lamm)
 
IBA Admission - Mystery Revealed (Infographics)
IBA Admission - Mystery Revealed (Infographics)IBA Admission - Mystery Revealed (Infographics)
IBA Admission - Mystery Revealed (Infographics)
 
Artificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKSArtificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKS
 
Introduction Of Artificial neural network
Introduction Of Artificial neural networkIntroduction Of Artificial neural network
Introduction Of Artificial neural network
 
neural network
neural networkneural network
neural network
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Artificial neural networks
Artificial neural networksArtificial neural networks
Artificial neural networks
 

Ähnlich wie Cryptography and E-Commerce

Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingSumit Satam
 
MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)Neelabja Manna
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overviewppd1961
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Techglyphs
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writingtahirilyas92
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesMona Rajput
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptographyPavithra renu
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyGayathridevi120
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
 
Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxLecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxmustafaenayat
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"Aditya Raina
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptPayalChopra9
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxmagoigamtatiro1
 

Ähnlich wie Cryptography and E-Commerce (20)

Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Otp
OtpOtp
Otp
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
Unit 1 QB.docx
Unit 1 QB.docxUnit 1 QB.docx
Unit 1 QB.docx
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxLecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptx
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptx
 
cryptography
cryptographycryptography
cryptography
 

Mehr von Hiep Luong

Youth in Community at Youth for Cause Dialogue Session 10 June 2011
Youth in Community  at Youth for Cause Dialogue Session 10 June 2011Youth in Community  at Youth for Cause Dialogue Session 10 June 2011
Youth in Community at Youth for Cause Dialogue Session 10 June 2011Hiep Luong
 
Lin at youth for cause dialogue session 10 june 2011
Lin at youth for cause dialogue session 10 june 2011Lin at youth for cause dialogue session 10 june 2011
Lin at youth for cause dialogue session 10 june 2011Hiep Luong
 
Gop Sang at Youth for Cause Dialogue Session 10 June 2011
Gop Sang at Youth for Cause Dialogue Session 10 June 2011Gop Sang at Youth for Cause Dialogue Session 10 June 2011
Gop Sang at Youth for Cause Dialogue Session 10 June 2011Hiep Luong
 
Gop sang at youth for cause dialogue session 10 june 2011
Gop sang  at youth for cause dialogue session 10 june 2011Gop sang  at youth for cause dialogue session 10 june 2011
Gop sang at youth for cause dialogue session 10 june 2011Hiep Luong
 
Eco profile at youth for cause dialogue session 10 june 2011
Eco profile at youth for cause dialogue session 10 june 2011Eco profile at youth for cause dialogue session 10 june 2011
Eco profile at youth for cause dialogue session 10 june 2011Hiep Luong
 
Be a guardian evg at youth for cause dialogue session 10 june 2011
Be a guardian   evg at youth for cause dialogue session 10 june 2011Be a guardian   evg at youth for cause dialogue session 10 june 2011
Be a guardian evg at youth for cause dialogue session 10 june 2011Hiep Luong
 
Touch group at youth for cause dialogue session 10 june 2011
Touch group at youth for cause dialogue session 10 june 2011Touch group at youth for cause dialogue session 10 june 2011
Touch group at youth for cause dialogue session 10 june 2011Hiep Luong
 
Structured teaching
Structured teachingStructured teaching
Structured teachingHiep Luong
 
S211 conference pr presentation jg master
S211 conference pr presentation jg masterS211 conference pr presentation jg master
S211 conference pr presentation jg masterHiep Luong
 
Presentation Layer
Presentation LayerPresentation Layer
Presentation LayerHiep Luong
 
Defining business process and workflows
Defining business process and workflowsDefining business process and workflows
Defining business process and workflowsHiep Luong
 
ECM Introduction
ECM IntroductionECM Introduction
ECM IntroductionHiep Luong
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business IntelligenceHiep Luong
 
Search overview
Search overviewSearch overview
Search overviewHiep Luong
 
Communication Training
Communication TrainingCommunication Training
Communication TrainingHiep Luong
 
Time management
Time managementTime management
Time managementHiep Luong
 

Mehr von Hiep Luong (20)

Youth in Community at Youth for Cause Dialogue Session 10 June 2011
Youth in Community  at Youth for Cause Dialogue Session 10 June 2011Youth in Community  at Youth for Cause Dialogue Session 10 June 2011
Youth in Community at Youth for Cause Dialogue Session 10 June 2011
 
Lin at youth for cause dialogue session 10 june 2011
Lin at youth for cause dialogue session 10 june 2011Lin at youth for cause dialogue session 10 june 2011
Lin at youth for cause dialogue session 10 june 2011
 
Gop Sang at Youth for Cause Dialogue Session 10 June 2011
Gop Sang at Youth for Cause Dialogue Session 10 June 2011Gop Sang at Youth for Cause Dialogue Session 10 June 2011
Gop Sang at Youth for Cause Dialogue Session 10 June 2011
 
Gop sang at youth for cause dialogue session 10 june 2011
Gop sang  at youth for cause dialogue session 10 june 2011Gop sang  at youth for cause dialogue session 10 june 2011
Gop sang at youth for cause dialogue session 10 june 2011
 
Eco profile at youth for cause dialogue session 10 june 2011
Eco profile at youth for cause dialogue session 10 june 2011Eco profile at youth for cause dialogue session 10 june 2011
Eco profile at youth for cause dialogue session 10 june 2011
 
Be a guardian evg at youth for cause dialogue session 10 june 2011
Be a guardian   evg at youth for cause dialogue session 10 june 2011Be a guardian   evg at youth for cause dialogue session 10 june 2011
Be a guardian evg at youth for cause dialogue session 10 june 2011
 
Touch group at youth for cause dialogue session 10 june 2011
Touch group at youth for cause dialogue session 10 june 2011Touch group at youth for cause dialogue session 10 june 2011
Touch group at youth for cause dialogue session 10 june 2011
 
Structured teaching
Structured teachingStructured teaching
Structured teaching
 
SSL
SSLSSL
SSL
 
S211 conference pr presentation jg master
S211 conference pr presentation jg masterS211 conference pr presentation jg master
S211 conference pr presentation jg master
 
Presentation Layer
Presentation LayerPresentation Layer
Presentation Layer
 
E-Commerce
E-CommerceE-Commerce
E-Commerce
 
Ptit tmdt
Ptit   tmdtPtit   tmdt
Ptit tmdt
 
Defining business process and workflows
Defining business process and workflowsDefining business process and workflows
Defining business process and workflows
 
ECM Introduction
ECM IntroductionECM Introduction
ECM Introduction
 
Collaboration
CollaborationCollaboration
Collaboration
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business Intelligence
 
Search overview
Search overviewSearch overview
Search overview
 
Communication Training
Communication TrainingCommunication Training
Communication Training
 
Time management
Time managementTime management
Time management
 

Kürzlich hochgeladen

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Cryptography and E-Commerce

  • 1. Cryptography & E-Commerce Keeping your Secrets secret! © University of Glamorgan  SLIDE “ Some simple yet secure cipher, easily acquired and easily read, should be introduced by which messages might to all intents and purposes be ‘sealed’ to any person but the recipient” Quarterly Review 1853, [The Victorian Internet, Tom Standage]
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. The Caesar Substitution Cipher © University of Glamorgan The Caesar cipher is named after Julius Caesar, said to be the first to use it. In the Caesar cipher each character is substituted by another. This technique is called a monoalphabetic cipher. Plaintext: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Ciphertext: O P Q R S T U V W X Y Z A B C D E F G H I J K L M N Thus using a Caesar cipher, the message “Mission Impossible” would be encoded as “ AWGGWN WADCGGWPZS” So what do the following ciphertexts mean ? 1) sbwuao 2) gpkioc 3) kohqv cih tcf pfihig  SLIDE  WEB
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. Cryptography and e-commerce Examples © University of Glamorgan  WEB  SLIDE
  • 21.
  • 22.
  • 23. Symmetric Key Digital Signatures © University of Glamorgan S sends sealed M to Arbiter SENDER K S M ARBITER Arbiter retrieves plaintext M from S M K S M K R S M Arbiter seals [ Message received from Sender E ( M , K S ), Identify of Sender S , and copy of plaintext M ] and sends all to R RECIPIENT  WEB  SLIDE 1 2 3
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. Certificates (2) © University of Glamorgan
  • 36. Certificates (3) © University of Glamorgan
  • 37. Certificates (4) © University of Glamorgan
  • 38.
  • 39.
  • 40.

Hinweis der Redaktion

  1. Simple example of cryptography
  2. Example of a digital crypto system