CHAPTER 4 AUTHENTICAYIOM ENCRYPTION,CRPTOGRAPHY AND DIGITAL SIGNATURE

Get Started. It's Free
or sign up with your email address
Rocket clouds
CHAPTER 4 AUTHENTICAYIOM ENCRYPTION,CRPTOGRAPHY AND DIGITAL SIGNATURE by Mind Map: CHAPTER 4 AUTHENTICAYIOM ENCRYPTION,CRPTOGRAPHY AND DIGITAL SIGNATURE

1. AUTHENTICATION

1.1. PURPOSE OF AUTHENTICATION

1.1.1. PROCESS WHICH ALLOWS A SENDER AND RECEIVER OF INFORMATION TO VALIDATE EACH OTHER

1.1.2. IF SENDER AND RECEIVER OF INFORMATION CANNOT PROPERLY AUTHENTICATE EACH OTHER,THERE IS NO TRUST IN THE ACTIVITIES OR INFORMATION PROVIDED BY EITHER PARTY

1.2. AUTHENTICAION APPLICATION TECHNOLOGIES

1.3. ATTACKS

1.3.1. BRUTE FORCE

1.3.2. WEAK PASSWORD RECOVERY VALIDATION

1.3.3. INSUFFICIENT AUTHENTICATION

1.4. ENCRYPTION AND DIGITAL SIGNATURES

1.4.1. -PROCESS OF ENCODING MESSAGES IN SUCH A WAY THAT HACKERS CANNOT READ IT

1.4.2. TECHNIQUE OF CONVERTING DATA TO A FORMAT THAT IS MEANINGLESS TO ANYONE

1.4.3. ANYONE CAN SEE THE CIPHERTEXT SHOUT NOT BE ABLE TO DETERMINE ANYTHING ABOUT THE INFORMATION

1.5. IMPORTANCE OF AUTHENTICATION -IDENTIFY USER AND SYSTEM -INHABITS IDENTITY THEFT -AVOID FRAUD

1.6. USING SIGNATURE

1.6.1. A MATHEMATICAL TECHNIQUE USED TO VALIDATE THE AUTHENTICITY AND INTEGRITY OF A MESSAGE,SOFTWARE OR DIGITAL DOCUMENT

1.6.2. THE DIGITAL EQUIVALENT OF A HANDWRITTEN SIGNATURE OR STAMPED SEAL BUT OFFERING FAR MORE INHERENT SECURITY

2. ENCRYPTION SHCEME

2.1. PURPOSE -ENCRYPTION CAN PROTECT DATA FROM SNOOPING AND PROTECT DATA FROM BEING ALTERED

2.1.1. CLASSES OF KEY-BASED ENCRYPTION ALGORITHM -SYMMETRIC ALGORITHM -ASYMMETRIC ALGORITHM

2.1.1.1. SYMMETRIC ALGROTIHM -TAKING PLAINTEXT AND CONVERTIONG IT TO CIPHERTEXT USING THE SAME KEY OR SECRET TO ENCRYPT AND DECRYPT THE TEXT USE A SINGLE KEY WHEREAS ASYMMETRIC USES TWO KEYS

2.1.1.2. ASYMMETRIC ALGORITHM -ALSO KNOWN AS PUBLIC KEY CRYPTOGRAPHY -USE TWO KEYS TO ENCYPT A PLAINTEXT SECRET KEY ARE EXCHANGED OVER THE INTERNET OR A LARGE NETWORK -IMPORTANT TO NOTE THAT ANYONE WITH SECRET KEY CAN DECRYPT THE MESAGE AND THIS IS WHY ASYMMETRICAL ENCRYPTION USE TWO RELATED KEYS TO BOOSTING SECURITY

3. DIGITAL SIGNATURES

3.1. -LIKE ELECTRONIC "FINGERPRINT" IN THE FORM OF A CODED MESSAGE,THE DIGITAL SIGNATURE SECURELY ASSOCIATES A SIGNER WITH A DOCUMENT IN A RECORDED TRANSACTION -USE A STANDARD,ACCEPTED FORMAT CALLED PUBLIC KEY INFRASTURCTURE(PKI) TO PROVIDE THE HIGHEST LEVELS OF SECURITY AND UNIVERSAL ACCEPTANCE

3.2. FUNCTION

3.2.1. RECIPIENT CAN VERIFY THE IDENTITY OF THE SENDER(AUTHENTICITY)

3.2.2. SENDER CANNOT DENY THAT HE SIGNED A DOCUMENT(NON-REPUDIATION)

3.2.3. RECIPIENT UNABLE TO INVENT OR MODIFY A DOCUMENT SIGNED BY SOMEONE ELSE(INTEGRITY)

4. CRYPTOGRAPHY

4.1. -SCIENCE OF USING MATHEMATICS TO ENCRYPT AND DECRYPT DATA -ENABLE STORE SENSITIVE INFORMATION OR TRANSMIT IT ACROSS INSECURE NETWORK(INTERNET) SO IT CANNOT BE READ BY ANYONE EXCEPT THE INTENDED RECIPIENT

4.2. TOOLS

4.2.1. JCA AND JCE -CRYPTOGRAPHIC LIBRARIES FOR JAVA

4.2.2. SECURITY TOKEN -ALLOW FOR REMOTE AUTHENTICATION

4.2.3. KEY-BASED AUTHENTICATION -USING ASYMMETRIC CRYPTOGRAPHY FOR REMOTE AUTHENTICATION

4.2.4. DOCKER -APPLICATION THAT ALLOWS FOR DEVELOPING SCALABLE APPLICATION INSIDE SOFTWARE CONTAINERS

4.3. TERMINOLOGIES

4.3.1. A.ENRYPTION B.CIPHER TEXT C.DECRYPTION D.CRYPTANALYSIS

4.3.1.1. ENCRYPTION THE PROCESS OF ENCODING A MESSAGE OR INFORMATION IN SUCH A WAY THAT ONLY AUTHORIZED PARITES CAN ACCESS IT

4.3.1.2. CIPHER TEXT RESULT OF ENCYPTION PERFORMED ON PLAINTEXT USING AN ALGORITHM CALLED CIPHER

4.3.1.3. DECRYPTION PROCESS OF TAKING ENCODED OR ENCRYPTED TEXT OR OTHER DATA AND CONVERTING IT BACK INTO TEXT OR THE COMPUTER READ AND UNDERSTAND

4.3.1.4. CRYPTANALYSIS DECYPTION AND ANALYSIS OF CODES,CIPHERS OR ENCRYPTED TEXT

4.4. MESSAGE AUTHENTICATION

4.4.1. ENSURES THAT THE MESSAGE HAS BEEN SENT BY A GENUINE IDENTITY AND NOT BY IMPOSTER

4.5. MESSAGE AUTHENTICATION USING CRYPTOGRAPHY

4.5.1. CAN BE PROVIDED USING CRYPTOGRAPHIC TECHNIQUE THAT USE SECRET KEYS AS DONE IN CASE OF ENCRYPTION

4.5.2. TYPES

4.5.2.1. MESSAGE ENCRYPTION -THE CIPHERTEXT SERVES AS AUTHENTICATOR

4.5.2.2. MESSAGE AUTHENTICATION CODE(MAC) -A PUBLIC FUNCTION OF THE MESSAGE AND A SECRET KEY PRODUCING A FIXEDLENGTH VALUE TO SERVE AS AUTHENTICATOR

4.5.2.3. HASH FUNCTION -A PUBLIC FUNCTION MAPPING AN ARBITRARY LENGTH MESSAGE INTO A FIXED-LENGTH HASH VALUE TO SERVE AS AUTHENTICATOR

4.6. SOFTWARE TO SECURE DATA OVER THE NETWORK

4.6.1. A.SAFECRYPTOR B.ABC CHAOS C.POLAR CRYPTO LIGHT D.ENRYPTONCLICK