1 / 9

Public Key Cryptography

Public Key Cryptography. Michael Watson Security Incident Management Director Virginia Real Estate Appraiser Board Electronic Portal Committee Meeting November 17, 2008. www.vita.virginia.gov. 1. What is Public Key Cryptography?. Methodology not technology Technology adopts this process

unity
Download Presentation

Public Key Cryptography

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Public Key Cryptography Michael Watson Security Incident Management Director Virginia Real Estate Appraiser Board Electronic Portal Committee Meeting November 17, 2008 www.vita.virginia.gov 1

  2. What is Public Key Cryptography? • Methodology not technology • Technology adopts this process • Based on three principles • Confidentiality • Integrity • Availability • Ties to a digital identity • Provides assurance the data retains its privacy, is not altered, and the original data remains available

  3. Confidentiality • Definition • Assurance of data privacy – only the intended entity or entities may read the data • Digital Encryption • Certificates can provide complete confidentiality using encryption • Private Key • Accessible only by the digital identity who would send related messages

  4. Integrity • Definition • Assurance of non-alteration – the data has not been undetectably modified • Public Key/Private Key • Data encrypted or signed with one can be decrypted with the other • Digital Signature • The encryption of the unique identifier (often referred to as a hash) for the message sent • Typically an encrypted hash • Hash can’t be calculated without the original message • Public key used to decode message verification sent by the public key owner

  5. Availability • Definition • Assurance the original data remains accessible – all algorithms protecting the data should be able to provide access to the data. • PKI algorithms provide availability to the original data

  6. Establishing a Digital Identity • You need to be who you say you are… • Establish your digital identity with a digital representation. • Private Key • Public Key • You need a way for others to confirm they have the right digital identity for you. • Confirmation that the digital representation hasn’t been tampered with and is the one that belongs to you. • Fingerprint/Hash • Digital Signature • Positive Identification Required • Self Certify vs Third Party

  7. The Downside – Key Management • Revoking Certificates • Compromise, Loss, Exposure, etc. • Certificate Revocation Lists • Expiring Trust • Keys, like passwords, can, and should, expire after a period of time.

  8. Questions? Thank you!

More Related