The major goal of encryption is to prevent data from being read by any third party.
A digital signature is a mechanism by which a message is authenticated i.e. proving that a message is coming from a given sender
Refers to the application of encryption on data, while on storage media, eg disks.
Can we be sure that current encryption methods will remain secure in the future.
We can use hashing to secure passwords.
We can use hashing to provide a means to ensure that data is not altered.
· The Web server creates a private/public key pair.
· The Web server creates a Certificate Signing Request with its private key and sends it to the CA.
· The CA then signs the Certificate Signing Request with its own Private key and sends it back to the Web server.
· The Web server can verify that the returned Certificate Signing Request came from the CA by decrypting the message using the CA’s freely available public key.
· The Web server has created a private/public key pair beforehand.
· The browser requests a secure page (usually https://) from the Web server.
· The Web server uses its own private key to encrypt a message containing the CA’s signed certificate.
· The web server sends this encrypted message to the browser.
· The browser uses the Web server’s public key to decrypt the Web server’s message - the CA’s signed certificate is now revealed, although its encrypted by the CA so it won’t make sense yet.
· The browser then uses the CA’s public key to decrypt the CA’s signed certificate.
· The browser can now check that the certificate was issued by a trusted party (usually a trusted CA), that the certificate is still valid and that the certificate is related to the site contacted.
· In which case the browser can conclude the message is from the correct Web server.
RSA is used to come up with a public/private key pair for asymmetric (“public-key”) encryption.
Diffie-Hellman is used to generate a shared secret in public for later symmetric (“private-key”) encryption.
Encryption helps protect your online privacy by turning personal information into “for your eyes only” messages intended only for the parties that need them — and no one else.
You should make sure that your emails are being sent over an encrypted connection, or that you are encrypting each message.
Most email clients come with the option for encryption in their Settings menu, and if you check your email with a web browser, take a moment to ensure that SSL encryption is available.
Cybercrime is a global business, often run by multinational outfits.
Many of the large-scale data breaches that you may have heard about in the news demonstrate that cybercriminals are often out to steal personal information for financial gain.
The Health Insurance Portability and Accountability Act (HIPAA) requires healthcare providers to implement security features that help protect patients’ sensitive health information online.
Institutions of higher learning must take similar steps under the Family Education Rights and Privacy Act (FERPA) to protect student records.
Retailers must contend with the Fair Credit Practices Act (FCPA) and similar laws that help protect consumers.
Encryption helps businesses stay compliant with regulatory requirements and standards. It also helps protect the valuable data of their customers.
On average a computer connected to the internet will be the target of an attempted hack every 39 seconds.
OR on average, a computer will be the target of 2,224 hacking attempts every day.
Cybercrime damage costs are predicted to hit $6 trillion annually by 2021.
Cybersecurity spending will exceed $1 trillion from 2017 to 2021.
The world will have 3.5 million unfilled cybersecurity jobs by the end of 2021.
Ransomware damage costs are predicted to grow more than 57 times from 2015 to 2021 reaching $20 billion by 2021.
70 percent of cryptocurrency transactions will be for illegal activity by 2021
Encryption is designed to protect your data, but encryption can also be used against you.
For instance, targeted ransomware is a cybercrime that can impact organizations of all sizes, including government offices. Ransomware can also target individual computer users.
How do ransomware attacks occur? Attackers deploy ransomware to attempt to encrypt various devices, including computers and servers. The attackers often demand a ransom before they provide a key to decrypt the encrypted data. Ransomware attacks against government agencies can shut down services, making it hard to get a permit, obtain a marriage license, or pay a tax bill, for instance.
Targeted attacks are often aimed at large organizations, but ransomware attacks can also happen to you.
It was estimated that every 40 seconds a business falls victim to a ransomware attack, in a December 2016 security bulletin posted by the cybersecurity firm Kaspersky Lab, which stated that the number of attacks rose from every two minutes in early 2016.
The news that Interpol is about to “condemn” the spread of strong encryption is just the latest salvo in the crypto wars, a decades-long controversy between proponents of strong encryption, law enforcement and investigative bodies over the widespread use of encryption by technology companies. The central tenet of the law enforcement argument is that strong end-to-end encryption hinders the investigation and prosecution of crimes when suspects use it on their personal devices. For their part, privacy and human rights advocates contend that there is no mechanism “that (both) protects the security and privacy of communications and allows access for law enforcement”.
Facebook Messenger, WhatsApp and other communication apps use an implementation of public key cryptography called end-to-end encryption. Only the end users have access to the decrypted data; the service provider, like Facebook, doesn’t. As such, it is theoretically impossible for the company to hand over decrypted data to the authorities.
This is the crux of the debate. It is what has led law enforcement to ask that end-to-end encryption not be rolled out by Facebook, or that 'backdoors' be introduced to aid in surveillance or data recovery.
The NSA building ===>