You are on page 1of 9

SAFE DATA TRANSFER

presentation by:
Vladyslav Filiaiev,
CS-103
supervisor:
V. Dmytruk
PRESENTATION LEGEND

Goals of Internet safety

Public-key
cryptography

How does the system works

Receiving protected data


GOALS OF INTERNET SAFETY

As the user of Internet, everybody wants to


fell safe at such a big net full of unpredictable
events that may be caused by others.
So their data need to be trasfered and stored
in safety

There are 3 main goals of Internet safety:


• Encrytp data
• Detection of the
interferention
• Person identification
PUBLIC-KEY CRYPTOGRAPHY

Today`s data encryption methods rely on a


technique called public-key cryptography.

Everyone using a public-key system has a


public key and a private key.
Messages are encrypted and decrypted
with these keys.
A message encrypted with your public key
can only be decrypted by a system that
knows your private key.

This method is used by a lot of messangers


developers.
HOW DOES IT WORKS?

For the system to work, two parties engaging in a


secure transaction must know each other's public
keys. Private keys, however, are closely guarded
secrets known only to their owners.

When you want to send your friend an


encrypted message, you use friend`s public
key to turn your message into gibberish.
Only he/she can turn the gibberish back into the
original message, because only he/she know your
private key.
Public-key cryptography also works in reverse - that
is, only your public key can decipher your private
key's encryption.
When the recipient gets the message and so Then it decrypts the sender's MAC.
decrypts it, they also get an encrypted MAC. If the two are the same, then the
message hasn't been tampered with.
MAC - message-authentication code that is
produced by message-digest function.
Message-digest function is used to make
message tamper-proof (proves message
integrity) and runs by sender.
The software takes the message
and runs it through the same
message-digest function that
the sender used and creates its
own MAC.
RECEIVING PROTECTED DATA

A server authenticates itself to a client by sending


an unencrypted ASCII-based digital certificate.
A digital certificate contains information about the
company operating the server, including the
server's public key.
The digital certificate is 'signed' by a
trusted digital-certificate issuer, which
means that the issuer has
investigated the company operating
the server and believes it to be
legitimate.
CONCLUSIONS

To summarize it could be said that at this period of


technologies, public-key cryptography stays one of the
most efficient. It provides good techniques of keeping
data safe. To my mind, programmers will use this
method for a long time.
THANKS FOR YOUR ATTENTION!

You might also like