Вы находитесь на странице: 1из 11

Public Key

Generate a key pair, consisting of a public key and a private key.


Symmetric-key cryptography is a mechanism by which the same key is used
for both encrypting and decrypting; it is more intuitive because of its similarity
with what you expect to use for locking and unlocking a door: the same key.
ublic-key is commonly used to identify a cryptographic method that uses an
asymmetric-key pair
!he public-key is made public and is distributed widely and freely. !he private-
key is never distributed and must be kept secret.
"igitally signed "# files $including attachments within the "#%
ublic-key cryptography uses asymmetric key algorithms and can also be
referred to by the more generic term &asymmetric key cryptography.&
' public key algorithm does not re(uire a secure initial exchange of one $or
more% secret keys between the sender and receiver. !he use of these
algorithms also allows the authenticity of a message to be checked by
creating a digital signature of the message using the private key, which can
then be verified by using the public key.
Private Key
)ncryption involves applying an operation $an algorithm% to the data to be
encrypted using the private key to make them unintelligible
Wireless Communication
*ireless communication is the transfer of information over a distance without the use
of electrical conductors or wires.
!he term &wireless& has become a generic and all-encompassing word used to
describe communications in which electromagnetic waves or +# carry a signal over
part or the entire communication path. ,ommon examples of wireless e(uipment in
use today include:
-and .obile +adio and Speciali/ed .obile +adio typically used by business,
industrial and ublic Safety entities
,onsumer !wo *ay +adio
!he 'mateur +adio Service
,onsumer and rofessional .arine 01# +adios
,ellular !elephones and agers
Global ositioning System $GS%
,ordless ,omputer eripherals
,ordless !elephone Sets
Satellite !elevision
*ireless Gaming
*ireless communication may be via: radio fre(uency communication, microwave
communication, for example long-range line-of-sight via highly directional antennas,
or short-range communication infrared $2+%, short-range communication, for example
from remote controls or via 2+"'. 'pplications may involve point-to-point
communication, point-to-multipoint communication, broadcasting, cellular networks
and other wireless networks.
*ireless communication has the following advantages:
i. ,ommunication has enhanced to convey the information (uickly to the
consumers.
ii. *orking professionals can work and access 2nternet anywhere and
anytime without carrying cables or wires wherever they go. !his also helps
to complete the work anywhere on time and improves the productivity.
iii. "octors, workers and other professionals working in remote areas can be
in touch with medical centres through wireless communication.
iv. 3rgent situation can be alerted through wireless communication. !he
affected regions can be provided help and support with the help of these
alerts through wireless communication.
v. *ireless networks are cheaper to install and maintain.
GSM & GPRS
GS.: GS. is a !".' $!ime division multiple access% based wireless network
technology developed in )urope that is used throughout most of the world. GS.
phones make use of a S2. $Subscriber identity module% card to identify the user4s
account. !he use of the S2. card allows GS. network users to (uickly move their
phone number from one GS. phone to another by simply moving the S2. card.
,urrently GS. networks operate on the 567.1/, 877.1/, 9577.1/, and 9877.1/
fre(uency bands. "evices that support all four bands are called (uad-band, with
those that support : or ; bands called tri-band and dual-band, respectively. 2n the
3nited States, ,ingular operates on the 567 and 9877.1/ bands, while !-.obile
operates only on the 9877.1/ band.
G+S: General packet radio service ,is a packet oriented mobile data service
available to users of the ;G cellular communication systems global system for
mobile communications $GS.%, as well as in the :G systems. 2n ;G systems, G+S
provides data rates of 6<-99= kilo bit
2G
;G $or ;-G% is short for second-generation wireless telephone technology. Second
generation ;G cellular telecom networks were commercially launched on the GS.
standard in #inland by +adiolin>a $now part of )lisa ?y>% in 9889. !hree primary
benefits of ;G networks over their predecessors were that phone conversations were
digitally encrypted; ;G systems were significantly more efficient on the spectrum
allowing for far greater mobile phone penetration levels; and ;G introduced data
services for mobile, starting with S.S text messages. ;G network allows for much
greater penetration intensity. ;G technologies enabled the various mobile phone
networks to provide the services such as text messages, picture messages and
..S $multimedia messages%. 'll text messages sent over ;G are digitally encrypted,
allowing for the transfer of data in such a way that only the intended receiver can
receive and read it.
'fter ;G was launched, the previous mobile telephone systems were retrospectively
dubbed 9G. *hile radio signals on 9G networks are analog, radio signals on ;G
networks are digital. @oth systems use digital signalling to connect the radio towers
$which listen to the handsets% to the rest of the telephone system.
;G has been superseded by newer technologies such as ;.6G, ;.A6G, :G, and =G;
however, ;G networks are still used in many parts of the world.
3G
:G, short for third Generation, is the third generation of mobile telecommunications
technology. :G telecommunication networks support services that provide an
information transfer rate of at least ;77 kbitBs. 1owever, many services advertised as
:G provide higher speed than the minimum technical re(uirements for a :G service.
+ecent :G releases, often denoted :.6G and :.A6G, also provide mobile broadband
access of several .bitBs to smartphones and mobile modems in laptop computers.
:G finds application in wireless voice telephony, mobile 2nternet access, fixed
wireless 2nternet access, video calls and mobile !0.
:G was relatively slow to be adopted globally. 2n some instances, :G networks do
not use the same radio fre(uencies as ;G so mobile operators must build entirely
new networks and license entirely new fre(uencies, especially so to achieve high
data transmission rates. ?ther delays were due to the expenses of upgrading
transmission hardware, especially for 3.!S, whose deployment re(uired the
replacement of most broadcast towers. "ue to these issues and difficulties with
deployment, many carriers were not able to or delayed ac(uisition of these updated
capabilities.
2n "ecember ;77A, 987 :G networks were operating in =7 countries and 96= 1S"'
$1igh-Speed "ownlink acket 'ccess% networks were operating in A9 countries,
according to the Global .obile Suppliers 'ssociation $GS'%. 2n 'sia, )urope,
,anada and the 3S', telecommunication companies use *-,".' $*ideband ,ode
"ivision .ultiple 'ccess% technology with the support of around 977 terminal designs
to operate :G mobile networks.
SSL
SS- between !ransmission ,ontrol rotocol $!,% layer and 'pplication layer
'ctually ; layers
+ecord
Secure 'pplication
,an run under any protocol that relies on !,, including 1!!, -"', ?:,
#!
1andshaking rotocol
)stablish communication variables
,hange ,ipher Spec rotocol
'lert to a change in communication variables
'lert rotocol
.essages important to SS- connections
'pplication )ncryption rotocol
)ncryptB"ecrypt application data
Record Layer
#rames and encrypts upper level data into one protocol for transport through
!,
6 byte frame
9
st
byte protocol indicator
;
nd
byte is ma>or version of SS-
:
rd
byte is minor version of SS-
-ast two bytes indicate length of data inside frame, up to ;
9=
.essage 'uthentication ,ode $.',%
Wireless Application Protocol
*' stands for *ireless 'pplication rotocol. er the dictionary definition for each
of these words, we have:
*ireless: -acking or not re(uiring a wire or wires: pertaining to radio transmission.
'pplication: ' computer program or piece of computer software that is designed to
do a specific task.
rotocol: ' set of technical rules about how information should be transmitted and
received using computers.
*ireless 'pplication rotocol, a set of protocols for connecting cellular phones and
other radio devices to the 2nternet
!he *' layers are:
*ireless 'pplication )nvironment $*')%
*ireless Session -ayer $*S-%
*ireless !ransport -ayer Security $*!-S%
*ireless !ransport -ayer $*!%
!he *' was conceived by four companies: )ricsson, .otorola, Cokia, and
3nwired lanet $now hone.com%. !he *ireless .ark-up -anguage $*.-% is used
to create pages that can be delivered using *'.
.
!
!9 is a special type of fibre optic telephone line and it was developed by '!D! @ell
-abs. !9 is the most commonly used digital transmission service in the 3nited
States. !9 line is capable of transferring the broadband digital data at very high
speed i.e. 9.6= .bps. !9 is an expensive solution for data transmission as
compared to the regular telephone lines. @ut the prices are tend to decrease as the
demand grows. ,urrently !9 is not cost effective for the home users.
3
' !: line is :7 times faster than the !9 line and it supports the data transfer rate ==
.bps. ' !: line is e(uivalent to ;5 !9 circuits or lines and a !: is also called a "S:.
!: is a very high speed data transmission system and it is widely used on the
internet.
' !: is capable of carrying <A; voice circuits. !: connection is mostly used by the
2Ss and corporate offices for permanent, high speed and uninterruptible internet
access.
"PS
1!!S - or 1ypertext !ransfer rotocol with Secure Sockets -ayer, 1!!S
connects on port ==:, 1!!S encrypts the data sent and received with SS-,
1ypertext !ransfer rotocol Secure $1!!S% is a communications protocol for
secure communication over a computer network, with especially wide deployment on
the 2nternet.
WA#
*ide 'rea )thernet, is the delivery of high-speed wide area network $*'C% service
using )thernet connectivity. )ssentially, *') is a virtual private network $0C%
service that simplifies linking remote locations. *') is marketed as an alternative to
traditional wide area connections such as leased line, frame relay or !9 services.
*ide 'rea )thernet maintains the high bandwidth and simplicity of -ayer ; )thernet.
!he flat network design makes the connected sites appear as a single logical
network and simplifies connectivity back to the head(uarters and between remote
sites.
ransport Layer Security $LS%
!ransport -ayer Security $!-S% is a protocol that ensures privacy between
communicating applications and their users on the 2nternet. *hen a server and client
communicate, !-S ensures that no third party may eavesdrop or tamper with any
message. !-S is the successor to the Secure Sockets -ayer $SS-%.
Smart card
' smart card is a plastic card about the si/e of a credit card, with an embedded
microchip that can be loaded with data, used for telephone calling, electronic cash
payments, and other applications, and then periodically refreshed for additional use.
,urrently or soon, you may be able to use a smart card to:
"ial a connection on a mobile telephone and be charged on a per-call basis
)stablish your identity when logging on to an 2nternet access provider or to an
online bank
ay for parking at parking meters or to get on subways, trains, or buses
Give hospitals or doctors personal data without filling out a form
.ake small purchases at electronic stores on the *eb $a kind of cyber cash%
@uy gasoline at a gasoline station
W&at is #'()
)lectronic "ata 2nterchange is the computer-to-computer exchange of routine
business data between trading partners in standard data formats. !his definition
contains : key concepts about )"2:
9. ,omputer-to-computer: )"2 in its most efficient form flows directly out of a
senderEs computer system directly into a receiverEs computer system without
any human intervention; however, it is not always possible for )"2 to flow in
this most efficient manner.
;. +outing business data: )"2 is used for routine business documents like
urchase ?rders and 2nvoices. 2t is not used for non-routine business
documents like complicated contracts or information meant for humans to
read and analyse.
:. Standard data formats: ' standard definition of the location and structure of
the data is provided. 3nstructured text is not )"2
@enefits of )"2
9. Speed F "ata can move directly out of one computer system and into another
with little to no delay.
;. 'ccuracy F )rrors are reduced because data is not being re-keyed. )rror
rates from entering data are between .6 F :G. ?n large volumes of
transactions, the possibility for the introduction of errors is enormous.
:. Simplicity F )"2 standards specify how data will be formatted and where it can
be found.
=. Security F .uch less likely to lose information transmitted through )"2 than
information sent via mail. )"2 can be accessed only by authori/ed users, and
then there are audit trails and archives of data. )"2 data cannot be easily
changed by unauthori/ed users. 2t is also not sub>ect to viruses.
S#
Secure )lectronic !ransaction $S)!% is a system for ensuring the security of financial
transactions on the 2nternet. 2t was supported initially by .aster,ard, 0isa, .icrosoft,
Cetscape, and others. *ith S)!, a user is given an electronic wallet $digital
certificate% and a transaction is conducted and verified using a combination of digital
certificates and digital signatures among the purchaser, a merchant, and the
purchaser4s bank in a way that ensures privacy and confidentiality. S)! makes use
of Cetscape4s Secure Sockets -ayer $SS-%, .icrosoft4s Secure !ransaction
!echnology $S!!%, and !erisa System4s Secure 1ypertext !ransfer rotocol $S-
1!!%. S)! uses some but not all aspects of a public key infrastructure $H2%.
'i**erent type o* #ncryption met&od
1ashing )ncryption
!he first encryption method, called hashing, creates a uni(ue, fixed-length signature
for a message or data set. 1ashes are created with an algorithm, or hash function,
and people commonly use them to compare sets of data. Since a hash is uni(ue to a
specific message, even minor changes to that message result in a dramatically
different hash, thereby alerting a user to potential tampering.
' key difference between hashing and the other two encryption methods is that once
the data is encrypted, the process cannot be reversed or deciphered. !his means
that even if a potential attacker were able to obtain a hash, he or she would not be
able to use a decryption method to discover the contents of the original message.
Some common hashing algorithms are .essage "igest 6 $."6% and Secure
1ashing 'lgorithm $S1'%.
Symmetric .ethods
Symmetric cryptography, also called private-key cryptography, is one of the oldest
and most secure encryption methods. !he term &private key& comes from the fact
that the key used to encrypt and decrypt data must remain secure because anyone
with access to it can read the coded messages. ' sender encodes a message into
cipher text using a key, and the receiver uses the same key to decode it.
eople can use this encryption method as either a &stream& cipher or a &block&
cipher, depending on the amount of data being encrypted or decrypted at a time. '
stream cipher encrypts data one character at a time as it is sent or received, while a
block cipher processes fixed chunks of data. ,ommon symmetric encryption
algorithms include "ata )ncryption Standard $")S%, 'dvanced )ncryption Standard
$')S%, and 2nternational "ata )ncryption 'lgorithm $2")'%.
'symmetric #orms
'symmetric, or public key, cryptography is, potentially, more secure than symmetric
methods of encryption. !his type of cryptography uses two keys, a &private& key and
a &public key,& to perform encryption and decryption. !he use of two keys overcomes
a ma>or weakness in symmetric key cryptography, since a single key does not need
to be securely managed among multiple users.
2n asymmetric cryptography, a public key is freely available to everyone and used to
encrypt messages before sending them. ' different, private key remains with the
receiver of cipher text messages, who uses it to decrypt them. 'lgorithms that use
public key encryption methods include +S'
ERP - Enterprise Resource Planning
ERP is short for enterprise resource planning.
Enterprise resource planning (ERP) is business management software that allows an
organization to use a system of integrated applications to manage the business. ERP software
integrates all facets of an operation, including product planning, development, manufacturing
processes, sales and marketing.
ERP Software Modules
ERP software typically consists of multiple enterprise software modules that are individually
purchased, based on what best meets the specific needs and technical capabilities of the
organization. Each ERP module is focused on one area of business processes, such as product
development or marketing. ome of the more common ERP modules include those for
product planning, material purchasing, inventory control, distribution, accounting, marketing,
finance and !R.
"s the ERP methodology has become more popular, software applicationshave emerged to
help business managers implement ERP into other business activities and may also
incorporate modules for #R$ and business intelligence and present them as a
single unified package.
%he basic goal is to provide one central repository for all information that is shared by all the
various ERP facets in order to smooth the flow of data across the organization.
ERP Vendors
&epending on your organization's size and needs there are a number of enterprise resource
planning software vendors to choose from in the large enterprise, mid(market and the small
business ERP market.
Large Enterprise ERP (ERP Tier I)
%he ERP market for large enterprises is dominated by three companies) "P, *racle and
$icrosoft. (ource) Enterprise"pps%oday+ Enterprise ERP ,uyer's -uide) "P, *racle and
$icrosoft+ &rew Robb)
Midmarket ERP (ERP Tier II)
.or the midmarket vendors include /nfor, 0"&, 1awson, Epicor, age and /..
(ource) Enterprise"pps%oday+ $idmarket ERP ,uyer's -uide+ &rew Robb)
Small usiness ERP (ERP Tier III)
E2act -lobe, yspro, 3etuite, 4isibility, #onsona, #&# oftware and "ctivant olutions
round out the ERP vendors for small businesses. (ource) Enterprise"pps%oday+ ERP ,uyer's
-uide for mall ,usinesses+ &rew Robb)
ERP - Enterprise Resource Planning
ERP is short for enterprise resource planning.
Enterprise resource planning (ERP) is business management software that allows an
organization to use a system of integrated applications to manage the business. ERP software
integrates all facets of an operation, including product planning, development, manufacturing
processes, sales and marketing.
ERP Software Modules
ERP software typically consists of multiple enterprise software modules that are individually
purchased, based on what best meets the specific needs and technical capabilities of the
organization. Each ERP module is focused on one area of business processes, such as product
development or marketing. ome of the more common ERP modules include those for
product planning, material purchasing, inventory control, distribution, accounting, marketing,
finance and !R.
"s the ERP methodology has become more popular, software applicationshave emerged to
help business managers implement ERP into other business activities and may also
incorporate modules for #R$ and business intelligence and present them as a
single unified package.
%he basic goal is to provide one central repository for all information that is shared by all the
various ERP facets in order to smooth the flow of data across the organization.
ERP Vendors
&epending on your organization's size and needs there are a number of enterprise resource
planning software vendors to choose from in the large enterprise, mid(market and the small
business ERP market.
Large Enterprise ERP (ERP Tier I)
%he ERP market for large enterprises is dominated by three companies) "P, *racle and
$icrosoft. (ource) Enterprise"pps%oday+ Enterprise ERP ,uyer's -uide) "P, *racle and
$icrosoft+ &rew Robb)
Midmarket ERP (ERP Tier II)
.or the midmarket vendors include /nfor, 0"&, 1awson, Epicor, age and /..
(ource) Enterprise"pps%oday+ $idmarket ERP ,uyer's -uide+ &rew Robb)
Small usiness ERP (ERP Tier III)
E2act -lobe, yspro, 3etuite, 4isibility, #onsona, #&# oftware and "ctivant olutions
round out the ERP vendors for small businesses. (ource) Enterprise"pps%oday+ ERP ,uyer's
-uide for mall ,usinesses+ &rew Robb)

Вам также может понравиться