Generate a key pair, consisting of a public key and a private key.
Symmetric-key cryptography is a mechanism by which the same key is used for both encrypting and decrypting; it is more intuitive because of its similarity with what you expect to use for locking and unlocking a door: the same key. ublic-key is commonly used to identify a cryptographic method that uses an asymmetric-key pair !he public-key is made public and is distributed widely and freely. !he private- key is never distributed and must be kept secret. "igitally signed "# files $including attachments within the "#% ublic-key cryptography uses asymmetric key algorithms and can also be referred to by the more generic term &asymmetric key cryptography.& ' public key algorithm does not re(uire a secure initial exchange of one $or more% secret keys between the sender and receiver. !he use of these algorithms also allows the authenticity of a message to be checked by creating a digital signature of the message using the private key, which can then be verified by using the public key. Private Key )ncryption involves applying an operation $an algorithm% to the data to be encrypted using the private key to make them unintelligible Wireless Communication *ireless communication is the transfer of information over a distance without the use of electrical conductors or wires. !he term &wireless& has become a generic and all-encompassing word used to describe communications in which electromagnetic waves or +# carry a signal over part or the entire communication path. ,ommon examples of wireless e(uipment in use today include: -and .obile +adio and Speciali/ed .obile +adio typically used by business, industrial and ublic Safety entities ,onsumer !wo *ay +adio !he 'mateur +adio Service ,onsumer and rofessional .arine 01# +adios ,ellular !elephones and agers Global ositioning System $GS% ,ordless ,omputer eripherals ,ordless !elephone Sets Satellite !elevision *ireless Gaming *ireless communication may be via: radio fre(uency communication, microwave communication, for example long-range line-of-sight via highly directional antennas, or short-range communication infrared $2+%, short-range communication, for example from remote controls or via 2+"'. 'pplications may involve point-to-point communication, point-to-multipoint communication, broadcasting, cellular networks and other wireless networks. *ireless communication has the following advantages: i. ,ommunication has enhanced to convey the information (uickly to the consumers. ii. *orking professionals can work and access 2nternet anywhere and anytime without carrying cables or wires wherever they go. !his also helps to complete the work anywhere on time and improves the productivity. iii. "octors, workers and other professionals working in remote areas can be in touch with medical centres through wireless communication. iv. 3rgent situation can be alerted through wireless communication. !he affected regions can be provided help and support with the help of these alerts through wireless communication. v. *ireless networks are cheaper to install and maintain. GSM & GPRS GS.: GS. is a !".' $!ime division multiple access% based wireless network technology developed in )urope that is used throughout most of the world. GS. phones make use of a S2. $Subscriber identity module% card to identify the user4s account. !he use of the S2. card allows GS. network users to (uickly move their phone number from one GS. phone to another by simply moving the S2. card. ,urrently GS. networks operate on the 567.1/, 877.1/, 9577.1/, and 9877.1/ fre(uency bands. "evices that support all four bands are called (uad-band, with those that support : or ; bands called tri-band and dual-band, respectively. 2n the 3nited States, ,ingular operates on the 567 and 9877.1/ bands, while !-.obile operates only on the 9877.1/ band. G+S: General packet radio service ,is a packet oriented mobile data service available to users of the ;G cellular communication systems global system for mobile communications $GS.%, as well as in the :G systems. 2n ;G systems, G+S provides data rates of 6<-99= kilo bit 2G ;G $or ;-G% is short for second-generation wireless telephone technology. Second generation ;G cellular telecom networks were commercially launched on the GS. standard in #inland by +adiolin>a $now part of )lisa ?y>% in 9889. !hree primary benefits of ;G networks over their predecessors were that phone conversations were digitally encrypted; ;G systems were significantly more efficient on the spectrum allowing for far greater mobile phone penetration levels; and ;G introduced data services for mobile, starting with S.S text messages. ;G network allows for much greater penetration intensity. ;G technologies enabled the various mobile phone networks to provide the services such as text messages, picture messages and ..S $multimedia messages%. 'll text messages sent over ;G are digitally encrypted, allowing for the transfer of data in such a way that only the intended receiver can receive and read it. 'fter ;G was launched, the previous mobile telephone systems were retrospectively dubbed 9G. *hile radio signals on 9G networks are analog, radio signals on ;G networks are digital. @oth systems use digital signalling to connect the radio towers $which listen to the handsets% to the rest of the telephone system. ;G has been superseded by newer technologies such as ;.6G, ;.A6G, :G, and =G; however, ;G networks are still used in many parts of the world. 3G :G, short for third Generation, is the third generation of mobile telecommunications technology. :G telecommunication networks support services that provide an information transfer rate of at least ;77 kbitBs. 1owever, many services advertised as :G provide higher speed than the minimum technical re(uirements for a :G service. +ecent :G releases, often denoted :.6G and :.A6G, also provide mobile broadband access of several .bitBs to smartphones and mobile modems in laptop computers. :G finds application in wireless voice telephony, mobile 2nternet access, fixed wireless 2nternet access, video calls and mobile !0. :G was relatively slow to be adopted globally. 2n some instances, :G networks do not use the same radio fre(uencies as ;G so mobile operators must build entirely new networks and license entirely new fre(uencies, especially so to achieve high data transmission rates. ?ther delays were due to the expenses of upgrading transmission hardware, especially for 3.!S, whose deployment re(uired the replacement of most broadcast towers. "ue to these issues and difficulties with deployment, many carriers were not able to or delayed ac(uisition of these updated capabilities. 2n "ecember ;77A, 987 :G networks were operating in =7 countries and 96= 1S"' $1igh-Speed "ownlink acket 'ccess% networks were operating in A9 countries, according to the Global .obile Suppliers 'ssociation $GS'%. 2n 'sia, )urope, ,anada and the 3S', telecommunication companies use *-,".' $*ideband ,ode "ivision .ultiple 'ccess% technology with the support of around 977 terminal designs to operate :G mobile networks. SSL SS- between !ransmission ,ontrol rotocol $!,% layer and 'pplication layer 'ctually ; layers +ecord Secure 'pplication ,an run under any protocol that relies on !,, including 1!!, -"', ?:, #! 1andshaking rotocol )stablish communication variables ,hange ,ipher Spec rotocol 'lert to a change in communication variables 'lert rotocol .essages important to SS- connections 'pplication )ncryption rotocol )ncryptB"ecrypt application data Record Layer #rames and encrypts upper level data into one protocol for transport through !, 6 byte frame 9 st byte protocol indicator ; nd byte is ma>or version of SS- : rd byte is minor version of SS- -ast two bytes indicate length of data inside frame, up to ; 9= .essage 'uthentication ,ode $.',% Wireless Application Protocol *' stands for *ireless 'pplication rotocol. er the dictionary definition for each of these words, we have: *ireless: -acking or not re(uiring a wire or wires: pertaining to radio transmission. 'pplication: ' computer program or piece of computer software that is designed to do a specific task. rotocol: ' set of technical rules about how information should be transmitted and received using computers. *ireless 'pplication rotocol, a set of protocols for connecting cellular phones and other radio devices to the 2nternet !he *' layers are: *ireless 'pplication )nvironment $*')% *ireless Session -ayer $*S-% *ireless !ransport -ayer Security $*!-S% *ireless !ransport -ayer $*!% !he *' was conceived by four companies: )ricsson, .otorola, Cokia, and 3nwired lanet $now hone.com%. !he *ireless .ark-up -anguage $*.-% is used to create pages that can be delivered using *'. . ! !9 is a special type of fibre optic telephone line and it was developed by '!D! @ell -abs. !9 is the most commonly used digital transmission service in the 3nited States. !9 line is capable of transferring the broadband digital data at very high speed i.e. 9.6= .bps. !9 is an expensive solution for data transmission as compared to the regular telephone lines. @ut the prices are tend to decrease as the demand grows. ,urrently !9 is not cost effective for the home users. 3 ' !: line is :7 times faster than the !9 line and it supports the data transfer rate == .bps. ' !: line is e(uivalent to ;5 !9 circuits or lines and a !: is also called a "S:. !: is a very high speed data transmission system and it is widely used on the internet. ' !: is capable of carrying <A; voice circuits. !: connection is mostly used by the 2Ss and corporate offices for permanent, high speed and uninterruptible internet access. "PS 1!!S - or 1ypertext !ransfer rotocol with Secure Sockets -ayer, 1!!S connects on port ==:, 1!!S encrypts the data sent and received with SS-, 1ypertext !ransfer rotocol Secure $1!!S% is a communications protocol for secure communication over a computer network, with especially wide deployment on the 2nternet. WA# *ide 'rea )thernet, is the delivery of high-speed wide area network $*'C% service using )thernet connectivity. )ssentially, *') is a virtual private network $0C% service that simplifies linking remote locations. *') is marketed as an alternative to traditional wide area connections such as leased line, frame relay or !9 services. *ide 'rea )thernet maintains the high bandwidth and simplicity of -ayer ; )thernet. !he flat network design makes the connected sites appear as a single logical network and simplifies connectivity back to the head(uarters and between remote sites. ransport Layer Security $LS% !ransport -ayer Security $!-S% is a protocol that ensures privacy between communicating applications and their users on the 2nternet. *hen a server and client communicate, !-S ensures that no third party may eavesdrop or tamper with any message. !-S is the successor to the Secure Sockets -ayer $SS-%. Smart card ' smart card is a plastic card about the si/e of a credit card, with an embedded microchip that can be loaded with data, used for telephone calling, electronic cash payments, and other applications, and then periodically refreshed for additional use. ,urrently or soon, you may be able to use a smart card to: "ial a connection on a mobile telephone and be charged on a per-call basis )stablish your identity when logging on to an 2nternet access provider or to an online bank ay for parking at parking meters or to get on subways, trains, or buses Give hospitals or doctors personal data without filling out a form .ake small purchases at electronic stores on the *eb $a kind of cyber cash% @uy gasoline at a gasoline station W&at is #'() )lectronic "ata 2nterchange is the computer-to-computer exchange of routine business data between trading partners in standard data formats. !his definition contains : key concepts about )"2: 9. ,omputer-to-computer: )"2 in its most efficient form flows directly out of a senderEs computer system directly into a receiverEs computer system without any human intervention; however, it is not always possible for )"2 to flow in this most efficient manner. ;. +outing business data: )"2 is used for routine business documents like urchase ?rders and 2nvoices. 2t is not used for non-routine business documents like complicated contracts or information meant for humans to read and analyse. :. Standard data formats: ' standard definition of the location and structure of the data is provided. 3nstructured text is not )"2 @enefits of )"2 9. Speed F "ata can move directly out of one computer system and into another with little to no delay. ;. 'ccuracy F )rrors are reduced because data is not being re-keyed. )rror rates from entering data are between .6 F :G. ?n large volumes of transactions, the possibility for the introduction of errors is enormous. :. Simplicity F )"2 standards specify how data will be formatted and where it can be found. =. Security F .uch less likely to lose information transmitted through )"2 than information sent via mail. )"2 can be accessed only by authori/ed users, and then there are audit trails and archives of data. )"2 data cannot be easily changed by unauthori/ed users. 2t is also not sub>ect to viruses. S# Secure )lectronic !ransaction $S)!% is a system for ensuring the security of financial transactions on the 2nternet. 2t was supported initially by .aster,ard, 0isa, .icrosoft, Cetscape, and others. *ith S)!, a user is given an electronic wallet $digital certificate% and a transaction is conducted and verified using a combination of digital certificates and digital signatures among the purchaser, a merchant, and the purchaser4s bank in a way that ensures privacy and confidentiality. S)! makes use of Cetscape4s Secure Sockets -ayer $SS-%, .icrosoft4s Secure !ransaction !echnology $S!!%, and !erisa System4s Secure 1ypertext !ransfer rotocol $S- 1!!%. S)! uses some but not all aspects of a public key infrastructure $H2%. 'i**erent type o* #ncryption met&od 1ashing )ncryption !he first encryption method, called hashing, creates a uni(ue, fixed-length signature for a message or data set. 1ashes are created with an algorithm, or hash function, and people commonly use them to compare sets of data. Since a hash is uni(ue to a specific message, even minor changes to that message result in a dramatically different hash, thereby alerting a user to potential tampering. ' key difference between hashing and the other two encryption methods is that once the data is encrypted, the process cannot be reversed or deciphered. !his means that even if a potential attacker were able to obtain a hash, he or she would not be able to use a decryption method to discover the contents of the original message. Some common hashing algorithms are .essage "igest 6 $."6% and Secure 1ashing 'lgorithm $S1'%. Symmetric .ethods Symmetric cryptography, also called private-key cryptography, is one of the oldest and most secure encryption methods. !he term &private key& comes from the fact that the key used to encrypt and decrypt data must remain secure because anyone with access to it can read the coded messages. ' sender encodes a message into cipher text using a key, and the receiver uses the same key to decode it. eople can use this encryption method as either a &stream& cipher or a &block& cipher, depending on the amount of data being encrypted or decrypted at a time. ' stream cipher encrypts data one character at a time as it is sent or received, while a block cipher processes fixed chunks of data. ,ommon symmetric encryption algorithms include "ata )ncryption Standard $")S%, 'dvanced )ncryption Standard $')S%, and 2nternational "ata )ncryption 'lgorithm $2")'%. 'symmetric #orms 'symmetric, or public key, cryptography is, potentially, more secure than symmetric methods of encryption. !his type of cryptography uses two keys, a &private& key and a &public key,& to perform encryption and decryption. !he use of two keys overcomes a ma>or weakness in symmetric key cryptography, since a single key does not need to be securely managed among multiple users. 2n asymmetric cryptography, a public key is freely available to everyone and used to encrypt messages before sending them. ' different, private key remains with the receiver of cipher text messages, who uses it to decrypt them. 'lgorithms that use public key encryption methods include +S' ERP - Enterprise Resource Planning ERP is short for enterprise resource planning. Enterprise resource planning (ERP) is business management software that allows an organization to use a system of integrated applications to manage the business. ERP software integrates all facets of an operation, including product planning, development, manufacturing processes, sales and marketing. ERP Software Modules ERP software typically consists of multiple enterprise software modules that are individually purchased, based on what best meets the specific needs and technical capabilities of the organization. Each ERP module is focused on one area of business processes, such as product development or marketing. ome of the more common ERP modules include those for product planning, material purchasing, inventory control, distribution, accounting, marketing, finance and !R. "s the ERP methodology has become more popular, software applicationshave emerged to help business managers implement ERP into other business activities and may also incorporate modules for #R$ and business intelligence and present them as a single unified package. %he basic goal is to provide one central repository for all information that is shared by all the various ERP facets in order to smooth the flow of data across the organization. ERP Vendors &epending on your organization's size and needs there are a number of enterprise resource planning software vendors to choose from in the large enterprise, mid(market and the small business ERP market. Large Enterprise ERP (ERP Tier I) %he ERP market for large enterprises is dominated by three companies) "P, *racle and $icrosoft. (ource) Enterprise"pps%oday+ Enterprise ERP ,uyer's -uide) "P, *racle and $icrosoft+ &rew Robb) Midmarket ERP (ERP Tier II) .or the midmarket vendors include /nfor, 0"&, 1awson, Epicor, age and /.. (ource) Enterprise"pps%oday+ $idmarket ERP ,uyer's -uide+ &rew Robb) Small usiness ERP (ERP Tier III) E2act -lobe, yspro, 3etuite, 4isibility, #onsona, #&# oftware and "ctivant olutions round out the ERP vendors for small businesses. (ource) Enterprise"pps%oday+ ERP ,uyer's -uide for mall ,usinesses+ &rew Robb) ERP - Enterprise Resource Planning ERP is short for enterprise resource planning. Enterprise resource planning (ERP) is business management software that allows an organization to use a system of integrated applications to manage the business. ERP software integrates all facets of an operation, including product planning, development, manufacturing processes, sales and marketing. ERP Software Modules ERP software typically consists of multiple enterprise software modules that are individually purchased, based on what best meets the specific needs and technical capabilities of the organization. Each ERP module is focused on one area of business processes, such as product development or marketing. ome of the more common ERP modules include those for product planning, material purchasing, inventory control, distribution, accounting, marketing, finance and !R. "s the ERP methodology has become more popular, software applicationshave emerged to help business managers implement ERP into other business activities and may also incorporate modules for #R$ and business intelligence and present them as a single unified package. %he basic goal is to provide one central repository for all information that is shared by all the various ERP facets in order to smooth the flow of data across the organization. ERP Vendors &epending on your organization's size and needs there are a number of enterprise resource planning software vendors to choose from in the large enterprise, mid(market and the small business ERP market. Large Enterprise ERP (ERP Tier I) %he ERP market for large enterprises is dominated by three companies) "P, *racle and $icrosoft. (ource) Enterprise"pps%oday+ Enterprise ERP ,uyer's -uide) "P, *racle and $icrosoft+ &rew Robb) Midmarket ERP (ERP Tier II) .or the midmarket vendors include /nfor, 0"&, 1awson, Epicor, age and /.. (ource) Enterprise"pps%oday+ $idmarket ERP ,uyer's -uide+ &rew Robb) Small usiness ERP (ERP Tier III) E2act -lobe, yspro, 3etuite, 4isibility, #onsona, #&# oftware and "ctivant olutions round out the ERP vendors for small businesses. (ource) Enterprise"pps%oday+ ERP ,uyer's -uide for mall ,usinesses+ &rew Robb)