Web Security

An outline of Web security is given here.

The Problem

Whatever is one to do?

A Solution—Modern Cryptography

A Scenario

Public Key Encryption

Historically, the weak point in encryption has been how to secretly and securely send information about how to encrypt a message to a person who is supposed to send sensitive information in encrypted form back to home base. In recent years a cool technique has been discovered that solves this problem. It is known as pubic key encryption.

Issues

Individuals and gangs around the world work non-stop to find flaws in modern encryption systems. As computers get faster, the size of the public key number described above must get larger (to make it impossible for a computer program to calculate the secret decrypting key (the two prime numbers whose product is the large public key number).

Within just the past month of this writing, a flaw was found in a widely used open source (free) encryption technique (SSL - Secure Socket Layer encryption) that had companies scrambling to patch.

The task of the good guys is to keep one step ahead of the bad guys in encryption techniques.

Another Solution—Steganography

This solution is not widely deployed for various reasons. The idea is that sensitive text data can be inserted as part of a file that is itself not a text file per se, such as a picture. The idea works as follows:

Could a message be encrypted and then the encrypted characters put into a picture to make it even more secure? Sure. But if the encryption scheme is secure this would be more work than it is worth.

Summary

  • Cyber criminals in all parts of the world attempt to gain access to sensitive information in order to steal. The Internet and Web have made this possible even when the criminals are in remote locations.
  • Encryption refers to a process (usually embodied in a program) that turns plain text (readable) data into an unreadable form.
  • Decryption refers to a process (usually also embodied in a program) that turns data encrypted in a way that is known by the decryption process back into plain text.
  • Public key encryption refers to a technique in which a publicly known key (e.g., a large number that is the product of two prime numbers) is used as input into an encryption program along with the data that is to be encrypted to produce an encrypted version of the data. At the other end, a private key (the two prime numbers multiplied to produce the large public key value) are input into the decryption program to reconstruct the original plain text. This works because it takes an enormous amount of time even for the fastest computers to discover the two prime numbers whose product is the public key.
  • The RSA algorithm is most widely known public-key encryption technique.
  • Encryption/Decryption is used to send sensitive data, such as passwords, account information, and so forth across the Internet.
  • Steganography is a methodology by which sensitive text information is hidden in a file that is of a different type than text, such as a picture. The characters of the hidden text are placed in a manner so that the picture itself is essentially unaffected when viewed by a person. This method is used by various, often criminal, groups intending to smuggle messages amongst themselves but seemss to not be used in general by commercial companies.