Presentation For Electronic Tender

  • Uploaded by: api-3729458
  • 0
  • 0
  • July 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Presentation For Electronic Tender as PDF for free.

More details

  • Words: 703
  • Pages: 15
PRESENTATION FOR ELECTRONIC TENDER Manik Aggarwal

CONTENTS Process Flow for Government Tender  Manipulation in Tendering Process  E- Tendering  Encryption 

STEPS INVOLVED IN TENDERING PROCESS 

Tender Flow.doc

MANIPULATION IN TENDERING PROCESS Changing of the technical specification to suit the product favored  Application to the tender by several group companies.  Stopping the notices go to other registered parties. 

E-TENDERING COMPONENTS Publish Requirements

3

1 2 Consolidate Requirement

Tender fee payment

ERP

Payment Gateway Download Tender 4

5

6

Upload Bid

(Secure Network) Reverse Auction

EBP

Supporting documents

7 Bid opening & Comparision

8

Enhanced Supply base

Tender Award

9

Reduced Spend

WHAT E TENDERING CAN DELIVER ? Standardise Procurement Processes & Procedures Streamline & reduce Procurement cycle time Reduce administration/process costs Enable transparent On Line negotiations for competitive prices Improve Corporate image Simplify procurement of standardized items like OEM spares

ENCRYPTION TECHNIQUES 

Symmetric (private key) encryption  Uses

the same algorithm and key to both encrypt and decrypt a message  Most common 

Asymmetric (public key) encryption  Uses

two different “one way” keys:

a public key used to encrypt messages  a private key used to decrypt them 



Digital signatures  Based

on a variation of public key encryption

SYMMETRIC ENCRYPTION 

Key must be distributed Vulnerable to interception (an important weakness)  Key management – a challenge 



Strength of encryption Length of the secret key  Longer keys more difficult to crack (more combinations to try)  Not necessary to keep the algorithm secret 



How to break an encryption 

Brute force: try all possible combinations until the correct key is found

ASYMMETRIC ENCRYPTION

Also known as Public Key Encryption (PKE)  Most popular form of PKE: RSA 

Named (1977) after the initials of its inventors: Rivest, Shamir, and Adelman  Forms the basis of Public Key Infrastructure (PKI)  Patent expired in 2000; Now many companies offer it 

Longer keys: 512 bits or 1,024 bits  Greatly reduces the key management problem 

Publicized Public keys (in a public directory)  Never distributed Private keys (kept secret)  No need to exchange keys  Use the other’s public key to encrypt  Use the private key to decrypt 

PKE OPERATIONS 2

1

11 - 10

message sender

B makes its public key widely available (say through the Internet)

3 Cop

No security hole is created yrig ht by distributing the public 200 key, since B’s private key 5 has never been distributed. Joh message recipient

n Wil ey &

DIGITAL SIGNATURES Provide secure and authenticated message transmission (enabled by PKE)  Provides a proof identifying the sender 





Digital Signature: 



Important for certain (legal) transactions Includes the name of the sender and other key contents (e.g., date, time, etc.,)

Use of PKE in reverse (applied to Digital Signature part of the message only) Outgoing: Encrypted using the sender’s private key  Incoming: Decrypted using the sender’s public key  Providing evidence who the message originated from 

TRANSMISSION WITH DIGITAL SIGNATURES Digital Signature only

Organization B

11 - 12

Organization A

Cop yrig ht 200 5 Joh n Wil ey &

PUBLIC KEY INFRASTRUCTURE (PKI) 

Set of hardware, software, organizations, and policies to make PKE work on Internet 



Solves the problem with digital signatures  How to verify that the person sending the message

Elements of PKI Certificate Authority (CA)  A trusted organization that can vouch for the authenticity of the person of organization  Certificate  A digital document verifying the identity of a digital signature’s source  Fingerprint  A unique key issued by the CA for every message sent by the user (for higher security certification) 

PROCESS WITH CERTIFICATE AUTHORITY 

User registers with a CA (e.g., VeriSign) Must provide some proof of Identity  Levels of certification: Examples:  Simple confirmation of an email address  Complete police style background check 

CA issues a digital certificate  User attaches the certificate to transactions (email, web, etc)  Receiver authenticates transaction with CA’s public key 



Contact CA to ensure the certificate is not revoked or expired

THANK YOU

Related Documents

Tender
April 2020 19
Tender
April 2020 25
Tender
August 2019 32
Tender For Security 13
August 2019 56