Ch. 11 – Cipher Techniques Dr. Wayne Summers

Slides:



Advertisements
Similar presentations
Routing Routing in an internetwork is the process of directing the transmission of data across two connected networks. Bridges seem to do this function.
Advertisements

CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
1 IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor, SIS Lecture 8 Nov 2, 2010 Key Management Network Security.
Cryptography The science of writing in secret code.
Shouting from the Rooftops: Improving Security Dr. Maury Pinsk FRCPC University of Alberta Division of Pediatric Nephrology.
MJ10/07041 Session 10 Accounting, Security Management Adapted from Network Management: Principles and Practice © Mani Subramanian 2000 and solely used.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
CSI315 Web Development Technologies Continued. Communication Layer information needs to get from one place to another –Computer- Computer –Software- Software.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
SECURING Presented by: Digvijay Singh Dudi Graduate Student Old Dominion University.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
1 IS 2150 / TEL 2810 Information Security & Privacy James Joshi Associate Professor, SIS Lecture 2 Sept 4, 2013 Key Management Network Security.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Csci5233 Computer Security1 Bishop: Chapter 11 An Overview of Cipher Techniques (in the context of networks) ( )
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
1 Digital Certificates (X.509, OpenPGP), Security Protocols James Joshi, Associate Professor University of Pittsburgh.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Karlstad University IP security Ge Zhang
CS 447 Networks and Data Communication ARP (Address Resolution Protocol) for the Internet Department of Computer Science Southern Illinois University Edwardsville.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Network Security7-1 Today r Reminder Ch7 HW due Wed r Finish Chapter 7 (Security) r Start Chapter 8 (Network Management)
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Chapter 14: Representing Identity Dr. Wayne Summers Department of Computer Science Columbus State University
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
1 IS 2150 / TEL 2810 Introduction to Security James Joshi Assistant Professor, SIS Lecture 11 Nov 15, 2007 Network Security, Authentication, Identity.
1IS 2150/TEL 2810: Introduction of Computer Security November 8, 2005 Network Security Authentication & Identity Lecture 9.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Computer Security Chap.10 Cipher Techniques
Virtual Private Networks
Encryption and Network Security
Internet and Intranet Fundamentals
Network Security.
Telemedicine.
Understand Networking Services
Information and Network Security
Computer Security Network Security
IS 2150 / TEL 2810 Introduction to Security
Chapter 14: Representing Identity
Chapter 27: System Security
Chapter 17: Confinement Problem
Chapt. 10 – Key Management Dr. Wayne Summers
Security in Network Communications
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
VPN: Virtual Private Network
Chapter 28: User Security
Advanced System Security
Install AD Certificate Services
Introduction to Network Security
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Unit 8 Network Security.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Ch. 11 – Cipher Techniques Dr. Wayne Summers Department of Computer Science Columbus State University Summers_wayne@colstate.edu http://csc.colstate.edu/summers

Networks and Cryptography

Networks and Cryptography Top four layers use end-to-end protocols (e.g. telnet) only requiring that intermediate hosts forward messages Bottom three layers use point-to-point or link protocols (e.g. IP) In end-to-end encryption, each host shares a cryptographic key with each destination In link encryption, each host shares a cryptographic key with its neighbor(s). Distinction useful for traffic analysis

Secure E-mail: PEM User enters e-mail using a User Agent (UA) UA hands message to Message Transfer Agent (MTA) MTA sends message to destination host via other MTAs Attacker can read/modify/forge/delete e-mail at any of the intermediary MTAs

Secure E-mail: PEM Goal: Confidentiality (message should be unreadable except by sender and recipient(s) Origin authentication Data integrity Nonrepudiation of origin Requires two types of keys Data encipherment key (DEK): session key Interchange key