Chapter 8 Network Security.

Slides:



Advertisements
Similar presentations
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
Advertisements

Principles of Information Security, 2nd edition1 Cryptography.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
WEB SECURITY. WEB ATTACK TYPES Buffer OverflowsXML InjectionsSession Hijacking Attacks WEB Attack Types.
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Chapter 8 Network Security 4/17/2017
Chapter 20: Network Security Business Data Communications, 4e.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Network Security Chapter
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Network Security Chapter 8.
Network Security Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
Network Security E.
Network Security Chapter 8
1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)
Network Security Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 Lecture #22: Network Security. 2 A classic lesson The chain is only as strong as its weakest link!
Introduction Cryptography: process of making and using codes to secure transmission of information Encryption: converting original message into a form.
Network Security. Information secrecy-only specified parties know the information exchanged. Provided by criptography. Information integrity-the information.
Linux Networking and Security Chapter 8 Making Data Secure.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Network Security David Lazăr.
Chapter 7: Cryptographic Systems
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Network Security Chapter 8 12/13/ Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Network Security Chapter 8 Institute of Information Science and Technology. Chengdu University YiYong 2008 年 2 月 25 日.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Web Security.
Network Security Chapter 8
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
IPSec Detailed Description and VPN
Chapter 5 Network Security Protocols in Practice Part I
IPSecurity.
Reviews Rocky K. C. Chang 20 April 2007.
Opracowanie językowe dr inż. J. Jarnicki
Cryptography and Network Security
Cryptography Why Cryptography Symmetric Encryption
Network Security.
Secure Sockets Layer (SSL)
What is network security?
Chapter 8 Network Security.
Encryption
Network Security Chapter 8
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-501)
Cryptography and Network Security
Message Security, User Authentication, and Key Management
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Cryptography and Network Security
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Security.
The University of Adelaide, School of Computer Science
The Secure Sockets Layer (SSL) Protocol
Public-Key, Digital Signatures, Management, Security
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Unit 8 Network Security.
Advanced Computer Networks
Electronic Payment Security Technologies
Network Security Chapter 8.
Cryptography and Network Security
Presentation transcript:

Chapter 8 Network Security

Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles

Some people who cause security problems and why. Need for Security Some people who cause security problems and why.

An Introduction to Cryptography The encryption model (for a symmetric-key cipher).

Transposition Ciphers A transposition cipher.

One-Time Pads The use of a one-time pad for encryption and the possibility of getting any possible plaintext from the ciphertext by the use of some other pad.

An example of quantum cryptography.

Symmetric-Key Algorithms DES – The Data Encryption Standard AES – The Advanced Encryption Standard Cipher Modes Other Ciphers Cryptanalysis

Basic elements of product ciphers. (a) P-box. (b) S-box. (c) Product.

Data Encryption Standard The data encryption standard. (a) General outline. (b) Detail of one iteration. The circled + means exclusive OR.

(a) Triple encryption using DES. (b) Decryption. Triple DES (a) Triple encryption using DES. (b) Decryption.

AES – The Advanced Encryption Standard Rules for AES proposals The algorithm must be a symmetric block cipher. The full design must be public. Key lengths of 128, 192, and 256 bits supported. Both software and hardware implementations required The algorithm must be public or licensed on nondiscriminatory terms.

AES (2) An outline of Rijndael.

Creating of the state and rk arrays. AES (3) Creating of the state and rk arrays.

Electronic Code Book Mode The plaintext of a file encrypted as 16 DES blocks.

Cipher Block Chaining Mode Cipher block chaining. (a) Encryption. (b) Decryption.

(a) Encryption. (c) Decryption. Cipher Feedback Mode (a) Encryption. (c) Decryption.

A stream cipher. (a) Encryption. (b) Decryption. Stream Cipher Mode A stream cipher. (a) Encryption. (b) Decryption.

Encryption using counter mode.

Some common symmetric-key cryptographic algorithms. Cryptanalysis Some common symmetric-key cryptographic algorithms.

Public-Key Algorithms RSA Other Public-Key Algorithms

An example of the RSA algorithm.

Digital Signatures Symmetric-Key Signatures Public-Key Signatures Message Digests The Birthday Attack

Symmetric-Key Signatures Digital signatures with Big Brother.

Public-Key Signatures Digital signatures using public-key cryptography.

Digital signatures using message digests.

Use of SHA-1 and RSA for signing nonsecret messages.

SHA-1 (2) (a) A message padded out to a multiple of 512 bits. (b) The output variables. (c) The word array.

Management of Public Keys Certificates X.509 Public Key Infrastructures

Problems with Public-Key Encryption A way for Trudy to subvert public-key encryption.

A possible certificate and its signed hash. Certificates A possible certificate and its signed hash.

The basic fields of an X.509 certificate.

Public-Key Infrastructures (a) A hierarchical PKI. (b) A chain of certificates.

Communication Security IPsec Firewalls Virtual Private Networks Wireless Security

The IPsec authentication header in transport mode for IPv4.

(a) ESP in transport mode. (b) ESP in tunnel mode. IPsec (2) (a) ESP in transport mode. (b) ESP in tunnel mode.

Firewalls A firewall consisting of two packet filters and an application gateway.

Virtual Private Networks (a) A leased-line private network. (b) A virtual private network.

Packet encryption using WEP. 802.11 Security Packet encryption using WEP.

Authentication Protocols Authentication Based on a Shared Secret Key Establishing a Shared Key: Diffie-Hellman Authentication Using a Key Distribution Center Authentication Using Kerberos Authentication Using Public-Key Cryptography

Authentication Based on a Shared Secret Key Two-way authentication using a challenge-response protocol.

Authentication Based on a Shared Secret Key (2) A shortened two-way authentication protocol.

Authentication Based on a Shared Secret Key (3) The reflection attack.

Authentication Based on a Shared Secret Key (4) A reflection attack on the protocol of Fig. 8-32.

Authentication Based on a Shared Secret Key (5) Authentication using HMACs.

Establishing a Shared Key: The Diffie-Hellman Key Exchange

Establishing a Shared Key: The Diffie-Hellman Key Exchange The bucket brigade or man-in-the-middle attack.

Authentication Using a Key Distribution Center A first attempt at an authentication protocol using a KDC.

Authentication Using a Key Distribution Center (2) The Needham-Schroeder authentication protocol.

Authentication Using a Key Distribution Center (3) The Otway-Rees authentication protocol (slightly simplified).

Authentication Using Kerberos The operation of Kerberos V4.

Authentication Using Public-Key Cryptography Mutual authentication using public-key cryptography.

E-Mail Security PGP – Pretty Good Privacy PEM – Privacy Enhanced Mail S/MIME

PGP – Pretty Good Privacy PGP in operation for sending a message.

PGP – Pretty Good Privacy (2) A PGP message.

Web Security Threats Secure Naming SSL – The Secure Sockets Layer Mobile Code Security

Secure Naming (a) Normal situation. (b) An attack based on breaking into DNS and modifying Bob's record.

How Trudy spoofs Alice's ISP. Secure Naming (2) How Trudy spoofs Alice's ISP.

Secure DNS An example RRSet for bob.com. The KEY record is Bob's public key. The SIG record is the top-level com server's signed has of the A and KEY records to verify their authenticity.

Self-Certifying Names A self-certifying URL containing a hash of server's name and public key.

SSL—The Secure Sockets Layer Layers (and protocols) for a home user browsing with SSL.

A simplified version of the SSL connection establishment subprotocol.

Data transmission using SSL.

Java Applet Security Applets inserted into a Java Virtual Machine interpreter inside the browser.

Social Issues Privacy Freedom of Speech Copyright

Anonymous Remailers Users who wish anonymity chain requests through multiple anonymous remailers.

Freedom of Speech Possibly banned material: Material inappropriate for children or teenagers. Hate aimed at various ethnic, religious, sexual, or other groups. Information about democracy and democratic values. Accounts of historical events contradicting the government's version. Manuals for picking locks, building weapons, encrypting messages, etc.

Steganography (a) Three zebras and a tree. (b) Three zebras, a tree, and the complete text of five plays by William Shakespeare.