Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
Principles of Information Security, 2nd edition1 Cryptography.
Web Security for Network and System Administrators1 Chapter 4 Encryption.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
WEB SECURITY. WEB ATTACK TYPES Buffer OverflowsXML InjectionsSession Hijacking Attacks WEB Attack Types.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Topic 11: Key Distribution and Agreement 1 Information Security CS 526 Topic 11: Key Distribution & Agreement, Secure Communication.
Chapter 8 Network Security 4/17/2017
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Network Security Chapter
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Network Security Chapter 8.
Network Security Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
CN8816: Network Security1 Confidentiality, Integrity & Authentication Confidentiality - Symmetric Key Encryption Data Integrity – MD-5, SHA and HMAC Public/Private.
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
Internet Engineering Czesław Smutnicki Discrete Mathematics – Cryptography.
Network Security Chapter 8
1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)
Network Security Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
1 Lecture #22: Network Security. 2 A classic lesson The chain is only as strong as its weakest link!
Secure Socket Layer (SSL)
Network Security. Information secrecy-only specified parties know the information exchanged. Provided by criptography. Information integrity-the information.
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
Linux Networking and Security Chapter 8 Making Data Secure.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
8.4 – 8.5 Securing & Securing TCP connections with SSL By: Amanda Porter.
Network Security David Lazăr.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Information and Network Security Rudra Dutta CSC 401- Fall 2011, Section 001.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 30 Message Security, User Authentication, and Key Management.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Network Security Chapter 8 12/13/ Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.
Computer and Network Security - Message Digests, Kerberos, PKI –
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Security in many layers  Application Layer –  Transport Layer - Secure Socket Layer  Network Layer – IPsec (VPN)  Link Layer – Wireless Communication.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
8: Network Security8-1 Chapter 8 Network Security A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students,
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
Network Security Chapter 8 Institute of Information Science and Technology. Chengdu University YiYong 2008 年 2 月 25 日.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Opracowanie językowe dr inż. J. Jarnicki
Chapter 8 Network Security.
Chapter 8 Network Security.
Public-Key, Digital Signatures, Management, Security
Unit 8 Network Security.
Network Security Chapter 8.
Presentation transcript:

Network Security

An Introduction to Cryptography The encryption model (for a symmetric-key cipher).

Symmetric-Key Algorithms DES – The Data Encryption Standard AES – The Advanced Encryption Standard Cipher Modes

Data Encryption Standard The data encryption standard. (a) General outline. (b) Detail of one iteration. The circled + means exclusive OR.

Triple DES (a) Triple encryption using DES. (b) Decryption.

AES – The Advanced Encryption Standard Rules for AES proposals 1.The algorithm must be a symmetric block cipher. 2.The full design must be public. 3.Key lengths of 128, 192, and 256 bits supported. 4.Both software and hardware implementations required 5.The algorithm must be public or licensed on nondiscriminatory terms.

AES An outline of Rijndael.

AES Creating of the state and rk arrays.

Electronic Code Book Mode The plaintext of a file encrypted as 16 DES blocks.

Cipher Block Chaining Mode Cipher block chaining. (a) Encryption. (b) Decryption.

Cipher Feedback Mode (a) Encryption. (c) Decryption.

Stream Cipher Mode A stream cipher. (a) Encryption. (b) Decryption.

Counter Mode Encryption using counter mode.

Public-Key Algorithms RSA (Rivest,Shamir, Adleman) 1.Choose two large prime numbers p and q (typically 1024 bits) 2.Compute n=pxq and z=(p-1)x(q-1) 3.Choose a number relatively prime to z and call it d. 4.Find e such that exd=1mod z 5.Public key is (n,e), private key is (n,d) 6.Encryption is C=P e mod n 7.Decryption is P=C d mod n

RSA An example of the RSA algorithm n=33,z=20,e=3,d=7

Digital Signatures Symmetric-Key Signatures Public-Key Signatures Message Digests

Symmetric-Key Signatures Digital signatures with Big Brother.

Public-Key Signatures Digital signatures using public-key cryptography.

Message Digests (MD5, SHA-1) Digital signatures using message digests.

Management of Public Keys Certificates X.509 Public Key Infrastructures

Problems with Public-Key Encryption A way for Trudy to subvert public-key encryption.

Certificates A possible certificate and its signed hash.

X.509 The basic fields of an X.509 certificate.

Public-Key Infrastructures (a) A hierarchical PKI. (b) A chain of certificates.

Communication Security IPsec Firewalls Virtual Private Networks Wireless Security

IPsec The IPsec authentication header in transport mode for IPv4.

IPsec (a) ESP in transport mode. (b) ESP in tunnel mode.

Firewalls A firewall consisting of two packet filters and an application gateway.

Virtual Private Networks (a) A leased-line private network. (b) A virtual private network.

Authentication Protocols Authentication Based on a Shared Secret Key Establishing a Shared Key: Diffie-Hellman Authentication Using a Key Distribution Center Authentication Using Kerberos Authentication Using Public-Key Cryptography

Authentication Based on a Shared Secret Key Authentication using HMACs.

Authentication Using a Key Distribution Center A first attempt at an authentication protocol using a KDC.

Authentication Using a Key Distribution Center The Needham-Schroeder authentication protocol.

Authentication Using Kerberos The operation of Kerberos V4.

Authentication Using Public-Key Cryptography Mutual authentication using public-key cryptography.

Security PGP – Pretty Good Privacy PGP in operation for sending a message.

PGP – Pretty Good Privacy A PGP message.

Web Security Secure Naming SSL – The Secure Sockets Layer

DNS Spoofing (a) Normal situation. (b) An attack based on breaking into DNS and modifying Bob's record.

DNS Spoofing How Trudy spoofs Alice's ISP.

Secure DNS An example RRSet for bob.com. The KEY record is Bob's public key. The SIG record is the top-level com server's signed A and KEY records to verify their authenticity.

SSL—The Secure Sockets Layer Layers (and protocols) for a home user browsing with SSL.

SSL A simplified version of the SSL connection establishment subprotocol.