Linux Networking and Security Chapter 8 Making Data Secure.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

CIS 193A – Lesson6 CRYPTOGRAPHY RAPELCGRQ. CIS 193A – Lesson6 Focus Question Which cryptographic methods help computer users maintain confidentiality,
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
Principles of Information Security, 2nd edition1 Cryptography.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Cryptographic Technologies
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Chapter 8 Network Security 4/17/2017
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Chapter 20: Network Security Business Data Communications, 4e.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
SCSC 455 Computer Security Chapter 2 Secure Data Dr. Frank Li.
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Chapter 8: Scrambling Through Cryptography Security+ Guide to Network Security Fundamentals Second Edition.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Chapter 7: Cryptographic Systems
Public Key Encryption.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Network Security Chapter 8 12/13/ Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
E-Commerce Security.
IS3230 Access Security Unit 9 PKI and Encryption
Pooja programmer,cse department
Unit 8 Network Security.
Presentation transcript:

Linux Networking and Security Chapter 8 Making Data Secure

Explain commonly used cryptographic systems Understand digital certificates and certificate authorities Use the PGP and GPG data-encryption utilities Describe different ways in which cryptography is applied to make computer systems more secure

Cryptography and Computer Security Computer security is about making certain that the only people accessing resources or data are those whom should have access Cryptography is the science of encoding data so that it cannot be read without special knowledge or tools; it is a key part of network applications and normally hidden from view Network connections can be tapped to allow for viewing of transmitted data - called sniffing the network, and encryption can block this

Cryptography and Computer Security

Basic Encoding Techniques The process of cryptography is as follows:  Begin with the message to transmit - called the plaintext  Apply a technique or rule called a cipher to change the plaintext  The result is ciphertext, an encrypted message The most elementary example of encryption is letter- substitution where a different letter of the alphabet is substituted for each letter in the message

Key Systems Rules, known as algorithms, allow letter-substitution to convert plaintext to ciphertext The level of complexity of an algorithm can be increased by using a key, a code necessary to encrypt or decrypt a message correctly using the algorithm Knowing the algorithm (the cipher) should not enable readability; good security assumes an eavesdropper knows the cipher, but the key must be kept secret

DES The Data Encryption Standard (DES) was developed in the 1970s and uses a 56-bit key to encrypt data using various algorithms 56 bits provide for 2 56 possible keys It now takes 20 hours to break a DES key DES is being phased out, but it is still widely used since relatively few people have the equipment to break the key, 20 hours is still a relatively long time in the Internet age, and it was a widely implemented U.S. standard

Skipjack and Triple DES There were several responses to the cracking of DES:  DES keys were increased to 1024 bits  Creation of a new algorithm called Skipjack, which uses an 80 bit key  Triple DES relies on DES, but encodes each message three times using three different keys  Advanced Encryption Standard (AES) can provide roughly possible keys, and was approved for use by U.S. government agencies in May 2002

Symmetric and Asymmetric Encryption Symmetric encryption algorithms  Use the same key and algorithm to encrypt and decrypt a message  The key used is called a private key, because it must be kept secret for the message to be secure Asymmetric encryption algorithms  Use one key to encrypt and another to decrypt  The key you can reveal to everyone is called a public key

Symmetric and Asymmetric Encryption

Signatures and Certificates Authentication is the process of proving that you are in fact the person you say you are Signatures let you authenticate a public key  You sign another person’s public key with your own private key to verify that the key really belongs to that person Certificates provide the same type of verification as signatures  A certificate is a numeric code that is used to identify an organization

Signatures and Certificates

Fingerprints A fingerprint is a smaller number that is derived from a very lengthy public key Fingerprints are created by hashing the public key, a process by which a mathematical function is used that converts larger numbers into smaller numbers Two commonly used hashes:  Message digest hash (MD5) provides 128 bits  Secure hash algorithm (SHA-1) provides 160 bits

Using Cryptography in a Browser Whenever you visit a Web page that has been transmitted to your computer using encryption, you see a small lock or key in the lower left corner of the browser window Most encrypted Web pages, such as order-entry screens, shopping carts, and similar data, appear with a URL that starts with https The encrypted protocol for Web pages is Secure Socket Layer (SSL)

Using Cryptography in a Browser

Kerberos Authentication Kerberos authentication is a special kind of authentication for organizational networks Kerberos was developed at MIT and is widely used around the world Kerberos secures a network by providing a system that makes users prove who they are before they can use a service and also makes services prove who they are It uses both public-key cryptography and a symmetric cipher

Kerberos Authentication

Using Encryption Utilities Pretty Good Privacy (PGP) is the first utility to provide public-key encryption to all Although PGP software was formerly included in Linux, it has been replaced with GPG Gnu Privacy Guard (GPG) is a public-key encryption utility and uses non-patented algorithms  GPG operates from the command line, but there are graphical utilities to make it easier to use

Using Encryption Utilities

Other Security Applications RPM security can check a public-key signature on any package to verify that it came from its stated creator Cryptographic File System (CFS) enforces cryptographic authentication on all users who want to share files across the network Transparent Cryptographic File System (TCFS) operates transparently to users IPSec and CIPE provide for IP packet encryption

Secure Shell Secure Shell (SSH) is an encrypted version of Telnet, which provides secure remote access  SSH allows other protocols to ride on top of it A Virtual Private Network (VPN) is a secure organizational network that uses an insecure public network (Internet) for communications  VPNs are often created with the aid of specially designed software that integrates many networking functions with cryptographic protocols and system management software

Virtual Private Networks

Chapter Summary Cryptography is the science of encoding data, typically using a key, so that people without the key cannot read the data Cryptography protects computer networks against sniffers, programs that allow crackers to see data passing along a network Many different algorithms are used to encrypt data and they are either symmetric or asymmetric DES was a popular standard algorithm for years, until Triple DES and AES began to replace it

Chapter Summary Public-key encryption does not require that you openly exchange a secret key with the recipient of an encrypted message RSA is the most familiar public-key algorithm Signatures on a document show that the sender is the only one who could have sent the document Certificates are issued and signed by certificate authorities such as VeriSign to vouch for the identity of the organization holding the certificate

Chapter Summary A hash is a mathematical function that creates a small number from a very large number and it is used to create a fingerprint Browsers such as Netscape and Mozilla use cryptography via the Secure Sockets Layer (SSL) protocol to allow secure e- commerce transactions Kerberos provides a network-wide user and service authentication scheme to limit network access to authorized users PGP was the first freely available public-key encryption software and remains an industry standard on which GPG is based

Chapter Summary The Gnu Privacy Guard (GPG) is a free public-key encryption utility that lets you manage keys and encrypt, sign and decrypt documents Keys should be signed only when the identity of the person providing the key has been ascertained with certainty The rpm utility can check a public key signature on any package to verify that it came from the person or organization that claims to have created it

Chapter Summary Other security protocols built on the same principles of cryptography as GPG include IPsec, CIPE, CFS and TCFS The Secure Shell (SSH) provides encrypted remote access via a utility that functions like Telnet. SSH also lets other protocols work with it to create secure connections for many purposes