ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
Cryptographic Security Presented by: Josh Baker October 9 th, CS5204 – Operating Systems.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Rennes, 23/10/2014 Cristina Onete Putting it all together: using multiple primitives together.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Cryptography Basic (cont)
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
© MMII JW RyderCS 428 Computer Networking1 Basic Internet Security Concepts.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Overview of Cryptography Oct. 29, 2002 Su San Im CS Dept. EWU.
Public Encryption: RSA
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
J.W. Ryder Basic Internet Security Concepts J.W. Ryder
Laboratory for Reliable Computing Department of Electrical Engineering National Tsing Hua University Hsinchu, Taiwan Security Processor: A Review Chih-Pin.
Information Security. Information Security Requirements Confidentiality: Protection from disclosure to unauthorised persons Access control: Unauthorised.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Network Security Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
How HTTPS Works J. David Giese. Hyper Text Transfer Protocol BrowserHTTP Server GET / HTTP/1.1 HOST: edge-effect.github.io HEADERS BODY HTTP/ OK.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Chapter 21 Public-Key Cryptography and Message Authentication.
×Key Distribution : Negotiation ×Key Management : N*(N-1)/2.
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
1 Securing Internet Sessions with Sorbet Fred Long, Robert Seacord, Scott A. Hissam, John Robert August, 1999 Software Engineering Institute Carnegie Mellon.
Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.
Chapter 7: Cryptographic Systems
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Public Key Encryption.
Class 4 Asymmetric Cryptography and Trusting Internal Components CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Cryptography Fundamentals
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Potential vulnerabilities of IPsec-based VPN
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Network Security Celia Li Computer Science and Engineering York University.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
Fundamentals of Network Security Ravi Mukkamala SCI 101 October 6, 2003.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
Secure Sockets Layer (SSL)
Public Key Encryption and Digital Signatures
Cryptography Basics and Symmetric Cryptography
امنیت شبکه علی فانیان
Security Risanuri Hidayat 21 February 2019 security.
Lecture 6: Digital Signature
Cryptography Fundamentals
LAB 3: Digital Signature
Presentation transcript:

ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014

Attack Types Passive attack: observe communications and/or data Active attack: modify communications and/or data

What are the security services in the OSI model?

Security Services in OSI Model Physical Layer: Data-Link Layer: Network Layer: Transport Layer: Session Layer: Presentation Layer: Application Layer:

Security Services in OSI Model Confidentiality Integrity Authentication Access Control Non-repudiation

Security Mechanisms to provide the needed security services Checksums/hash algorithms: Authorization and Integrity Encryption: Confidentiality, Integrity, Authentication Digital signatures: Integrity, Authentication, Non- repudiation

Secure Sockets Layer (SSL) Mechanisms: –Hashing SHA: Secure Hash Algorithm MD5: Message-Digest algorithm –Encryptions DES: Data Encryption Standard RSA: Ron Rivest, Adi Shamir, and Leonard Adleman –Signatures DSA: Digital Signature Algorithm RSA: Ron Rivest, Adi Shamir, and Leonard Adleman

Hash Function Data Channel Hashing Message Hash Message Hash Data

MAC (Message Authentication Code) Data Channel MAC Data Channel Message MAC Message MAC

Traditional Encryption (Symmetric Encryption) Common Key Insecure Channel Data

Key Agreement Insecure Channel Data

Public Key Encryption Insecure Channel Data

Digital Signature Data Channel Hashing Message Hash Message Hash Data Encrypt Signature Channel Signature

Digital Signature Data Signature Hashing Decrypt Compare Message Hash

Message/Data Encryption Data Encrypted Session Key Encrypted Session Key Encrypted Session Key Encrypted Session Key Channel

Reading “Understanding Security Using the OSI Model”, SANS Institute InfoSec Reading Room, [ room/whitepapers/protocols/understanding -security-osi-model-377 ] room/whitepapers/protocols/understanding -security-osi-model-377