Asymmetric-Key Cryptography Also known as public-key cryptography, performs encryption and decryption with two different algorithms. Each node announces.

Slides:



Advertisements
Similar presentations
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Advertisements

1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
1 CS 854 – Hot Topics in Computer and Communications Security Fall 2006 Introduction to Cryptography and Security.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Rachana Y. Patil 1 1.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Dr. Khalid A. Kaabneh Amman Arab University
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography and Network Security (CS435) Part Eight (Key Management)
1 Public-Key Cryptography and Message Authentication.
Computer and Network Security Rabie A. Ramadan Lecture 6.
P1. Public-Key Cryptography and RSA 5351: Introduction to Cryptography Spring 2013.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Public Key Encryption.
Introduction to Quantum Key Distribution
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
ECE509 Cyber Security : Concept, Theory, and Practice Key Management Spring 2014.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Fall 2006CS 395: Computer Security1 Key Management.
Key Management and Distribution Anand Seetharam CST 312.
CST 312 Pablo Breuer.  First published public-key algorithm  A number of commercial products employ this key exchange technique  Purpose is to enable.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
6.033 Quiz3 Review Spring How can we achieve security? Authenticate agent’s identity Verify the integrity of the request Check the agent’s authorization.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Presentation transcript:

Asymmetric-Key Cryptography Also known as public-key cryptography, performs encryption and decryption with two different algorithms. Each node announces its public key and then uses its own private key to encrypt messages. Other nodes can decrypt the node with the public key. Only the specific public key of a node can be used to decrypt a message encrypted with that node’s private key. Messages can be authenticated, kept private and the content proven to be correct through this method.

Symmetric-Key Cryptography Also known as shared-key cryptography, performs encryption and decryption with the same algorithm and key. The difficulty is sharing a key between two nodes without someone else eavesdropping and also receiving the key Schemes must be implemented carefully. Methods such as simple shifts in ASCII code are prone to the “dictionary attack” Traditional symmetric schemes have great difficulty scaling. The number of keys in each node increases on O(n 2 )

Sensor Node Characteristics

Probabilistic Key Distribution Keeping every key of a large sensor network is unnecessary. Most nodes can not talk directly to each other in a network with 10,000 nodes. The number of keys can be be decreased greatly if we reduce the number per node to guarantee that two nodes can “almost certainly” communicate. In order to implement this, it is important to understand some random graph theory.