Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptography encryption authentication digital signatures
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Lecture 2.1: Private Key Cryptography -- I CS 436/636/736 Spring 2013 Nitesh Saxena.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Lecture 1 Overview.
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
Cryptography Week-6.
EE5552 Network Security and Encryption block 4 Dr. T.J. Owens CEng MIET Dr T. Itagaki MIET, MIEEE, MAES.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
CIS 5371 Cryptography Introduction.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Cryptography, Authentication and Digital Signatures
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Network Security Lecture 12 Presented by: Dr. Munam Ali Shah.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
Symmetric-Key Cryptography
Encryption.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Traditional Symmetric-Key Ciphers
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
CRYPTOGRAPHY & NETWORK SECURITY Introduction and Basic Concepts Eng. Wafaa Kanakri Computer Engineering Umm Al-Qura University.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Network Security Lecture 18 Presented by: Dr. Munam Ali Shah.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Network Security Celia Li Computer Science and Engineering York University.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
INCS 741: Cryptography Overview and Basic Concepts.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Introduction to Information Security Introduction & Overview
Introduction Of System Security
Chapter 3:Cryptography (16M)
Computer Security Chapter Two
Operating Systems Concepts
Basics Of Symmetric Encryption
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Network Security Lecture 10 Presented by: Dr. Munam Ali Shah

Part 2 (b) Cryptography as a Network Security Tool

Summary of the previous lecture We talked about how device security, traffic security and barrier security can help us achieving mobile device security strategy. We also discussed, the RSN and IEEE802.11i standard to ensure more security in our WLAN. 5 phases operation in 11i was also part pf previous lecture discussion And lastly, we discussed the Model for Network Security.

Outlines of today’s lecture We will talk about : What Cryptography is and why is it used Some basic terminologies such as plain text, cipher text, cryptanalysis will also form part of todays lecture discussion Types of cryptography attacks

Objectives You would be able to present an overview of cryptography and how this tool can ensure the network security. Understand the basics phenomenon to deploying cryptography in different environments

Cryptography The art of secret writing

Cryptography Cryptography is the art and science of secrecy Hiding one’s secrets has always been human’s desire Historically, cryptography has been associated with military But now its everywhere

Cryptography 3 interrelated terms Cryptology Cryptography Cryptanalysis 8 of 164

What is cryptology? Cryptology – science of hiding Cryptography, Cryptanalysis – hide meaning of a message Steganography, Steganalysis – hide existence of a message Cryptography – secret writing Cryptanalysis – analyzing (breaking) secrets Cryptanalysis is what attacker does Decipher or Decryption is what legitimate receiver does

Terminology Characters Alice Bob Eve Trent ……… Plaintext/message Ciphertext 10 of 164

Terminology Key Single/secret/symmetric key Two/public/asymmetric key Encryption/encipherment  The conversion of data into ciphertext, that cannot be easily understood by unauthorized people. Decryption/decipherment  The process of converting encrypted data back into its original form so that it can be understood. 11 of 164

Modern cryptography is based on Mathematics Computer science Cleverness and creativity

13 Cryptography plaintext message ciphertext message Encryption Decryption Encrypted(Information) cannot be read Decrypted(Encrypted(Information)) can be

Cryptography Encrypt Decrypt Plaintext Ciphertext Plaintext Alice Bob Eve (active attacker) Insecure Channel

A simple example

More simple example

Another way to represent the concept of Cryptography

4 types of cryptanalysis Depending on what a cryptanalyst has to work with, attacks can be classified into ciphertext only attack known plaintext attack chosen plaintext attack chosen ciphertext attack (most severe)

4 types of attacks Ciphertext only attack the only data available is a target ciphertext Known plaintext attack a target ciphertext pairs of other ciphertext and plaintext (say, previously broken or guessing)

4 types of attacks Chosen plaintext attacks a target ciphertext can feed encryption algorithm with plaintexts and obtain the matching ciphertexts Chosen ciphertext attack a target ciphertext can feed decryption algorithm with ciphertexts and obtain the matching plaintexts

Goals of the Adversary Get the key (ideally) Get the message Get part of the message/some information about the message

Model for Network Security This general security model shows that there are four basic tasks in designing a particular security service: 1. Design an algorithm for performing the security-related transformation. The algorithm should be such that an opponent cannot defeat its purpose. 2. Generate the secret information to be used with the algorithm. 3. Develop methods for the distribution and sharing of the secret information. 4. Specify a protocol to be used by the two principals that makes use of the security algorithm and the secret information to achieve a particular security service.

Model for Network Security

Network Access Security Model Programs can present two kinds of threats 1. Information access threats: Intercept or modify data on behalf of users who should not have access to that data. 2. Service threats: Exploit service flaws in computers to inhibit use by legitimate users.

Network Access Security Model

Summary of today’s lecture We discussed the basic concept of cryptography Some terminologies such as plain text, ciphertext and key were also discussed. We have seen how keys can be used to encrypt and decrypt the message

Next lecture topics Our discussion on cryptography. Classical ciphers with some examples will be discussed We will also discuss symmetric and asymmetric cryptography

The End