Internet-security.ppt-1 (2000-11-26) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Cryptography and Network Security
Security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents Security requirements Public key cryptography Key agreement/transport.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Netprog: Cryptgraphy1 Cryptography Reference: Network Security PRIVATE Communication in a PUBLIC World. by Kaufman, Perlman & Speciner.
Cryptographic Security Presented by: Josh Baker October 9 th, CS5204 – Operating Systems.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Mar 19, 2002Mårten Trolin1 This lecture On the assignment Certificates and key management SSL/TLS –Introduction –Phases –Commands.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Chapter 8 Web Security.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Public Key Model 8. Cryptography part 2.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
Chapter 31 Network Security
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Secure Socket Layer (SSL)
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Cryptography, Authentication and Digital Signatures
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 2: Message integrity.
Digital Signatures, Message Digest and Authentication Week-9.
Lecture 2: Introduction to Cryptography
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Public Key Encryption, Secure WWW Transactions & Digital Signatures.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
The Secure Sockets Layer (SSL) Protocol
Computer Communication & Networks
Secure Sockets Layer (SSL)
Encryption
Cryptography and Network Security
The Secure Sockets Layer (SSL) Protocol
Presentation transcript:

internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the building blocks...

Kommunikationsnetz Franken e.V. internet-security.ppt-2 ( ) 2000 © Maximilian Riegel Internet Security Agenda  Basic cryptography  Hash functions  Secret key cryptography  Public key cryptography  Providing identity  Verifying information  Keeping secrets  Key management  Internet security protocols

Kommunikationsnetz Franken e.V. internet-security.ppt-3 ( ) 2000 © Maximilian Riegel Internet Security Basic Cryptography  “Cryptography” originates from Greek for “secret writing”  Keeping information secret is often associated with cryptography. Important uses of cryptography to gain security  Confidentiality - keeping secrets against eavesdropping  Authentication - providing identity against forgery and masquerade  Message integrity - verifying information against alteration This document specifies an Internet standards track protocol. Guvf qbphzrag fcrpvsvrf na Vagrearg fgnaqneqf genpx cebgbpby. This document specifies an Internet standards track protocol. Guvf qbphzrag fcrpvsvrf na Vagrearg fgnaqneqf genpx cebgbpby. Cryptography is no mean against denial of service!

Kommunikationsnetz Franken e.V. internet-security.ppt-4 ( ) 2000 © Maximilian Riegel Internet Security Types of Cryptography  Secret key cryptography  Symmetric encryption The same key is used for encryption and decryption  Public key cryptography  Asymmetric encryption Separate keys for encryption and decryption, only one of them needs to be kept secret.  Hash functions  Compressing a message to a string of fixed length (the “message digest”) such that the function is one way.  Popular techniques are MD4, MD5 and SHA-1 Message compression function digest

Kommunikationsnetz Franken e.V. internet-security.ppt-5 ( ) 2000 © Maximilian Riegel Internet Security Secret key cryptography  The same key and the same mathematical transformation is used for both encryption and decryption.  Symmetric encryption algorithms require relative small computation power and are suited for high bandwidth.  Security is provided by reasonable keys lengths (at least > 64bit, usually bit).  Stream ciphers process byte by byte whereas block ciphers process fixed blocks of data.  Block ciphers require an initialization vector to gain full strength.  Common used algorithms are: DES, 3DES, RC2 and RC4 The DES cipher

Kommunikationsnetz Franken e.V. internet-security.ppt-6 ( ) 2000 © Maximilian Riegel Internet Security Public key cryptography  The public key cryptography uses two different keys for encryption and decryption. Only one of the key pair needs to be kept secret (the private key), the other must not be secret at all.  Data encrypted by the public key can only decrypted by the private key.  Some algorithms like RSA are reversible allowing data encrypted by the private key to be decrypted by the public key.  Public key cryptography or asymmetric encryption is very computational intensive and thus not suited for large chunks of data. Source: Stephen Thomas; SSL and TLS Essentials

Kommunikationsnetz Franken e.V. internet-security.ppt-7 ( ) 2000 © Maximilian Riegel Internet Security Providing Identity Source: Stephen Thomas; SSL and TLS Essentials  Bob receives a message with important information, purportedly from Alice.  How can Bob make sure that the message is really coming from Alice?  Charles might have forged the card to make it appear as if it from Alice.

Kommunikationsnetz Franken e.V. internet-security.ppt-8 ( ) 2000 © Maximilian Riegel Internet Security Providing identity by public key cryptography Source: Stephen Thomas; SSL and TLS Essentials  Reversible public key algorithms such as RSA (Rivest Shamir Adleman) can be used for digital equivalent of a signature.  Bob enciphers the message with his private key and sends the information to Alice.  Alice can use the public key of Bob known to her to decipher the message to check whether the message is really from Bob.

Kommunikationsnetz Franken e.V. internet-security.ppt-9 ( ) 2000 © Maximilian Riegel Internet Security Verifying information  Providing identity does not make sure the message has not altered by a man in the middle.  Using a hash function over the whole message, generating a message digest of it and enciphering the message digest by the private key of the author provides a digital signature allowing to check the identity as well as the integrity of the message.  The receiver decrypts the digital signature received together with the message and compares it to the message digest calculated locally. Source: Stephen Thomas; SSL and TLS Essentials

Kommunikationsnetz Franken e.V. internet-security.ppt-10 ( ) 2000 © Maximilian Riegel Internet Security Keeping secrets  Alice likes to send confidential information to Bob. It is extremely important, that no one other than Bob can get access to the plaintext information.  Charles might be extremely interested in this information taking any means to get access to the data. The weakest part might be the cipher key of the encryption. Source: Stephen Thomas; SSL and TLS Essentials

Kommunikationsnetz Franken e.V. internet-security.ppt-11 ( ) 2000 © Maximilian Riegel Internet Security Combining secret and public key cryptography  Keys used for symmetric encryption might be vulnerable.  Use of public key cryptography allows to establish a new symmetric key whenever data has to be send.  Alice generates a random number and uses the public key of Bob to encipher it and send it secret to Bob. Only Bob can decrypt the encrypted random number.  The Diffie-Hellman algorithm is another method to establish a secret key between two parties only using public messages. Source: Stephen Thomas; SSL and TLS Essentials

Kommunikationsnetz Franken e.V. internet-security.ppt-12 ( ) 2000 © Maximilian Riegel Internet Security Key management  Public key cryptography requires the reliable provisioning of the public keys. Digital signatures fully depend of the identity of the public keys.  Public key certificates are electronic documents allowing the check of the validity of someone's public key.  The public key of the Subject is signed by the private key of the Issuer. Signing means applying a hash function, generating a message digest and enciphering the message digest with the private key.  The issuer of certificates are traditionally known as Certificate Authorities (CA). A public key certificate

Kommunikationsnetz Franken e.V. internet-security.ppt-13 ( ) 2000 © Maximilian Riegel Internet Security Cryptography in the Internet Internet/Web Applications Internet link phy ip tcp http www link phy ip link phy ip link phy ip link phy ip link phy ip link phy ip link phy ip tcp http www Peer (Client) Peer (Server) Cryptography can be put into any layer providing end-to-end transparency.

Kommunikationsnetz Franken e.V. internet-security.ppt-14 ( ) 2000 © Maximilian Riegel Internet Security Security protocols HTML http tcp ip user data appl. header tcp headerapplication data ip header Ethernetip headertcp headerappl. headeruser data TCP segment IP datagramm Ethernet frame bytes 14 bytes20 bytes ipsec ssl, tls, ssh pgp Key Management