ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic.

Slides:



Advertisements
Similar presentations
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Advertisements

CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
NSRC Workshop Some fundamental security concerns... Confidentiality - could someone else read my data? Integrity - has my data been changed? Authentication.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Security & Encryption Thomas Fenske & Joseph Minter.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Cryptography in World War II Jefferson Institute for Lifelong Learning at UVa Spring 2006 David Evans Class 4: Modern Cryptography
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
Cryptographic Technologies
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
Computer Science Lecture 22, page 1 Security in Distributed Systems Introduction Cryptography Authentication Key exchange Readings: Tannenbaum, chapter.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
Supporting Technologies III: Security 11/16 Lecture Notes.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Introduction to Information Security J. H. Wang Sep. 15, 2014.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
David Evans CS200: Computer Science University of Virginia Computer Science Class 36: Public-Key Cryptography If you want.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Conventional crypto - Noack Conventional crypto Diffusion and confusion How Mary Queen of Scots lost her head Various hand operable ciphers Various Enigmas.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
Intro to Cryptography Lesson Introduction
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
INCS 741: Cryptography Overview and Basic Concepts.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Network Security  introduction  cryptography  authentication  key exchange  required reading: text section 7.1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Security Protecting information data confidentiality
Unit 3 Section 6.4: Internet Security
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Cryptographic Hash Function
Security through Encryption
The Secure Sockets Layer (SSL) Protocol
Security.
Presentation transcript:

ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic techniques. Cryptographic algorithms and protocols are introduced and their use in secure protocols such as secure shell (SSH) and secure mail (Pretty Good Privacy/PGP) are studied. Topics Conventional encryption, algorithms and techniques Public key cryptography and a little number theory Authentication and hash functions Digital signatures and authentication protocols Electronic mail, IP, and web security The cryptographic techniques used in intruders, viruses, and worms Firewalls Cryptanalysis methods and methods of exploiting protocol weaknesses Legal and social issues – current legislation Instructor – Thomas L. Noack (details at-amadeus.uprm.edu/~noack/crypto) Projects – Many possibilities – protocol weaknesses, interdisciplinary Prerequisites – ICOM 5007 and INEL 4307 or permission of instructor

What crypto does Confidentiality Authentication Signature – is this the only copy Content verification – did someone modify When was this signed – still valid Individual identification at a distance Key distribution – with a key server Key agreement – mutual agreement, no global server

Where you see it Commercial transactions Internet and electronic purchases Electronic fund transfers and the money laundromat Medical and other data Privacy of medical records But getting insurance benefits

Other privacy applications Data security and authentication Personnel and payroll records Individual files on a server Controlled database access – you can see your info – Intellectual property protection DVDs, Music, eBooks, movie content System login and passwords

The components of crypto Private key crypto Key must be kept secret Separate key for each group of users Public key crypto Knowing public key doesn’t reveal private key Can be used for secrecy or authentication

More components Hash and message authentication Message digest – long message, short authenticator Saves encryption effort One-way function – only encrypted password is stored Key exchange You can agree on a key without having a trusted key distributor

Some basic principles Don’t use secret or amateur algorithms The crypto community tries to break the published algorithms – if they haven’t, you can trust them a bit more Algorithm strength should depend only on key length alone – known method, nearly unguessable key Again, don’t invent your own – read the literature and understand the problems and weaknesses

What we study - principles Conventional encryption, algorithms and techniques Public key cryptography and a little number theory Authentication and hash functions Digital signatures and authentication protocols

What we study - applications Electronic mail, IP, and web security The cryptographic techniques used in intruders, viruses, and worms Firewalls Cryptanalysis methods and methods of exploiting protocol weaknesses Legal and social issues – current legislation

What are the difficult parts Studying the weakness of systems and protocols Historically, and now, little procedure weaknesses and subtle traps have changed history Understanding how attacks work Understanding how it fits together Complete systems include browsers and outside systems over which you don’t have control – crypto is global, just like the internet

The 4-rotor Enigma, with wiring pictures from Budiansky, Stephen, Battle of Wits Uses the polyalphabetic principle Repositioning the rotors gives a new alphabet The rotors are stepped at each character It was broken at least partly because of operator carelessness

The Bombe, used to break Enigma messages Comments This is actually a copy of the machine conceived by Turing It still used a plugboard approach rather than a strictly electronic stored program Material captured from ships and submarines was also used This was a combination of known plaintext and brute force cryptanalysis It is not a Turing machine in the computer science sense picture from Budiansky, Stephen, Battle of Wits