Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.

Slides:



Advertisements
Similar presentations
Crytography Chapter 8.
Advertisements

Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Introduction to Cryptography
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
Principles of Information Security, 2nd edition1 Cryptography.
Web Security for Network and System Administrators1 Chapter 4 Encryption.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
WEB SECURITY. WEB ATTACK TYPES Buffer OverflowsXML InjectionsSession Hijacking Attacks WEB Attack Types.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Cryptographic Technologies
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Chapter 8 Network Security 4/17/2017
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Chapter 20: Network Security Business Data Communications, 4e.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Network Security Chapter
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Network Security Chapter 8.
Network Security Sorina Persa Group 3250 Group 3250.
Network Security Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
CN8816: Network Security1 Confidentiality, Integrity & Authentication Confidentiality - Symmetric Key Encryption Data Integrity – MD-5, SHA and HMAC Public/Private.
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
Network Security E.
Internet Engineering Czesław Smutnicki Discrete Mathematics – Cryptography.
Network Security Chapter 8
1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)
Network Security Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
1 Lecture #22: Network Security. 2 A classic lesson The chain is only as strong as its weakest link!
Introduction Cryptography: process of making and using codes to secure transmission of information Encryption: converting original message into a form.
Secure Socket Layer (SSL)
Network Security. Information secrecy-only specified parties know the information exchanged. Provided by criptography. Information integrity-the information.
Linux Networking and Security Chapter 8 Making Data Secure.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display Chapter 10 Network Security.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
8.4 – 8.5 Securing & Securing TCP connections with SSL By: Amanda Porter.
Network Security David Lazăr.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Chapter 7: Cryptographic Systems
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Chapter 7 : Web Security Lecture #1-Week 12 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Network Security Chapter 8 Institute of Information Science and Technology. Chengdu University YiYong 2008 年 2 月 25 日.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Opracowanie językowe dr inż. J. Jarnicki
Chapter 8 Network Security.
Network Security Chapter 8
CompTIA Security+ Study Guide (SY0-501)
Chapter 8 Network Security.
Network Security Chapter 8.
Presentation transcript:

Network Security Chapter 8 12/13/20151

Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles 12/13/2015www.ishuchita.com2

Need for Security Some people who cause security problems and why. 12/13/2015www.ishuchita.com3

An Introduction to Cryptography The encryption model (for a symmetric-key cipher). 12/13/2015www.ishuchita.com4

Transposition Ciphers A transposition cipher. 12/13/2015www.ishuchita.com5

One-Time Pads The use of a one-time pad for encryption and the possibility of getting any possible plaintext from the ciphertext by the use of some other pad. 12/13/20156

Quantum Cryptography An example of quantum cryptography. 12/13/2015www.ishuchita.com7

Symmetric-Key Algorithms DES – The Data Encryption Standard AES – The Advanced Encryption Standard Cipher Modes Other Ciphers Cryptanalysis 12/13/2015www.ishuchita.com8

Product Ciphers Basic elements of product ciphers. (a) P-box. (b) S-box. (c) Product. 12/13/2015www.ishuchita.com9

Data Encryption Standard The data encryption standard. (a) General outline. (b) Detail of one iteration. The circled + means exclusive OR. 12/13/2015www.ishuchita.com10

Triple DES (a) Triple encryption using DES. (b) Decryption. 12/13/2015www.ishuchita.com11

AES – The Advanced Encryption Standard Rules for AES proposals 1.The algorithm must be a symmetric block cipher. 2.The full design must be public. 3.Key lengths of 128, 192, and 256 bits supported. 4.Both software and hardware implementations required 5.The algorithm must be public or licensed on nondiscriminatory terms. 12/13/2015www.ishuchita.com12

AES (2) An outline of Rijndael. 12/13/2015www.ishuchita.com13

AES (3) Creating of the state and rk arrays. 12/13/2015www.ishuchita.com14

Electronic Code Book Mode The plaintext of a file encrypted as 16 DES blocks. 12/13/2015www.ishuchita.com15

Cipher Block Chaining Mode Cipher block chaining. (a) Encryption. (b) Decryption. 12/13/2015www.ishuchita.com16

Cipher Feedback Mode (a) Encryption. (c) Decryption. 12/13/2015www.ishuchita.com17

Stream Cipher Mode A stream cipher. (a) Encryption. (b) Decryption. 12/13/2015www.ishuchita.com18

Counter Mode Encryption using counter mode. 12/13/2015www.ishuchita.com19

Cryptanalysis Some common symmetric-key cryptographic algorithms. 12/13/2015www.ishuchita.com20

Public-Key Algorithms RSA Other Public-Key Algorithms 12/13/2015www.ishuchita.com21

RSA An example of the RSA algorithm. 12/13/2015www.ishuchita.com22

Digital Signatures Symmetric-Key Signatures Public-Key Signatures Message Digests The Birthday Attack 12/13/2015www.ishuchita.com23

Symmetric-Key Signatures Digital signatures with Big Brother. 12/13/2015www.ishuchita.com24

Public-Key Signatures Digital signatures using public-key cryptography. 12/13/2015www.ishuchita.com25

Message Digests Digital signatures using message digests. 12/13/2015www.ishuchita.com26

SHA-1 Use of SHA-1 and RSA for signing nonsecret messages. 12/13/2015www.ishuchita.com27

SHA-1 (2) (a) A message padded out to a multiple of 512 bits. (b) The output variables. (c) The word array. 12/13/2015www.ishuchita.com28

Management of Public Keys Certificates X.509 Public Key Infrastructures 12/13/2015www.ishuchita.com29

Problems with Public-Key Encryption A way for Trudy to subvert public-key encryption. 12/13/2015www.ishuchita.com30

Certificates A possible certificate and its signed hash. 12/13/2015www.ishuchita.com31

X.509 The basic fields of an X.509 certificate. 12/13/2015www.ishuchita.com32

Public-Key Infrastructures (a) A hierarchical PKI. (b) A chain of certificates. 12/13/2015www.ishuchita.com33

Communication Security IPsec Firewalls Virtual Private Networks Wireless Security 12/13/2015www.ishuchita.com34

IPsec The IPsec authentication header in transport mode for IPv4. 12/13/2015www.ishuchita.com35

IPsec (2) (a) ESP in transport mode. (b) ESP in tunnel mode. 12/13/2015www.ishuchita.com36

Firewalls A firewall consisting of two packet filters and an application gateway. 12/13/2015www.ishuchita.com37

Virtual Private Networks (a) A leased-line private network. (b) A virtual private network. 12/13/2015www.ishuchita.com38

Security Packet encryption using WEP. 12/13/2015www.ishuchita.com39

Authentication Protocols Authentication Based on a Shared Secret Key Establishing a Shared Key: Diffie-Hellman Authentication Using a Key Distribution Center Authentication Using Kerberos Authentication Using Public-Key Cryptography 12/13/2015www.ishuchita.com40

Authentication Based on a Shared Secret Key Two-way authentication using a challenge-response protocol. 12/13/2015www.ishuchita.com41

Authentication Based on a Shared Secret Key (2) A shortened two-way authentication protocol. 12/13/2015www.ishuchita.com42

Authentication Based on a Shared Secret Key (3) The reflection attack. 12/13/2015www.ishuchita.com43

Authentication Based on a Shared Secret Key (4) A reflection attack on the protocol of Fig /13/2015www.ishuchita.com44

Authentication Based on a Shared Secret Key (5) Authentication using HMACs. 12/13/2015www.ishuchita.com45

Establishing a Shared Key: The Diffie-Hellman Key Exchange The Diffie-Hellman key exchange. 12/13/2015www.ishuchita.com46

Establishing a Shared Key: The Diffie-Hellman Key Exchange The bucket brigade or man-in-the-middle attack. 12/13/2015www.ishuchita.com47

Authentication Using a Key Distribution Center A first attempt at an authentication protocol using a KDC. 12/13/2015www.ishuchita.com48

Authentication Using a Key Distribution Center (2) The Needham-Schroeder authentication protocol. 12/13/2015www.ishuchita.com49

Authentication Using a Key Distribution Center (3) The Otway-Rees authentication protocol (slightly simplified). 12/13/2015www.ishuchita.com50

Authentication Using Kerberos The operation of Kerberos V4. 12/13/2015www.ishuchita.com51

Authentication Using Public-Key Cryptography Mutual authentication using public-key cryptography. 12/13/2015www.ishuchita.com52

Security PGP – Pretty Good Privacy PEM – Privacy Enhanced Mail S/MIME 12/13/2015www.ishuchita.com53

PGP – Pretty Good Privacy PGP in operation for sending a message. 12/13/2015www.ishuchita.com54

PGP – Pretty Good Privacy (2) A PGP message. 12/13/2015www.ishuchita.com55

Web Security Threats Secure Naming SSL – The Secure Sockets Layer Mobile Code Security 12/13/2015www.ishuchita.com56

Secure Naming (a) Normal situation. (b) An attack based on breaking into DNS and modifying Bob's record. 12/13/2015www.ishuchita.com57

Secure Naming (2) How Trudy spoofs Alice's ISP. 12/13/2015www.ishuchita.com58

Secure DNS An example RRSet for bob.com. The KEY record is Bob's public key. The SIG record is the top-level com server's signed has of the A and KEY records to verify their authenticity. 12/13/2015www.ishuchita.com59

Self-Certifying Names A self-certifying URL containing a hash of server's name and public key. 12/13/2015www.ishuchita.com60

SSL—The Secure Sockets Layer Layers (and protocols) for a home user browsing with SSL. 12/13/2015www.ishuchita.com61

SSL (2) A simplified version of the SSL connection establishment subprotocol. 12/13/2015www.ishuchita.com62

SSL (3) Data transmission using SSL. 12/13/2015www.ishuchita.com63

Java Applet Security Applets inserted into a Java Virtual Machine interpreter inside the browser. 12/13/2015www.ishuchita.com64

Social Issues Privacy Freedom of Speech Copyright 12/13/2015www.ishuchita.com65

Anonymous R ers Users who wish anonymity chain requests through multiple anonymous r ers. 12/13/2015www.ishuchita.com66

Freedom of Speech Possibly banned material: 1.Material inappropriate for children or teenagers. 2.Hate aimed at various ethnic, religious, sexual, or other groups. 3.Information about democracy and democratic values. 4.Accounts of historical events contradicting the government's version. 5.Manuals for picking locks, building weapons, encrypting messages, etc. 12/13/2015www.ishuchita.com67

Steganography (a) Three zebras and a tree. (b) Three zebras, a tree, and the complete text of five plays by William Shakespeare. 12/13/2015www.ishuchita.com68