Team 6 Decrypting Encryption Jeffrey Vordick, Charles Sheefel, and Shyam Rasaily.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Network Security.
CS470, A.SelcukIPsec – AH & ESP1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
J. Wang. Computer Network Security Theory and Practice. Springer 2009 Chapter 5 Network Security Protocols in Practice Part II.
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
SCSC 455 Computer Security Virtual Private Network (VPN)
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography.
Guide to Network Defense and Countermeasures Second Edition
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
Virtual Private Networks and IPSec
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Ssh: secure shell. overview Purpose Protocol specifics Configuration Security considerations Other uses.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Computation for Physics 計算物理概論 Introduction to Linux.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Secure connections.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Network Security. Information secrecy-only specified parties know the information exchanged. Provided by criptography. Information integrity-the information.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Andreas Steffen, , 11-SSH.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen M. Liebi Institute for Internet Technologies and Applications.
An Introduction to Encrypting Messages on the Internet Mike Kaderly INFS 750 Summer 2010.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
We will now practice the following concepts: - The use of known_hosts files - SSH connection with password authentication - RSA version 2 protocol key.
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
NETWORKING IN LINUX. WHAT IS LINUX..? Freely implemention of UNIX-like Kernel. Free & Open source Software. Developed by Linus Torvalds in 1991.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
Tunneling and Securing TCP Services Nathan Green.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Securing Network Communications Using IPSec Chapter Twelve.
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Understand Internet Security LESSON Security Fundamentals.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Secure Communications ● Cleartext vs. encryption and encapsulation ● Protocols not to use ● SSH – scp/ftp – SSH tunnelling ● VPN.
Secure services Unit-IV CHAP-1
Virtual Private Networks and IPSec
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Virtual Private Networks
Remote Access Lecture 2.
UNIT.4 IP Security.
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Security Protocols in the Internet
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
The University of Adelaide, School of Computer Science
Unit 8 Network Security.
Presentation transcript:

Team 6 Decrypting Encryption Jeffrey Vordick, Charles Sheefel, and Shyam Rasaily

Encryption

Encryption Convert data into scramble data (cipher text) Information privacy Assurances Data not modified Viewed by intended recipient Received at intended destination Encryption

Key Encryption

Key Encryption Random string of character Key Encryption

Private and Public Key Encryption

Private Key Encryption Private Key Yo Alice #dasf ^&* Yo Alice Encrypt Decrypt BOB ALICE Private Key Private Key Encryption

Public Key Encryption Use two Keys Private key Public Key Public Key Encryption

Public Key Yo Alice #dasf ^&* Yo Alice Encrypt Decrypt BOB ALICE Public KeyPrivate Key Public Key Encryption

PGP (Pretty Good Privacy)

Raw file Sign file with private key Encrypt file with public key Encrypted and signed file Decrypt file with private key Verify signature with public key Pretty Good Privacy

SSL (Secure Sockets Layer)

Secure Socket Layer

SSH (Secure Shell)

Secure Shell Commonly used for remote access like VPN Public keys are placed on the computers that should allow access. (So its more like a lock) Private key allows access to computers locked with the public keys

SCP (Secure CoPy) & SFTP (Secure File Transfer Protocol)

Extension of OpenSSH Replaces insecure FTP Uses TCP Port 22 Included on UNIX, Linux, and Macintosh OS X operating systems Below is a conversion between lsu’s server and my MAC Charless-MacBook-Pro:~ csheefel3$ scp test The authenticity of host 'lsu.edu ( )' can't be established. RSA key fingerprint is 52:fd:fa:74:40:a7:c4:03:8f:04:7b:78:c8:ea:e8:68. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added 'lsu.edu, ' (RSA) to the list of known hosts. \033[H\033[2J NOTICE: This is the Louisiana State University computer system, which may be accessed and used only by authorized persons. LSU reserves the right to review and/or monitor system transactions for compliance with its policies and/or applicable law. Upon reasonable cause, LSU may disclose such transactions to authorized persons for official purposes, including criminal and other investigations, and permit the monitoring of system transactions by law enforcement agencies. Access or use of this computer system by any person, whether authorized or unauthorized, constitutes consent to these terms. password: SCP (Secure CoPy)

Using SCP Ideal for quick transfer of single files. Syntax is similar to the Unix copy command. For demonstration purposes, we'll use two computers (Kari’s desktop and CEBALab001) with the usernames Kari and kwalters scp path/to/file If Kari wanted to transfer the a file called example.txt from Kari’s home directory on Kari’s desktop to Kari’s home directory on CEBALab001, the command might look like this: scp /home/Kari/example.txt If Kari wanted to transfer a file from CEBALab001 to Kari’s desktop, she could type something like this: scp /home/Kari/ If Kari needed to copy an entire directory, Kari would need to use the recursive flag, like this: scp -r Karidirectory SCP (Secure CoPy)

Uses Propriety SSH Connects like FTP Not as widely supported Five main commands: ls, get, put, cd, and lcd. Designed by IETF Used to transport multiple files Latest Version 6* SFTP (Secure File Transfer Protocol)

IPSec (Internet Protocol Security)

Operates at Network Layer Adds information to headers of IP packets Designed by IETF Works on any TCP/IP Transmission Native IPv6 Standard Authentication 1.Phase 1 Key Management: IKE on port Phase 2 Encryption: AH and ESP IPSec (Internet Protocol Security)

VPN concentrator Establish VPN Connection Authenticates VPN Clients Location: edge of private network IPSec (Internet Protocol Security)

Modes 1.Transport Mode- Encapsulated Header Intact 2.Tunnel Mode – New Encapsulated Header IPSec (Internet Protocol Security)

Any Questions?