Chapter 7 – Confidentiality Using Symmetric Encryption.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Network Security. Confidentiality Using Symmetric Encryption John wrote the letters of the alphabet under the letters in its first lines and tried it.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Chapter 8: Local Area Networks: Internetworking. 2 Objectives List the reasons for interconnecting multiple local area network segments and interconnecting.
1 Pertemuan 07 Enkripsi Simetrik Kontemporer Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Confidentiality using Symmetric Encryption traditionally symmetric encryption is used to provide message confidentiality consider typical scenario –workstations.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Chap. 7: Confidentiality using symmetric encryption & Introduction to public-key cryptosystems Jen-Chang Liu, 2004 Adapted from Lecture slides by Lawrie.
Cryptography1 CPSC 3730 Cryptography Chapter 7 Confidentiality Using Symmetric Encryption.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Internet Protocol Security (IPSec)
Cryptography and Network Security Chapter 7
Cryptography and Network Security Chapter 7 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Modified – Tom Noack, UPRM.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Cryptography and Network Security (CS435)
Symmetric and Asymmetric Ciphers. Symmetric Encryption  or conventional / private-key / single-key  sender and recipient share a common key  all classical.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
POSTER TEMPLATE BY: Whitewater HTTP Vulnerabilities Nick Berry, Joe Joyce, & Kevin Vaccaro. Syntax & Routing Attempt to capture.
Chapter 8: Virtual LAN (VLAN)
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Information Security Lab. Dept. of Computer Engineering 182/203 PART I Symmetric Ciphers CHAPTER 7 Confidentiality Using Symmetric Encryption 7.1 Placement.
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
Csci5233 Computer Security1 Bishop: Chapter 11 An Overview of Cipher Techniques (in the context of networks) ( )
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Chapter 7 – Confidentiality Using Symmetric Encryption.
Chapter 7 Confidentiality Using Symmetric Encryption.
Cryptography and Network Security Key Distribution for Symmetric Encryption.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Cisco 3 - Switch Perrine. J Page 111/6/2015 Chapter 5 At which layer of the 3-layer design component would users with common interests be grouped? 1.Access.
Network Security & Accounting
STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through.
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
Fall 2006CS 395: Computer Security1 Confidentiality Using Symmetric Encryption.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Network Layer Security Network Systems Security Mort Anvari.
Confidentiality using Conventional Encryption Chapter 5.
Introduction to Networking. What is a Network? Discuss in groups.
Network Security Confidentiality Using Symmetric Encryption Chapter 7.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Virtual Private Network
Virtual Local Area Networks or VLANs
Computer and Network Security
Chapter 7: Confidentiality Using Symmetric Encryption
Cryptography and Network Security Chapter 7
Cryptography and Network Security
Virtual LANs.
Confidentiality using Symmetric Encryption
Firewalls Routers, Switches, Hubs VPNs
Confidentiality using Symmetric Encryption
Cryptography and Network Security Chapter 7
Cryptography and Network Security Chapter 7
Chapter 15 – Part 2 Networks The Internal Operating System
CSCE 715: Network Systems Security
CSCE 715: Network Systems Security
New York Institute of Technology- Amman Campus
Presentation transcript:

Chapter 7 – Confidentiality Using Symmetric Encryption

Confidentiality using Symmetric Encryption Assume that traditional symmetric encryption is used to provide message confidentiality consider typical scenario What are the possible points of vulnerability

Typical Scenario

Points of attacks consider attacks and placement in this scenario –snooping from another workstation LAN is a broadcast network Traffic visible to all workstations in the LAN –use dial-in to LAN or server to snoop If a server or a workstation offers dial-in service –router can be vulnerable If one has physical access to the router –monitor and/or modify traffic one external links

Placement of Security Devices

Two major placement alternatives link encryption –encryption occurs independently on every link –implies must decrypt traffic between links –One key per (node, node) pair –Message exposed in nodes –Transparent to user, done in hardware end-to-end encryption –encryption occurs between original source and final destination –One key per user pair –Message encrypted in nodes –User selects hardware, software implementation

Traffic Analysis when using end-to-end encryption must leave headers in clear –so network can correctly route information hence although contents protected, traffic pattern flows are not