Network Security Celia Li Computer Science and Engineering York University.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

By Md Emran Mazumder Ottawa University Student no:
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Sri Lanka Institute of Information Technology
Chapter 11: Cryptography
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
6/9/2015Madhumita. Chatterjee1 Overview of Computer Security.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Applied Cryptography for Network Security
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Cryptography COS 461: Computer Networks Princeton University 1.
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Cryptography, Authentication and Digital Signatures
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
ACM 511 Introduction to Computer Networks. Computer Networks.
Network Security David Lazăr.
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
1 Security and Cryptography: basic aspects Ortal Arazi College of Engineering Dept. of Electrical & Computer Engineering The University of Tennessee.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Lecture 2: Introduction to Cryptography
Cryptography COS 461: Computer Networks Precept: 04/20/2012 Princeton University 1.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Mort Anvari Introduction to Encryption Technology To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Basics of Cryptography
Presentation transcript:

Network Security Celia Li Computer Science and Engineering York University

2 Outline Overview of network security and Cryptography Authentication protocols  Wired networks  Wireless local area networks Key management

3 Overview of Network Security Confidentiality  The concealment of information or resources Integrity  Data cannot be modified without being detected Authenticity  A node can ensure the identity of the peer node it is communicating with. Availability  The ability to use the information or resource desired

4 Overview of Network Security Security Attacks  An attack is any action that violates security  Common attacks Eavesdropping Integrity attack Authenticity attack Deny of service

5 Overview of Network Security Eavesdropping – Message Interception  Unauthorized access to information  Packet sniffers and wiretappers  Illicit coping of data and programs

6 Overview of Network Security Integrity Attack – Tampering with Message  Stop the flow of the message  Delay and optionally modify the message  Release the message again

7 Overview of Network Security Authenticity Attack – Fabrication  Unauthorized assumption of other’s identity  Generate and distribute objects under this identity

8 Overview of Network Security Attack on Availability  Destroy on Availability  Corrupt packets in transit  Denial of Service (DoS)  Crashing the server  Overwhelm the server (use up its resource)

9 Security Services Access control  Only authorized actions (e.g., membership enrollment, data transmission) can be performed. Authentication  Assurance that an entity of concern or the origin of a communication is authentic – it’s what it claims to be or from Encryption  Converting data into a form that cannot be easily understood by unauthorized people

10 Security Services (cont.) Key management  Generation, distribution and replace of keys Secure routing  A message is eventually delivered to all legitimate nodes within a reasonable amount of time  Despite corrupting, dropping or misrouting the message.

11 Overview of Cryptography Why cryptography?  Used to hide information  Network information needs to be communicated through insecure channel  Stored information may be accessed without proper authorization What cryptography can do?  Encryption algorithms: only the authorized party can understand the encrypted message  Digital signature: allow people to verify the authenticity of the message

12 Overview of Cryptography Encryption Algorithms  Scrambling of message such that only intended receiver can unscramble them  Encrypting function- produces encrypted message  Decrypting function- extracts original message  Key - parameter that controls encryption/decryption

13 Overview of Cryptography What is Key? A piece of information that controls the operation of an encryption algorithm.  A key specifies the particular transformation of plaintext into ciphertext, or vice versa during decryption.  To prevent a key from being guessed, keys need to be generated truly randomly

14 Overview of Cryptography Symmetric Encryption Process  Use the same key for both encryption and decryption  Example: DES, 3DES

15 Overview of Cryptography Public Key Encryption Process  Use a pair of keys, public key and private key  finding out the private key is extremely difficult, even if the public key is known  Example: RSA, Elliptic Curve

16 Overview of Cryptography Example

17 Overview of Cryptography Symmetric & Public Key Encryption  Symmetric encryption is fast but not as safe as public key encryption. But because of its speed, it's commonly used for multimedia, e-commerce transactions.  Public key encryption is more complex-- and more secure. More computation is required, so the process takes longer

18 Overview of Cryptography Hash Function A reproducible method of turning data into a small number that may serve as a digital "fingerprint" of the data (Message Digest)  If two hashes are different, then the two inputs are different in some way.  If a hash value is calculated for a piece of data, and then one bit of that data is changed, a hash function produces a completely different hash value.  Unidirectional (cannot calculate text from hash)

19 Overview of Cryptography Hash Function  Two most-commonly used hash functions: MD5 and SHA-1

20 Overview of Cryptography Hash Function for Date Integrity  If the two hashes do not match, the message was altered

21 Overview of Cryptography Digital Signature  A number attached to a message, when other people receive the message, he can simply verify the attached number to confirm whether the message has been changed or not.  Gives a recipient reason to believe that the message was created by a known sender.  Commonly used for software distribution, financial transactions, and in other cases where it is important to provide authenticity and integrity.

22 Overview of Cryptography Digital Signature Generating Process Hash a document

23 Overview of Cryptography Digital Signature Generating Process Sign the message digest

24 Overview of Cryptography Digital Signature Verifying Process

25 Overview of Cryptography Digital Signature Verifying Process

26 Overview of Cryptography Digital Signature Algorithms  The Digital Signature Algorithm (DSA)  The RSA digital signature algorithm  The Elliptic Curve Digital Signature Algorithm (ECDSA)

27 Authentication Key management Our Focus