Computer Security (CS4800)

Slides:



Advertisements
Similar presentations
Cryptography and Network Security Chapter 1
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Lecture 2.1: Private Key Cryptography -- I CS 436/636/736 Spring 2013 Nitesh Saxena.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Applied Cryptography for Network Security
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Applied Cryptography Chapter 1 Foundations Jaewon Lee.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
Network Security Chapter
Information Security Prepared By: Prof. Ajaykumar T. Shah
Chapter 2 – Classical Encryption Techniques
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security Chapter 1
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Cryptography & Classical Ciphers
Introduction to Information Security Chapter II : Classical Ciphers.
Cryptography and Network Security
Information Security Principles (ESGD4222)
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security Essentials Chapter 1
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
Network Security (Course Details) By ASIM SHAHZAD Assistant Professor University Of Engineering And Technology Taxila.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Lec. 5 : History of Cryptologic Research II
Introduction to Computer and Network Security Iliano Cervesato 24 August 2008 – Introduction to Cryptography.
Network Security Section 1: Introduction to security.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Introduction (Pendahuluan)  Information Security  Criptography.
Network security 1. Security taxonomy Physical security Resource exhaustion - DDoS system/network vulnerabilities Key-based security.
Crypto in information security
Network Security Unit-1
Columnar Transposition
Introduction Of System Security
Encryption
Cryptography and Network Security Sixth Edition by William Stallings.
Computer and Network Security
Chapter 3:Cryptography (16M)
Unit 2: Cryptography & Cryptographic Algorithm
Basic of Modern Cryptography
Computer Security Chapter Two
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Computer Security (CS4800) Survey Prepared by Dr. Lamiaa Elshenawy

Survey Book (CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, 5th edition, William Stallings) Computer security concepts OSI security architecture 1- Security Attacks 2- Security Services 3- Security Mechanisms Access Control Classical Encryption Techniques

Computer security concepts Confidentiality Data ----Privacy Integrity Data----System Availability Authenticity Accountability - CIA triad

OSI security architecture Security Attack Security Mechanism Security Service

Security Attack Security Attack Passive attacks Active attacks - not detect - easy prevent - detect - not prevent 1- Release of message contents 2- traffic analysis 1- masquerade 2- Replay 3- modification of message 4- denial of service

Security Services Security Services Authentication Access control Data confidentiality Data Integrity Nonrepudiation Availability

Authentication Exchange Security Mechanism Security mechanism Encipherment Digital signature Access control Data Integrity Authentication Exchange Traffic padding Routing Control Notarization

Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2- secret key Decryption Plaintext output

Symmetric Cipher Model 1- Cryptography (enciphering) - Cryptology 2- Cryptanalysis (deciphering) - Cryptanalyst

Symmetric Cipher Techniques - Substitution techniques Caesar Cipher Monoalphabetic Ciphers Playfair Cipher Hill Cipher Polyalphabetic Ciphers (Vigenère cipher –Vernam cipher) One-Time Pad - Transposition techniques Rail fence

Symmetric Cipher Techniques - Rotor machines - Steganography Character marking Invisible ink Pin puncture Type writer correction ribbon

Thank you for your attention