CIA AAA. C I A Confidentiality I A Confidentiality Integrity A.

Slides:



Advertisements
Similar presentations
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Advertisements

World-Wide Web and Client-Server Authentication using Kerberos by Phoenix Malizia.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Electronic Transaction Security (E-Commerce)
Copyright Justin Klein Keane InfoSec Training Encryption.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Cryptographic Techniques Instructor: Jerry Gao Ph.D. San Jose State University URL: May,
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Chap 3: Key exchange protocols In most systems, we distinguish the short term keys from the long term ones: –A short term key (session key) is used to.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Information Security. Information Security Requirements Confidentiality: Protection from disclosure to unauthorised persons Access control: Unauthorised.
Diffie-Hellman Key Exchange
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
Cryptography 101 Frank Hecker
Digital Certificates. What is a Digital Certificate? A digital certificate is the equivalent of your business card in the e-commerce world. It says who.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
1 Lesson Internet Organization network Fire wall.
Computer Networks Ivan Marsic Rutgers University Chapter 7 – Network Security Chapter 8 – Network Monitoring Chapter 9 – Internet Protocols APPENDIX: Probability.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Encryption.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Class 4 Asymmetric Cryptography and Trusting Internal Components CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Cryptography Fundamentals
Potential vulnerabilities of IPsec-based VPN
Cryptography Readings Encryption, Decryption, & Digital Certificates.
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
Anthology of Encryption Davon Dunajski. In the Beginning Rudimentary Code One Time Pads Enigma Machine Tasks – Authentication – Integrity – Nonrepudiation.
Induction: Security and Certification –April 26-28, Security and Certification; Authentication and Authorisation John Kewley EGEE is funded by.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Fundamentals of Network Security Ravi Mukkamala SCI 101 October 6, 2003.
Web Applications Security Cryptography 1
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
Introduction to security goals and usage of cryptographic algorithms
Chapter 6 Cryptography CISSP Study Guide BIS 4113/6113.
Security.
Chapter 4 Cryptography / Encryption
Key Distribution Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, /18/2019 Ref: Pfleeger96, Ch.4.
e-Security Solutions Penki Kontinentai Vladas Lapinskas
Cryptography Fundamentals
Introduction to Cryptography
Presentation transcript:

CIA AAA

C I A

Confidentiality I A

Confidentiality Integrity A

Confidentiality Integrity Availability A

Confidentiality Integrity Availability Authentication A

Confidentiality Integrity Availability Authentication Authorization A

Confidentiality Integrity Availability Authentication Authorization Accounting

Encryption

Symmetric Shared Secret Key - very fast -but, how do I get the key to you first, so we can start using the shared secret key

Encryption Asymmetric Key

Encryption Asymmetric Key Each party has a key pair, one private and one public SLOW! BUT don’t need to send a secret key

Best Solution: Use public\private key pairs initially, just to exchange a secret shared key Switch to the secret key for fast processing! Espionage allegory