Presentation is loading. Please wait.

Presentation is loading. Please wait.

ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)

Similar presentations


Presentation on theme: "ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)"— Presentation transcript:

1 ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)

2 Network Security Physical Layer Security Link Layer Security Network Layer Security Transport Layer Security Application Layer Security Wire protection Link encryption Firewall, IPSec Process-to-process security User authentication, nonrepudiation Cryptography

3 Secrecy Substitution cipher Transposition cipher One-time pad Symmetric-key cryptography Public-key cryptography Authentication Nonrepudiation Integrity Kerckhoff’s principle: All algorithms must be public; only the keys are secret Refreshness and Redundancy in the message

4 Columnar Transposition Cipher

5 One-Time Pad - Unbreakable

6 Key Distribution – The Weakest Link Using public-key cryptography for key distribution Alice Bob (E A, D A ) (E B, D B ) E B (P) P = D B (E B (P)) E A (R) R = D A (E A (R)) RSA is one way to realize this procedure

7 Digital Signature vs. Message Digest for Authentication Using symmetric-key Using public-key Alice Bob Big Brother A, K A (B, R A, t, P) K B (A, R A, t, P, K BB (A, t, P)) Alice Bob E B (D A (P)) D B (E B (D A (P))  D A (P) E A (D A (P)  P K BB (A, t, MD(P)) P, D A (MD(P)) Add integrity checking too

8 Public Key Cryptograph Allow two people who do not share a common key to communicate with each other securely Makes signing messages possible without the presence of a trusted third party Signed MD make it possible to verify integrity of received message Problem: how to make your public key really public?  Certificates (CA)


Download ppt "ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)"

Similar presentations


Ads by Google