Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-1 Overview and Introduction.

Slides:



Advertisements
Similar presentations
CIS/TCOM 551 Computer and Network Security Slide Set 1 Carl A. Gunter Spring 2004.
Advertisements

CAS CS 558 Network Security. Administrativia 6/14/2015Gene Itkis, CS558: Computer Network Security3 General info Instructor: Gene Itkis itkis+cs558 cs.bu.eduitkis+cs558.
Information Security of Embedded Systems : Communication, wireless remote access Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
2° cycle degree programme (lm) in Telecommunications Engineering Principles Models and Applications for Distributed Systems Prof. Maurelio Boari
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
CSE 331 CSE 331: Introduction to Networks and Security Fall 2001 Instructor: Carl A. Gunter Slide Set 1.
SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Contact Information Cryptography 8/10/2015 | pag. 2 Professor Assistant Office Webpage Course Text Ann Dooms Adriaan Barri
@Yuan Xue CS 285 Network Security Fall 2008.
An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since.
Cryptography and Network Security (SSL)
Computer Networking A few notes on reading Dr Sandra I. Woolley.
A. Steffen, , 0-Overview.pptx 1 Information Security 2 (InfSi2) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Computer and Network Security - Message Digests, Kerberos, PKI –
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Cryptography and Network Security Chapter 16 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Key distribution Ján Kotrady. Content: What is key distribution? Key agreement and distribution Basic algorithm – Diffie-Hellman Basic attacks – Man in.
Chapter 7 : Web Security Lecture #1-Week 12 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-9 Public-Key Cryptography.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles Course administration.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-6 Ciphering and the.
Understand User Authentication LESSON 2.1A Security Fundamentals.
Cryptography: an overview
Cryptography: an overview
Intro. To Telecommunication Sama AlBugami
Opracowanie językowe dr inż. J. Jarnicki
CSE 331: Introduction to Networks and Security
Chuck Frank Northern Kentucky University
Cryptography and Network Security
Public-Key Cryptography RSA Rivest-Shamir-Adelmann Public-Key System
Introduction to Information Security
Information Security.
Cryptography Reference: Network Security
Cryptography Reference: Network Security
Chapter 8 Network Security.
Introduction to radio frequency (RF) and wireless communications
3G Security Principles Build on GSM security
Asynchronous Cryptology: Implementations and Applications
Network Security Primitives
Mobile Communications Mobile Security Fundamentals-3
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
Network Security Sample Solution Short questions (Closed book)
Chapter 8 Network Security.
Introduction to the course
Chuck Frank Northern Kentucky University
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
The Secure Sockets Layer (SSL) Protocol
Cryptography: an overview
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Unit 8 Network Security.
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptography and Network Security
Electronic Mail Security
Overview and Introduction (Lecture Contents Summary)
Presentation transcript:

Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-1 Overview and Introduction (Lecture Contents Summary) Network Security Design Fundamentals ET-IDA , v17 Prof. W. Adi

Page : 2 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Recommended References Possible Textbooks: 1. Cryptography and Network Security W. Stallings, Printice Hall 2003, ISBN: W. Stallings, Printice Hall 2003, ISBN: Or: Or: Network Security Essentials: Applications and Standards Network Security Essentials: Applications and Standards William Stallings, 3rd Edition, Prentice Hall, © 2007, ISBN: William Stallings, 3rd Edition, Prentice Hall, © 2007, ISBN: Network Security Private communication in a public world Private communication in a public world C. Kaufman, R. Perlman, M. Speciner, Printice-Hall 10th printing 2007, ISBN C. Kaufman, R. Perlman, M. Speciner, Printice-Hall 10th printing 2007, ISBN Other reference books: 1. Cryptography & Network Security FOROUZAN, McGraw-Hill 2007, ISBN10: , ISBN13: FOROUZAN, McGraw-Hill 2007, ISBN10: , ISBN13: Handbook of Applied Cryptography by Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone by Alfred J. Menezes, Paul C. Van Oorschot, Scott A. VanstoneAlfred J. MenezesPaul C. Van OorschotScott A. VanstoneAlfred J. MenezesPaul C. Van OorschotScott A. Vanstone CRC Press (October 16, 1996) (available free of charge on the WEB) CRC Press (October 16, 1996) (available free of charge on the WEB) Central TU Library

Page : 3 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Security of Information and Communication Networks Stamatios V. Kartalopoulos ISBN: , Hardcover, 344 pages, April 2009, Wiley-IEEE Press Computer Security and Cryptography Alan G. Konheim ISBN: , Hardcover, 544 pages February 2007, Wiley Mobile Communication Systems and Security Man Young Rhee ISBN: , Hardcover, 448 pages April 2009, Wiley Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft Markus JakobssonMarkus Jakobsson (Editor), Steven Myers (Editor)Steven Myers ISBN: , Hardcover, 700 pages, January 2007, Wiley Other books:

Page : 4 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Why Security ? Why Security ? The Story of Security Science The Story of Security Science Traditional Security Systems Overview Traditional Security Systems Overview Modern Security Systems Overview Modern Security Systems Overview Applications Applications Network Security Network Security Outlines This introduction presents essential examples of the main course contents, however with minimum mathematics !

Page : 5 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Widespread Expanding very fast unlimited applications Mobile-Commerce etc… 6000 million mobile devices Internet Power Station power line network Why Security ? Open Information World scenario Service node TV Global Information Short-Circuit (AAA Scenario) Anywhere Any time Any device

Page : 6 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi G, 3G Mobile Network Architecture Circuit/ Signaling Gateway 2G/2.5G 2G GSM IN Services Call Agent Feature Server(s) RNC 3G Data + Packet Voice Circuit Switch Circuit Network Packet Network (Internet) Radio Access Control Voice Mobility Manager IP Core Network IP RAN Security threats are spead over the fixed and mobile networks! 4G … 5G

Page : 7 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Impacts of Globalization on Information Technology ! Security is still a serious issue in most communication systems, and is a very essential one !! Globalization (Borderless) Unlimited resources Unrestricted resources Easy untraceable access No national boarders/Law? Manageability ? controllability ? Abuse-ability

Page : 8 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Two Major Security Tasks Authentication Securely identify an entity Secrecy Keep data safe against illegal users Security tasks require to deploy cryptographic mechanisms to be realized Cryptography: is the science dealing with hiding information and data security questions

Page : 9 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi Secret Key Cryptography Overview Concepts

Page : 10 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Secret Key Cryptography K-open = K-close (Symmetric System) - Open and close using shared secret keys (mostly one shared key) !! - Secret key agreement required !

Page : 11 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 SENDER RECEIVER Secret Key Crypto-System : mechanical simulation Message Z Lock Z Key = Z Secret key agreement Key = Z Message

Page : 12 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi Public-Key Cryptography Scientific Breakthrough 1976

Page : 13 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Public-Key Secrecy Systems K-secret K-open Two Major Schemes in Public Key Cryptography: Diffie-Hellman Public Key exchange scheme RSA public Key secrecy system - Open and close with different keys!! - No Secret Key Agreement required

Page : 14 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 User A User B Basic Public Key Secrecy System (RSA system1978) (Mechanical simulation: user B gets a secured message from A) Public register Close Kc open ( ) Kc (mod m) Kc M M Kc M Kc.Ko = M Ko= Kc -1 (M Kc ) Ko Ko

Page : 15 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi Authentication Identification, Signature /Certificates.. - Secret Key Techniques - Public-Key Techniques

Page : 16 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 International Mobile Equipment Identity IMEI (non-secured) SIM (secured) Subscriber Identity Module Secured Identity (Authentic Identity)

Page : 17 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi Security Protocols SSL, IPSEC, KERBEROS, PGP, X509.. Standards, Applications

Page : 18 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Example: SSL: Secure Socket Layer “Security Protocols” Server

Page : 19 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 “Network Security” Objectives (course objectives summary) The aims of this course is to give a basic understanding of the design fundamentals and tools used in modern network security systems mainly includes: Course strategy: less proofs, more practical design hints! Review Fundamentals of Cryptology Review Fundamentals of Cryptology Network security primitives, Certificates, Ciphering, Integrity Network security primitives, Certificates, Ciphering, Integrity Network security Standards, SSL, IPSEC, PGP.. Network security Standards, SSL, IPSEC, PGP.. Network security applications. E-Money, E-Vote.. Network security applications. E-Money, E-Vote..