Security in Network Communications

Slides:



Advertisements
Similar presentations
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Principles of Information Security, 2nd edition1 Cryptography.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Cryptography Basic (cont)
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
1 Lesson Internet Organization network Fire wall.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Cryptography, Authentication and Digital Signatures
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
Pretty Good Privacy (PGP) Security for Electronic .
NETWORK SECURITY.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 14 Network Security: Firewalls and VPNs.
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
第五章 电子邮件安全. Security is one of the most widely used and regarded network services currently message contents are not secure –may be inspected.
Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Basic Encryption: methods and tools
Security is one of the most widely used and regarded network services
Security Outline Encryption Algorithms Authentication Protocols
Symmetric Cryptography
Advanced Computer Networks
Crypto in information security
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
Cryptographic Hash Function
CSCE 715: Network Systems Security
Security.
May 2008 Prepared by Dr. Abdulrahman Awadhi
Cryptography.
Simplified IDEA Cryptography and Network Security.
NET 536 Network Security Networks and Communication Department
Cryptography Basics and Symmetric Cryptography
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Ch. 11 – Cipher Techniques Dr. Wayne Summers
ELECTRONIC MAIL SECURITY
Security.
ELECTRONIC MAIL SECURITY
The Secure Sockets Layer (SSL) Protocol
Lecture 5: Transport layer (TLS / SSL) and Security ( PGP )
Electronic Mail Security
Lecture 10: Network Security.
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Chapter 29 Cryptography and Network Security
Security: Integrity, Authentication, Non-repudiation
Cryptography and Network Security
….for authentication and confidentiality PGP
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Security in Network Communications Deepti Reddy Suphannee Sae Chai Sarah Summers 11/28/2018 CS522 Computer Communications

Presentation Overview Motivation Communication Security Issues Secure Email 11/28/2018 CS522 Computer Communications

CS522 Computer Communications Motivation Network Communications are a fact of every day life. Need to protect sensitive information. Need to control access. 11/28/2018 CS522 Computer Communications

Communication Security Issues Confidentiality Authentication Integrity Non-repudiation 11/28/2018 CS522 Computer Communications

Email Security Protocols PGP (Pretty Good Privacy) PEM S/MIME 11/28/2018 CS522 Computer Communications

PGP (Pretty Good Privacy) Hybrid Crypto System Combines Features of Symmetric and Asymmetric Cryptography Confidentiality Authentication Digital Signatures Compression 11/28/2018 CS522 Computer Communications

CS522 Computer Communications How PGP Works Preprocessor invoked by user Compresses plaintext using MD5 Resulting Hash encrypted using RSA with sender’s private key PGP concatenates encrypted hash and original message into single message and compresses it using a ZIP programme 11/28/2018 CS522 Computer Communications

CS522 Computer Communications How PGP Works? PGP generates a session key using the IDEA algorithm Key generated from random key strokes and mouse movements Session key encrypted using receiver’s public key Encrypted session key and zipped message are concatenated and converted to base 64 11/28/2018 CS522 Computer Communications

CS522 Computer Communications PGP Encryption 11/28/2018 CS522 Computer Communications

CS522 Computer Communications Future Work Staying ahead of attackers by developing stronger algorithms and security techniques. Modification of current protocols. Creation of new protocols. 11/28/2018 CS522 Computer Communications

CS522 Computer Communications Conclusions Network Communications security is a broad and complex subject. Cryptographic methods are the solution. Security mechanisms will always be attacked and eventually broken. 11/28/2018 CS522 Computer Communications

Questions ? Under Pain of Death! 11/28/2018 CS522 Computer Communications

CS522 Computer Communications References [1] Communication Security – available techniques, AXIS Communications White Paper, http://www.axis.com/documentation/whitepaper/security.pdf [2] IDEA (International Data Encryption Algorithm) http://www.quadibloc.com/crypto/co040302.htm [3] International Data Encryption Algorithm – Technical Description, http://www.mediacrypt.com/_pdf/IDEA_Technical_Description_0105.pdf [4] How PGP Works, http://www.pgpi.org/doc/pgpintro 11/28/2018 CS522 Computer Communications

CS522 Computer Communications IDEA ALGORITHM International Data Encryption Algorithm Block Cipher Algorithm Operates on 64 bit plaintext and cipher text blocks Utilizes 128 bit key 11/28/2018 CS522 Computer Communications

CS522 Computer Communications How IDEA Works Comprised of 8 identical encryption processes (rounds) followed by a final output transformation Plaintext partitioned into four 16 bit sub-blocks Three operations used to combine two 16-bit values to produce a 16-bit result - addition, XOR and multiplication 11/28/2018 CS522 Computer Communications

How IDEA Works (conitnued) 11/28/2018 CS522 Computer Communications