Security in Network Communications Deepti Reddy Suphannee Sae Chai Sarah Summers 11/28/2018 CS522 Computer Communications
Presentation Overview Motivation Communication Security Issues Secure Email 11/28/2018 CS522 Computer Communications
CS522 Computer Communications Motivation Network Communications are a fact of every day life. Need to protect sensitive information. Need to control access. 11/28/2018 CS522 Computer Communications
Communication Security Issues Confidentiality Authentication Integrity Non-repudiation 11/28/2018 CS522 Computer Communications
Email Security Protocols PGP (Pretty Good Privacy) PEM S/MIME 11/28/2018 CS522 Computer Communications
PGP (Pretty Good Privacy) Hybrid Crypto System Combines Features of Symmetric and Asymmetric Cryptography Confidentiality Authentication Digital Signatures Compression 11/28/2018 CS522 Computer Communications
CS522 Computer Communications How PGP Works Preprocessor invoked by user Compresses plaintext using MD5 Resulting Hash encrypted using RSA with sender’s private key PGP concatenates encrypted hash and original message into single message and compresses it using a ZIP programme 11/28/2018 CS522 Computer Communications
CS522 Computer Communications How PGP Works? PGP generates a session key using the IDEA algorithm Key generated from random key strokes and mouse movements Session key encrypted using receiver’s public key Encrypted session key and zipped message are concatenated and converted to base 64 11/28/2018 CS522 Computer Communications
CS522 Computer Communications PGP Encryption 11/28/2018 CS522 Computer Communications
CS522 Computer Communications Future Work Staying ahead of attackers by developing stronger algorithms and security techniques. Modification of current protocols. Creation of new protocols. 11/28/2018 CS522 Computer Communications
CS522 Computer Communications Conclusions Network Communications security is a broad and complex subject. Cryptographic methods are the solution. Security mechanisms will always be attacked and eventually broken. 11/28/2018 CS522 Computer Communications
Questions ? Under Pain of Death! 11/28/2018 CS522 Computer Communications
CS522 Computer Communications References [1] Communication Security – available techniques, AXIS Communications White Paper, http://www.axis.com/documentation/whitepaper/security.pdf [2] IDEA (International Data Encryption Algorithm) http://www.quadibloc.com/crypto/co040302.htm [3] International Data Encryption Algorithm – Technical Description, http://www.mediacrypt.com/_pdf/IDEA_Technical_Description_0105.pdf [4] How PGP Works, http://www.pgpi.org/doc/pgpintro 11/28/2018 CS522 Computer Communications
CS522 Computer Communications IDEA ALGORITHM International Data Encryption Algorithm Block Cipher Algorithm Operates on 64 bit plaintext and cipher text blocks Utilizes 128 bit key 11/28/2018 CS522 Computer Communications
CS522 Computer Communications How IDEA Works Comprised of 8 identical encryption processes (rounds) followed by a final output transformation Plaintext partitioned into four 16 bit sub-blocks Three operations used to combine two 16-bit values to produce a 16-bit result - addition, XOR and multiplication 11/28/2018 CS522 Computer Communications
How IDEA Works (conitnued) 11/28/2018 CS522 Computer Communications