Security.

Slides:



Advertisements
Similar presentations
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Advertisements

BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Cryptography, Authentication and Digital Signatures
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Intro to Cryptography Lesson Introduction
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Network Security  introduction  cryptography  authentication  key exchange  required reading: text section 7.1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Web Security.
CS/ECE 578 Cyber-Security Dr. Attila Altay Yavuz
Digital Signatures.
Cryptography: an overview
Basics of Cryptography
Security Outline Encryption Algorithms Authentication Protocols
Symmetric and Asymmetric Encryption
Symmetric Cryptography
Cryptography Much of computer security is about keeping secrets
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
Cryptographic Hash Function
e-Health Platform End 2 End encryption
What is network security?
Security.
Chapter 8 Network Security.
Cryptography and Security Technologies
Encryption
Cryptography.
Presented by: Dr. Munam Ali Shah
Cryptography Basics and Symmetric Cryptography
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
Network Security Basics
Asymmetric Cryptography
Security through Encryption
PART VII Security.
Security in Network Communications
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
Introduction to Symmetric-key and Public-key Cryptography
Protocol ap1.0: Alice says “I am Alice”
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Introduction to Cryptography (1)
Chapter 29 Cryptography and Network Security
Basic Network Encryption
Fluency with Information Technology Lawrence Snyder
Security in Distributed Systems
CRYPTOGRAPHY & NETWORK SECURITY
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Security

Cryptography Why Cryptography Symmetric Encryption Key exchange Public-Key Cryptography Key exchange Certification

Why Cryptography General Security Goal - Confidentiality - Message Integrity - End-point Authentication - Operational security

Potentially Threats Eaves dropping Modification, insertions, deletion Masquerade Playback Man-in-a-middle-attack DDoS (ie. SYN-flooding)

Cryptography - general To send messages over a network, which is unable to understand for a third part General technique: Plain text Encode (algorithm + key) Cipher text (send over the network) Decode (algorithm + key)

Cryptography - coding Old days simple letter transformation e.g. c for an a and d for a b and so on i.e. ape -> crg To day Symmetric key Public-private keys

How to break encryption Force brute Try combinations Ciphertext-only attack – try all Known-plaintext Attack – know few word in text Chosen-plaintext Attack – know one full text

Cryptography - Symmetric Using the same key to encode and decode Which goal are fulfilled ? Confidentiality Authentication Integrity Operational security Confidentiality – yes Authentication - yes Integrity - yes - Operational security - no

Cryptography - Symmetric Implementations: DES (Data Encryption Standard) most known (round 4 min) today modified to triple DES key length 64bit (3*64 bit) Other IDEA, RC5 to day even 128 bit (round 149 trillion year)

Cryptography - Symmetric Key exchange: Problem to exchange the key - we can not send it with a mail - then it would not be secret any longer Using a Key Distribution Center (KDC) - I have an agreement with the KDC and with this an secret key. - So have all I communicate with.

Cryptography - Symmetric Windows use Symmetric key in an implementation called Kerberos: All like KDC but you get grant (a key) to a resource for a certain time (all called a ticket)

Cryptography Asymmetric Using the different keys to encode and decode You always have a pair of keys a public key and a private key If you encode with a public key – you must decode with a private key If you encode with a private key – you must decode with a public key

Cryptography Asymmetric Which goal are fulfilled from A to B (B public Key)? Confidentiality Authentication Integrity Operational security Confidentiality – yes Authentication - no Integrity - no - Operational security - no

Cryptography Asymmetric Which goal are fulfilled from A to B (A private Key)? Confidentiality Authentication Integrity Operational security Confidentiality – no Authentication - yes Integrity - yes - Operational Security - no

Cryptography Asymmetric Can we fulfilled both Confidentiality and Authentication Integrity ? YES – encode with A private key and then with B public key i.e. twice

Cryptography Asymmetric Implementations: RSA – most known key length recommended 1024bit (512 bit brute force approx. 5 month)

Cryptography Asymmetric Key exchange: Problem to exchange the key - public key are public to everyone - But do we believe the sender of the key Using Certification - I believe in some Certification Authorities e.g. VeriSign, Thrust, (in DK TDC) - get the public key from one of those trusted third part companies.

Cryptography Asymmetric To fulfilled the goal you must encode 2 times (A private and B public) A more easy way is to create a Message Digest (MD) a sort of a checksum And this ‘checksum’ are encoded with A’s private key (Digital Signature). Then the whole message + the MD are encoded with B’s public key

Cryptography Asymmetric For authentication Message Authentication Code (MAC) Both sides – shared secret (s) Send m + H(m+s) Check m+s hached == H(m+s) Fill with Nonsens

Cryptography Mixed Using asymmetric keys to exchange a symmetric key for rest of this session. This increase the speed of encryption and decryption.