Kriptografija i mrežna sigurnost

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Doc.: IEEE /1012r0 Submission September 2009 Dan Harkins, Aruba NetworksSlide 1 Suite-B Compliance for a Mesh Network Date: Authors:
1 MSc EEM118 Research Dissertation CITE, UEL Cryptography and Network Security Dr David Xiao
Cryptography and Network Security Chapter 16
Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols Tom Chothia CWI.
Online Security Tuesday April 8, 2003 Maxence Crossley.
CMSC 456 Introduction to Cryptography
Chapter 5 Cryptography Protecting principals communication in systems.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Lecture 12 Security. Summary  PEM  secure  PGP  S/MIME.
Laboratory for Reliable Computing Department of Electrical Engineering National Tsing Hua University Hsinchu, Taiwan Security Processor: A Review Chih-Pin.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
CS 4/585: Cryptography Tom Shrimpton FAB
Asymmetric Key Signatures David Evans and Samee Zahur CS4501, Fall 2015.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Exam Review for First Half of C430 2 May pm in Huxley 308 Michael Huth 2 May pm in Huxley 308 Michael Huth.
IPSEC : KEY MANAGEMENT PRESENTATION BY: SNEHA A MITTAL(121427)
Exam 1 Review CS461/ECE422 Fall Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
Course web page: ECE 646 Cryptography and Computer Network Security ECE web page  Courses  Course web pages  ECE 646.
ENGLISH FOR BUSINESS 2 WELCOME. Lecturer: Iva Planinšek-Čikara Kabinet 10.
Dan Boneh Authenticated Encryption Constructions from ciphers and MACs Online Cryptography Course Dan Boneh.
Fundamentals of Network Security Ravi Mukkamala SCI 101 October 6, 2003.
CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY.
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
ENGLISH FOR BUSINESS 1 WELCOME. Lecturer: Iva Planinšek-Čikara Kabinet 10.

Practical Aspects of Modern Cryptography Josh Benaloh & Brian LaMacchia.
Chapter 7 - Secure Socket Layer (SSL)
Kriptografija s primjenom (AC)
Reviews Rocky K. C. Chang 20 April 2007.
Virtual Private Network (VPN)
Chapter 8 Network Security.
Basic Network Encryption
Network Security Primitives
Digital Signatures Last Updated: Oct 14, 2017.
predavanja v.as.mr. Samir Lemeš
Block Cipher Modes CS 465 Make a chart for the mode comparisons
akademska godina 2014/15  semestar V
CS/ECE 478 Introduction to Network Security Dr. Attila Altay Yavuz
امنيت در شبکه هاي کامپوتري (1386)
CS 465 TLS Last Updated: Oct 31, 2017.
Chapter 8 Network Security.
Cryptography and Network Security
SSL (Secure Socket Layer)
Psihologija komuniciranja ECTS: 5 2P + 1V
WORDPRESS.
Recap unit 2 Review cipher systems, RSA Digital signatures
TLS and DLP Behind the green lock.
Doc.dr.sc.Ljerka Sedlan König
Bežične senzorske mreže (Wireless Sensor Networks – WSN)
Lecture 6: Digital Signature
Lecture 10: Network Security.
BILJEŽNICA MS WORD.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Basic Network Encryption
Unit 8 Network Security.
Advanced Computer Networks
Cryptography and Network Security
Cryptography Lecture 27.
Elliptic-Curve Cryptography (ECC)
Chapter 8 roadmap 8.1 What is network security?
Counter With Cipher Block Chaining-MAC
Digital Signature Standard (DSS)
Oblikovanje programske potpore
TLS Encryption and Decryption
Overview and Introduction (Lecture Contents Summary)
LAB 3: Digital Signature
Presentation transcript:

Kriptografija i mrežna sigurnost Mario Čagalj mcagalj@fesb.hr FESB

Administrativne informacije O nositelju kolegija Redoviti profesor na FESB-u Doktorirao na EPFL, Švicarska (2006.) Više informacija na http://www.fesb.hr/~mcagalj Web stranica http://www.fesb.hr/~mcagalj/CNS Prezentacije sa predavanja Opis kolegija, lab. vježbi, literatura Linkovi na “on-line” knjige i druge zanimljive reference Razne obavijesti (uz e-learning portal) Konzultacije E-mail: mcagalj@fesb.hr

Vaše zadaće i ocjenjivanje Laboratorijske vježbe (“hands-on”, pismeni izvještaji) Prisustvo na nastavi (vježbama - moguća ispitna pitanja) Vježbe: obavezne, 100%-tno prisustvo (moguća ispitna pitanja) Predvanja: ovisno o prisustvu manje ili više privilegija kod zaključivanja konačne ocjene Ocjenjivanje A - prisustvo 5% B - labovi 15% C - 1. kolokvij 35% D - 2. kolokvij 45% ocjena = round( 0.05*A + 0.15*B + 0.35*C + 0.45*D )

Format predavanja Interaktivan Slobodno postavljajte pitanja Ako vam se učini da sam napisao ili rekao nešto netočno ili pogrešno slobodno me upozorite Predavanja ću postavljati različitom dinamikom na web stranicu predmeta Uoči ili nakon predavanja Nastavni tekst može biti na hrvatskom i engleskom jeziku

Literatura Cryptography and Network Security - William Stallings Network Security: Private Communication in a Public World - Kaufman et al. Handbook of Applied Cryptography – Menezes et al. http://www.cacr.math.uwaterloo.ca/hac Security Engineering - Ross Anderson http://www.cl.cam.ac.uk/~rja14/book.html Cryptography Engineering: Design Principles and Practical Applications – Ferguson et al. Znanstveni radovi Popis radova dostupan na web stranici kolegija

Neke teme koje pokriva predmet Uvod u kriptografiju i kriptografske primitive AES, hash functions, RSA, Diffie-Hellman, ECC, ECDHE, ECDSA etc. Simetrična i asimetrična kriptografija Enkripcijski modovi (ECB, CBC, CTR) Authenticated encryption schemes (GCM, CCM) Autentikacijske funkcije Digital signatures, MAC Network security IPsec, TLS, SSH Web security Cookies, auth tokens, https WiFi security

Kriptografija u praksi

Kriptografija u praksi

Kriptografija u praksi

Kriptografija u praksi

Kriptografija u praksi

Kriptografija u praksi

Kriptografija u praksi

Kriptografija u praksi

Kriptografija u praksi

Kriptografija u praksi

Kriptografija u praksi

Kriptografija u praksi

Kriptografija u praksi

Kriptografija u praksi

Hands-on (Laboratory) Exercises Capture the flag princip (skupljate bodove rješavanjem odgovarajućih crypto/security izazova) ARP spoofing, MITM, ECB, CBC, CTR, SSH, TLS, certificates, auth tokens... Tehnologije koje se koriste Docker, NodeJS, ExpressJS, Electron, React, Redux, Kali Linux... Dio crypto izazova možete rješavati u bilo kojem programskom jeziku (s obzirom da pristupate REST API serveru) Student predaje rješene crypto izazove u printanoj formi Kako izazove čine kratki vicevi/šale, student u osnovi kao izvještaj predaje šalu/vic :-)