CS2911 Week 8, Class 1 Today Week 8, Lab period Muddiest Point

Slides:



Advertisements
Similar presentations
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
Advertisements

Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Lecture 23 Symmetric Encryption
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption Methods By: Michael A. Scott
Chapter 12 Cryptography (slides edited by Erin Chambers)
Lecture 23 Cryptography CPE 401 / 601 Computer Network Systems Slides are modified from Jim Kurose & Keith Ross.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Network Security – Special Topic on Skype Security.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
CS2910 Week 1, Class 2 Today Announce Prof. Michael Vieau’s S-341 6p Thurs Wk 2 Assignment for tomorrow Data Encoding, Part 1 Parsing Data Muddiest Point.
Lecture 23 Symmetric Encryption
CS2910 Week 5, Class 2 Today DNS Muddy Points More HTTP Headers Review for Midterm Exam This coming Monday: Midterm Exam SE-2811 Slide design: Dr. Mark.
CS2910 Week 10, Class 1 Today Modular Arithmetic RSA Week 10, Monday Quiz: Potential topics TCP window size & header format Public/private key encryption.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
CS2911 Week 3, Class 2 Today Return Lab 3 Afternoon section: Hand out Lab 4 Checklist Review Muddiest Point Questions on Lab 4? What is a protocol? The.
Encryption with Keys and Passwords
ISA 400 Management of Information Security
Cryptography Much of computer security is about keeping secrets
Cryptography Why Cryptography Symmetric Encryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Privacy & Security.
Cryptography & Security
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
What is network security?
Network Security.
Security.
Outline Desirable characteristics of ciphers Uses of cryptography
CS2911 Week 8, Class 1 Today Week 8, Lab period Muddiest Point
Public-key Cryptography
Introduction Of System Security
CS2911 Week 10, Class 2 Today Tomorrow Final Exam: Monday, 11am
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Networks Encryption.
Outline Desirable characteristics of ciphers Uses of cryptography
Presented by: Dr. Munam Ali Shah
CS2911 Week 4, Class 2 Today Next Thursday:
Lecture 3: Symmetric Key Encryption
Security through Encryption
PART VII Security.
Chapter 6 Cryptography CISSP Study Guide BIS 4113/6113.
Security.
CS2911 Week 9, Class 1 Today Discussion on RSA Video Eavesdropping
Network Security.
Cryptography a Presentation Prepared by Vytautas Kondratas.
CS2911 Week 7, Class 1 Today Map (dict) objects in Python
CS2911 Week 5, Class 3 Today Week 6, Lab: Quiz at start of lab
Block Ciphers (Crypto 2)
Padding Oracle Attacks
Slide design: Dr. Mark L. Hornick
CS2911 Week 7, Class 3 Today Week 8, Lab period Muddiest Point
Slide design: Dr. Mark L. Hornick
CS2911 Week 2, Class 3 Today Return Lab 2 and Quiz 1
Basic Network Encryption
CS2911 Week 3, Class 3 (And wk4-c1)
CS2911 Week 3, Lab Today Thursday Friday Review Muddiest Point Lab 3
Slide design: Dr. Mark L. Hornick
Modern Cryptography.
CS2911 Week 8, Class 1 Today Week 8, Lab period Muddiest Point
Security: Public Key Cryptography
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

CS2911 Week 8, Class 1 Today Week 8, Lab period Muddiest Point 4 April 2019 CS2911 Week 8, Class 1 Today Muddiest Point Questions on Videos Encryption Week 8, Lab period Quiz 4: Topics include TCP, SMTP, IMAP, POP 17q1 7-1 1-7,9-24 CS2911 Dr. Yoder Dr. Josiah Yoder

DDoS attack on DNS provider Dyn Just for fun: What is a distributed Denial of Service attack? What is a bot-net? How many Mirai-infected devices were used in the attack on Dyn? How many Mirai-infected devices are there in the world? CS2911 Dr. Yoder

Muddiest Point "WIN" field on handout The "Window" is the amount of space remaining in the receiver's buffer that the application has not yet read. If you fill in the values, you can check if they match the other ones there to know if you are right Please think about this exercises, but don't obsess about getting the "right answers" CS2911 Dr. Yoder

Questions about Encryption CS2911 4 April 2019 Questions about Encryption What are the different ways in which a message can be damaged? How can someone eavesdrop over the network? Big picture: Intrusion techniques What are some everyday things that use encryption, like things that we wouldn't necessarily think about? Big picture: What uses encryption? 1. I still feel confused about the concept of the key. Is the key a number? Or it is a function for encoding the plaintext? Big picture: What is a key? 2. What is the known plaintext attack? Dr. Josiah Yoder

Questions about Encryption CS2911 4 April 2019 Questions about Encryption If someone found a way to determine the encryption algorithm, would they be able to then create a decryption algorithm? The video says that they could introduce false information into the cipher-text, but I would assume a more valuable use would be to reverse engineer it to decode the cipher-text. For the box algorithm, it says that it uses a table that grows in size 2^n where n is the number of bits in each chunk. Couldn't the size of the chunk just be kept small? And why does it require a table that grows at such a fast rate? Big picture: What is a key? Dr. Josiah Yoder

Questions about Encryption CS2911 4 April 2019 Questions about Encryption if encryption algorithms are often in the public domain, wouldn't cipher block chaining become recognizable to an intruder studying the cipher text? Cipher block chaining when talking about keys, is it possible to have a public and private key that is known to encrypt a private key for even greater security of information, or is public private key only used for sending / receiving messages? Public/private keys What are some common encryption algorithms that use the methods in the video, like symmetric? Current Algorithms Dr. Josiah Yoder

Questions about Encryption CS2911 4 April 2019 Questions about Encryption Is there ever a good use for simple symmetric cyphers? It seems easy to guess through brute force, so why would anybody use such a weak encryption? Why use simple encryption? So I remember hearing somewhere that Prime numbers are really important when it comes to encryption. How would that apply to Stream, Block, and Cipher Block Chaining encryption strategies? Prime numbers Dr. Josiah Yoder

Questions about Encryption CS2911 4 April 2019 Questions about Encryption How are the keys (Ka and Kb) sent? Wouldn't they need to be encrypted with a second set of keys, and then those keys would need to be encrypted by a different set of keys, ad infinitum? Or do the keys exist somehow on the sending and receiving machines independent of the network? Public/private keys How are asymmetric keys used to encrypt the text? It doesn't seem inherently true that the order in which the keys are used on the text doesn't matter. Is it possible for a company to have multiple was of encoding? That way they can alternate and it will be really hard for Trudy to get near deciphering the encryption. Encryption strategy Dr. Josiah Yoder

Questions about Encryption CS2911 4 April 2019 Questions about Encryption What is the point of a basic Casesar cypher? It is far too easy to decrypt to actually be used for private information. Why use simple encryption? How exactly are keys used? I understand the concept, but how are the client and host made aware of the same key to use, despite the fact that sending the key over the network would require encryption for obvious reasons? Sharing keys How come the person receiving the message can decipher the message but an intruder can't? How does the receiver get the key but not the intruder? What is the purpose of a session key? How does is differ from the public and private keys? Symmetric vs. Asymmetric Dr. Josiah Yoder

Questions about Encryption CS2911 4 April 2019 Questions about Encryption Does encryption always use a symmetric key system? If not, how would a non-symmetric key system work when encrypting and decrypting plain text? public/private keys Is this some of the fundamentals of learning how to become a hacker? How and where can you find the keys or figure out which type of encryption system is being used? Cracking keys and algorithms what is the current standard for encryption? Current algoritms Dr. Josiah Yoder

Questions about Encryption CS2911 4 April 2019 Questions about Encryption During stream ciphers, he mentioned encoding by adding another stream of bytes, (e sub i in the video). Is this a generated stream, or are you trying to interlace two streams of actual data? When you decode, are you trying to find both b sub i(plaintext bytestream) and e sub i? or just b sub i? [See Chapter 8.8.1, 7th Ed.] Stream ciphers are session keys shared secret keys? Symmetric keys how are "secret" keys shared but kept secret? Sharing keys Known plaintext attack Dr. Josiah Yoder

Questions about Encryption CS2911 4 April 2019 Questions about Encryption For session keys, wouldn't there be a finite amount of keys that could be generated before the computation would become too taxing on the computer system and therefore would be more reasonable to cycle back to older keys? Computation-al burden, Repeated keys The session key is generated as a new one every time. Is there any chance that after times there will be repeated key? Repeated keys What other types of encryption are there besides rsa Current Algorithms Dr. Josiah Yoder

Comments about Encryption CS2911 4 April 2019 Comments about Encryption Why can't we all just promise not to intrude on others, so this becomes unnecessary? hahaha. Are we going to have to encrypt? These videos are a bit slow-paced, but playing at 1.5 speed mitigates this. YouTube is great! Are there common keys and encryption standards for cryptography? I like the section which introduces the relationship between the plain text and the cipher text. The graph is helpful for me to understand the relationship. If the keys are suppose to come in and out of existence, how is someone potentially able to trackback to previous transactions? Dr. Josiah Yoder

Standard Symmetric Block Cipher Algorithms CS2910 4/4/2019 Standard Symmetric Block Cipher Algorithms DES, Triple DES (Data Encryption Standard) NSA AES (Advanced Encryption Standard) NIST, but note NSA involvement in other algorithms published by NIST Blowfish Not standard. Self-published algorithm Why not write your own? (Because …) SE-2811 Dr.Yoder Dr. Josiah Yoder

WWII Encryption: The Enigma Machine CS2910 4/4/2019 WWII Encryption: The Enigma Machine A story of a known-plaintext attack http://www.cnet.com/pictures/breaking-the-nazis-enigma-codes-at-bletchley-park-photos/2/ SE-2811 Dr.Yoder Dr. Josiah Yoder

WWII Encryption: The Enigma and the Bomb CS2910 4/4/2019 WWII Encryption: The Enigma and the Bomb Mavis Batey SE-2811 Dr.Yoder Dr. Josiah Yoder

CS2911 4 April 2019 https://www.polleverywhere.com/free_text_polls/NudT706GZ8kvjJR CS2911 Dr. Yoder Dr. Josiah Yoder

CS2911 4 April 2019 Acknowledgement The content of this video is based in part on lecture slides from a very good textbook, and used with the author’s permission: Computer Networking: A Top-Down Approach, 7th edition, by Jim Kurose and Keith Ross Publisher: Pearson, 2017 It is also based on slides provided by Dr. Darrin Rothe Dr. Josiah Yoder