CS2911 Week 7, Class 3 Today Week 8, Lab period Muddiest Point

Slides:



Advertisements
Similar presentations
IS333, Ch. 26: TCP Victor Norman Calvin College 1.
Advertisements

Digital Signatures. Anononymity and the Internet.
TCP/IP Protocol Suite 1 Chapter 13 Upon completion you will be able to: Stream Control Transmission Protocol Be able to name and understand the services.
1 Lecture 9: TCP and Congestion Control Slides adapted from: Congestion slides for Computer Networks: A Systems Approach (Peterson and Davis) Chapter 3.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
TCP. Learning objectives Reliable Transport in TCP TCP flow and Congestion Control.
Chapter 16 Stream Control Transmission Protocol (SCTP)
TCP: flow and congestion control. Flow Control Flow Control is a technique for speed-matching of transmitter and receiver. Flow control ensures that a.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
1 7-Oct-15 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
Chapter 12 Transmission Control Protocol (TCP)
Network Security – Special Topic on Skype Security.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
CS2910 Week 1, Class 2 Today Announce Prof. Michael Vieau’s S-341 6p Thurs Wk 2 Assignment for tomorrow Data Encoding, Part 1 Parsing Data Muddiest Point.
Transport Layer 3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March
1 CS 4396 Computer Networks Lab TCP – Part II. 2 Flow Control Congestion Control Retransmission Timeout TCP:
CS2910 Week 5, Class 2 Today DNS Muddy Points More HTTP Headers Review for Midterm Exam This coming Monday: Midterm Exam SE-2811 Slide design: Dr. Mark.
CS2910 Week 9, Class 1 Today –Quiz on SMTP –TCP: Flow control vs. Congestion Control –TCP startup, error recovery, and shut-down Before 8am Thursday: –Watch.
ECE 4110 – Internetwork Programming
CS2910 Week 10, Class 1 Today Modular Arithmetic RSA Week 10, Monday Quiz: Potential topics TCP window size & header format Public/private key encryption.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Stream Control Transmission.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Congestion Control 0.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
TCP as a Reliable Transport. How things can go wrong… Lost packets Corrupted packets Reordered packets …Malicious packets…
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
CS2911 Week 3, Class 2 Today Return Lab 3 Afternoon section: Hand out Lab 4 Checklist Review Muddiest Point Questions on Lab 4? What is a protocol? The.
Encryption with Keys and Passwords
CS450 – Introduction to Networking Lecture 19 – Congestion Control (2)
Topics discussed in this section:
Chapter 6 TCP Congestion Control
Cryptography Why Cryptography Symmetric Encryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Secure Sockets Layer (SSL)
Chapter 1 Introduction Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
Process-to-Process Delivery, TCP and UDP protocols
Network Security.
Security.
PART 5 Transport Layer Computer Networks.
CS2911 Week 8, Class 1 Today Week 8, Lab period Muddiest Point
Public-key Cryptography
Introduction Of System Security
CS2911 Week 10, Class 2 Today Tomorrow Final Exam: Monday, 11am
CS2911 Week 9, Sometime Today Week 10, Tuesday TCP
Presented by: Dr. Munam Ali Shah
Chapter 5 TCP Sliding Window
Lesson 5: Simple Encryption
Lecture 19 – TCP Performance
PART VII Security.
Process-to-Process Delivery:
Security.
The Secure Sockets Layer (SSL) Protocol
CS2911 Week 9, Class 1 Today Discussion on RSA Video Eavesdropping
Crypto #4 Encryption and Network Protocols
Homework #4 Solutions Brian A. LaMacchia
Network Security.
Cryptography a Presentation Prepared by Vytautas Kondratas.
Lesson 7: Simple Encryption
CS2911 Week 8, Class 1 Today Week 8, Lab period Muddiest Point
CS2911 Week 5, Class 3 Today Week 6, Lab: Quiz at start of lab
CS4470 Computer Networking Protocols
Slide design: Dr. Mark L. Hornick
Slide design: Dr. Mark L. Hornick
CS2911 Week 3, Class 3 (And wk4-c1)
Transport Layer: Congestion Control
CS2911 Week 3, Lab Today Thursday Friday Review Muddiest Point Lab 3
Slide design: Dr. Mark L. Hornick
TCP flow and congestion control
CS2911 Week 8, Class 1 Today Week 8, Lab period Muddiest Point
Security: Public Key Cryptography
Presentation transcript:

CS2911 Week 7, Class 3 Today Week 8, Lab period Muddiest Point 17 April 2019 CS2911 Week 7, Class 3 Today Muddiest Point Questions on Videos Finish TCP Encryption Week 8, Lab period Quiz 4: Topics include TCP, SMTP, IMAP, POP 17q1 7-1 1-7,9-24 CS2911 Dr. Yoder Dr. Josiah Yoder

Sliding Window supports Flow Control Won't over-fill receiver's buffer Waits for receiving application to be ready This is one reason to call recv even before we have gotten the whole message

Flow vs. Congestion Control Flow control is a function of the receiver and its ability to accept data Congestion control is a function of the network and its ability to carry messages Congestion control avoids sending more data than the network can handle, resulting in collapse of the network

New Variable - cwnd Two windows cwnd – congestion window Un-acknowledged bytes cwnd – congestion window rwnd – receive (flow control) window Note that this is NOT a new field in the headers – convenient!

cwnd We can send up to cwnd bytes per RTT period Average transmission rate is roughly cwnd/RTT bytes/sec By manipulating cwnd, transmission rate can be controlled

Congestion Detection If segments lost, maybe we are sending too many Adjust cwnd Decrease when a segment is lost Increase when [consistent] ACKs are received Continue to increase until a segment is lost, then backoff

TCP Slow Start Start with a small cwnd (one MSS)

cwnd Over Time

Challenge: How to avoid accidental message? What if a TCP message from a previous connection gets stuck in a router for a while, but then eventually gets delivered later? How to avoid it being mistaken for the newer message?

A very brief history of the internet 1957 – Sputnik launched, ARPA formed 1962 – ARPA forms IPTO to create ARPAnet 1969 – First packet switched network at UCLA 1971 – First emails with @ signs 1983 – TCP/IP first deployed 1986 – NSFNET created (& many others) 1989 – HTTP starts with just GET 1991 – NSFNET allows commercial activities. e-Bay, Google, Amazon … 2000's – Facebook, Twitter, Youtube, … Source: Kurose & Ross, 6th, Ed, Section 1.7 and http://www.calvin.edu/academic/rit/webBook/chapter3/Introduction/arpanet.htm http://www.livinginternet.com/e/ei.htm Wiki: HTTP

Questions about Encryption CS2911 17 April 2019 Questions about Encryption What are the different ways in which a message can be damaged? How can someone eavesdrop over the network? Big picture: Intrusion techniques What are some everyday things that use encryption, like things that we wouldn't necessarily think about? Big picture: What uses encryption? 1. I still feel confused about the concept of the key. Is the key a number? Or it is a function for encoding the plaintext? Big picture: What is a key? 2. What is the known plaintext attack? Dr. Josiah Yoder

Questions about Encryption CS2911 17 April 2019 Questions about Encryption If someone found a way to determine the encryption algorithm, would they be able to then create a decryption algorithm? The video says that they could introduce false information into the cipher-text, but I would assume a more valuable use would be to reverse engineer it to decode the cipher-text. For the box algorithm, it says that it uses a table that grows in size 2^n where n is the number of bits in each chunk. Couldn't the size of the chunk just be kept small? And why does it require a table that grows at such a fast rate? Big picture: What is a key? Dr. Josiah Yoder

Questions about Encryption CS2911 17 April 2019 Questions about Encryption if encryption algorithms are often in the public domain, wouldn't cipher block chaining become recognizable to an intruder studying the cipher text? Cipher block chaining when talking about keys, is it possible to have a public and private key that is known to encrypt a private key for even greater security of information, or is public private key only used for sending / receiving messages? Public/private keys What are some common encryption algorithms that use the methods in the video, like symmetric? Current Algorithms Dr. Josiah Yoder

Questions about Encryption CS2911 17 April 2019 Questions about Encryption Is there ever a good use for simple symmetric cyphers? It seems easy to guess through brute force, so why would anybody use such a weak encryption? Why use simple encryption? So I remember hearing somewhere that Prime numbers are really important when it comes to encryption. How would that apply to Stream, Block, and Cipher Block Chaining encryption strategies? Prime numbers Dr. Josiah Yoder

Questions about Encryption CS2911 17 April 2019 Questions about Encryption How are the keys (Ka and Kb) sent? Wouldn't they need to be encrypted with a second set of keys, and then those keys would need to be encrypted by a different set of keys, ad infinitum? Or do the keys exist somehow on the sending and receiving machines independent of the network? Public/private keys How are asymmetric keys used to encrypt the text? It doesn't seem inherently true that the order in which the keys are used on the text doesn't matter. Is it possible for a company to have multiple was of encoding? That way they can alternate and it will be really hard for Trudy to get near deciphering the encryption. Encryption strategy Dr. Josiah Yoder

Questions about Encryption CS2911 17 April 2019 Questions about Encryption What is the point of a basic Casesar cypher? It is far too easy to decrypt to actually be used for private information. Why use simple encryption? How exactly are keys used? I understand the concept, but how are the client and host made aware of the same key to use, despite the fact that sending the key over the network would require encryption for obvious reasons? Sharing keys How come the person receiving the message can decipher the message but an intruder can't? How does the receiver get the key but not the intruder? What is the purpose of a session key? How does is differ from the public and private keys? Symmetric vs. Asymmetric Dr. Josiah Yoder

Questions about Encryption CS2911 17 April 2019 Questions about Encryption Does encryption always use a symmetric key system? If not, how would a non-symmetric key system work when encrypting and decrypting plain text? public/private keys Is this some of the fundamentals of learning how to become a hacker? How and where can you find the keys or figure out which type of encryption system is being used? Cracking keys and algorithms what is the current standard for encryption? Current algoritms Dr. Josiah Yoder

Questions about Encryption CS2911 17 April 2019 Questions about Encryption During stream ciphers, he mentioned encoding by adding another stream of bytes, (e sub i in the video). Is this a generated stream, or are you trying to interlace two streams of actual data? When you decode, are you trying to find both b sub i(plaintext bytestream) and e sub i? or just b sub i? [See Chapter 8.8.1, 7th Ed.] Stream ciphers are session keys shared secret keys? Symmetric keys how are "secret" keys shared but kept secret? Sharing keys Known plaintext attack Dr. Josiah Yoder

Questions about Encryption CS2911 17 April 2019 Questions about Encryption For session keys, wouldn't there be a finite amount of keys that could be generated before the computation would become too taxing on the computer system and therefore would be more reasonable to cycle back to older keys? Computation-al burden, Repeated keys The session key is generated as a new one every time. Is there any chance that after times there will be repeated key? Repeated keys What other types of encryption are there besides rsa Current Algorithms Dr. Josiah Yoder

Comments about Encryption CS2911 17 April 2019 Comments about Encryption Why can't we all just promise not to intrude on others, so this becomes unnecessary? hahaha. Are we going to have to encrypt? These videos are a bit slow-paced, but playing at 1.5 speed mitigates this. YouTube is great! Are there common keys and encryption standards for cryptography? I like the section which introduces the relationship between the plain text and the cipher text. The graph is helpful for me to understand the relationship. If the keys are suppose to come in and out of existence, how is someone potentially able to trackback to previous transactions? Dr. Josiah Yoder

CS2911 17 April 2019 https://www.polleverywhere.com/free_text_polls/zIp2tH2IVWjXv4H CS2911 Dr. Yoder Dr. Josiah Yoder

CS2911 17 April 2019 Acknowledgement The content of this video is based in part on lecture slides from a very good textbook, and used with the author’s permission: Computer Networking: A Top-Down Approach, 7th edition, by Jim Kurose and Keith Ross Publisher: Pearson, 2017 It is also based on slides provided by Dr. Darrin Rothe Dr. Josiah Yoder