Overview and Introduction (Lecture Contents Summary) Network Security Design Fundamentals ET-IDA-082 Lecture-1 Overview and Introduction (Lecture Contents Summary) 13.04.2018, v18 Prof. W. Adi
Recommended References Possible Textbooks: 1. Cryptography and Network Security W. Stallings, Printice Hall 2003, ISBN: 0 13 111502 2 Or: Network Security Essentials: Applications and Standards William Stallings, 3rd Edition, Prentice Hall, © 2007, ISBN: 0-13-238033-1 2. Network Security Private communication in a public world C. Kaufman, R. Perlman, M. Speciner, Printice-Hall 10th printing 2007, ISBN 0 13 046019 2 Other reference books: 1. Cryptography & Network Security FOROUZAN, McGraw-Hill 2007, ISBN10: 0073327530, ISBN13: 9780073327532 2. Handbook of Applied Cryptography by Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone CRC Press (October 16, 1996) (available free of charge on the WEB) Central TU Library
Other books: Security of Information and Communication Networks Stamatios V. Kartalopoulos ISBN: 978-0-470-29025-5, Hardcover, 344 pages, April 2009, Wiley-IEEE Press Computer Security and Cryptography Alan G. Konheim ISBN: 978-0-471-94783-7, Hardcover, 544 pages February 2007, Wiley Mobile Communication Systems and Security Man Young Rhee ISBN: 978-0-470-82336-1, Hardcover, 448 pages April 2009, Wiley Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft Markus Jakobsson (Editor), Steven Myers (Editor) ISBN: 978-0-471-78245-2, Hardcover, 700 pages, January 2007, Wiley
Outlines Why Security ? The Story of Security Science This introduction presents essential examples of the main course contents, however with minimum mathematics ! Why Security ? The Story of Security Science Traditional Security Systems Overview Modern Security Systems Overview Applications Network Security
Open Information World scenario Why Security ? Open Information World scenario Widespread Expanding very fast unlimited applications Mobile-Commerce etc… 6000 Million mobile devices Light Heating Kitchen Garage Door Gates ... Remote Control Car power - line CAN-Bus TV Global Information Short-Circuit (AAA Scenario) IoT Internet Of Things Power Station power line network Internet Wireless Network Anywhere Any time Any device
Evolving 2G, 3G .. 5G Mobile Network Architecture Circuit Network Circuit/ Signaling Gateway Mobility Manager Feature Server(s) Circuit Switch IN Services RNC Call Agent Voice Data + Packet Voice IP Core Network Radio Access Control Packet Network (Internet) 4G IP RAN Security threats are spead over the fixed and mobile networks! 3G … 5G 2G GSM 2G/2.5G
Impacts of Globalization on Information Technology ! Globalization (Borderless) Unlimited resources Unrestricted resources Easy untraceable access No national boarders/Law? Manageability ? controllability ? Abuse-ability Security is still a serious issue in most communication systems, and is a very essential one !!
Two Major Security Tasks Authentication Securely identify an entity Secrecy Keep data safe against illegal users Security tasks require to deploy cryptographic mechanisms to be realized Cryptography: is the science dealing with hiding information and data security questions
1. Secret Key Cryptography Overview Concepts
Secret Key Cryptography (Symmetric System) K-open = K-close - Open and close using shared secret keys (mostly one shared key) !! - Secret key agreement required !
Secret Key Crypto-System : mechanical simulation SENDER RECEIVER Key = Z Secret key agreement Key = Z Z Lock Message Message Z
2. Public-Key Cryptography Scientific Breakthrough 1976
Public-Key Secrecy Systems K-open K-secret - Open and close with different keys!! - No Secret Key Agreement required Two Major Schemes in Public Key Cryptography: Diffie-Hellman Public Key exchange scheme RSA public Key secrecy system
Basic Public Key Secrecy System (RSA system1978) (Mechanical simulation: user B gets a secured message from A) User A User B Public register Ko= Kc-1 Close Kc open ( )Kc (mod m) Kc M MKc.Ko = M (MKc)Ko Ko MKc
Identification, Signature /Certificates.. 3. Authentication Identification, Signature /Certificates.. Secret Key Techniques Public-Key Techniques
International Mobile Equipment Identity Subscriber Identity Module Secured Identity (Authentic Identity) International Mobile Equipment Identity IMEI (non-secured) SIM (secured) Subscriber Identity Module
4. Network Security Protocols SSL, IPSEC, KERBEROS, PGP, X509 .. Standards, Applications
Example: SSL: Secure Socket Layer “Security Protocols” Server
“Network Security” Objectives (course objectives summary) The aims of this course is to give a basic understanding of the design fundamentals and tools used in modern network security systems mainly includes: Review Fundamentals of Cryptology (4-5 sessions) Network security primitives, Certificates, Ciphering, Integrity Network security Standards, SSL, IPSEC, PGP .. Network security applications. E-Money, E-Vote .. Course strategy: less proofs, more practical design hints!