Overview and Introduction (Lecture Contents Summary)

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
CIS/TCOM 551 Computer and Network Security Slide Set 1 Carl A. Gunter Spring 2004.
Information Security of Embedded Systems : Communication, wireless remote access Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
CSE 331 CSE 331: Introduction to Networks and Security Fall 2001 Instructor: Carl A. Gunter Slide Set 1.
SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
@Yuan Xue CS 285 Network Security Fall 2008.
An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Cryptography and Network Security (SSL)
Computer Networking A few notes on reading Dr Sandra I. Woolley.
A. Steffen, , 0-Overview.pptx 1 Information Security 2 (InfSi2) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Computer and Network Security - Message Digests, Kerberos, PKI –
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Chapter 7 : Web Security Lecture #1-Week 12 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-9 Public-Key Cryptography.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-1 Overview and Introduction.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles Course administration.
Understand User Authentication LESSON 2.1A Security Fundamentals.
Key management issues in PGP
Virtual Private Networks and IPSec
Chapter 5 Network Security Protocols in Practice Part I
Cryptography: an overview
Cryptography: an overview
Intro. To Telecommunication Sama AlBugami
Author:YongBin Zhou, ZhenFeng Zhang, and DengGuo Feng Presenter:戴士桀
Home: Tel: , H.P.: Office: 공) 7710A
CSE 331: Introduction to Networks and Security
Chuck Frank Northern Kentucky University
Public-Key Cryptography RSA Rivest-Shamir-Adelmann Public-Key System
Introduction to Information Security
Information Security.
Cryptography Reference: Network Security
Cryptography Reference: Network Security
Public-Key Cryptography and RSA
Chapter 8 Network Security.
3G Security Principles Build on GSM security
Asynchronous Cryptology: Implementations and Applications
Electronic Mail Security
Network Security Primitives
Mobile Communications Mobile Security Fundamentals-3
Public-Key Cryptography
CS/ECE 478 Introduction to Network Security Dr. Attila Altay Yavuz
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
Network Security Sample Solution Short questions (Closed book)
Chapter 8 Network Security.
Introduction to the course
Chuck Frank Northern Kentucky University
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
The Secure Sockets Layer (SSL) Protocol
Cryptography: an overview
Security.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Unit 8 Network Security.
Cryptology Design Fundamentals
Advanced Computer Networks
Cryptology Design Fundamentals
Operating System Concepts
Cryptology Design Fundamentals
Cryptography and Network Security
Electronic Mail Security
LM 7. Cellular Network Security
Presentation transcript:

Overview and Introduction (Lecture Contents Summary) Network Security Design Fundamentals ET-IDA-082 Lecture-1 Overview and Introduction (Lecture Contents Summary) 13.04.2018, v18 Prof. W. Adi

Recommended References Possible Textbooks: 1. Cryptography and Network Security W. Stallings, Printice Hall 2003, ISBN: 0 13 111502 2 Or: Network Security Essentials: Applications and Standards William Stallings, 3rd Edition, Prentice Hall, © 2007, ISBN: 0-13-238033-1 2. Network Security Private communication in a public world C. Kaufman, R. Perlman, M. Speciner, Printice-Hall 10th printing 2007, ISBN 0 13 046019 2 Other reference books: 1. Cryptography & Network Security FOROUZAN, McGraw-Hill 2007, ISBN10: 0073327530, ISBN13: 9780073327532 2. Handbook of Applied Cryptography by Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone CRC Press (October 16, 1996) (available free of charge on the WEB) Central TU Library

Other books: Security of Information and Communication Networks Stamatios V. Kartalopoulos ISBN: 978-0-470-29025-5, Hardcover, 344 pages, April 2009, Wiley-IEEE Press Computer Security and Cryptography Alan G. Konheim ISBN: 978-0-471-94783-7, Hardcover, 544 pages February 2007, Wiley Mobile Communication Systems and Security Man Young Rhee ISBN: 978-0-470-82336-1, Hardcover, 448 pages April 2009, Wiley Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft Markus Jakobsson (Editor), Steven Myers (Editor) ISBN: 978-0-471-78245-2, Hardcover, 700 pages, January 2007, Wiley

Outlines Why Security ? The Story of Security Science This introduction presents essential examples of the main course contents, however with minimum mathematics ! Why Security ? The Story of Security Science Traditional Security Systems Overview Modern Security Systems Overview Applications Network Security

Open Information World scenario Why Security ? Open Information World scenario Widespread Expanding very fast unlimited applications Mobile-Commerce etc… 6000 Million mobile devices Light Heating Kitchen Garage Door Gates ... Remote Control Car power - line CAN-Bus TV Global Information Short-Circuit (AAA Scenario) IoT Internet Of Things Power Station power line network Internet Wireless Network Anywhere Any time Any device

Evolving 2G, 3G .. 5G Mobile Network Architecture Circuit Network Circuit/ Signaling Gateway Mobility Manager Feature Server(s) Circuit Switch IN Services RNC Call Agent Voice Data + Packet Voice IP Core Network Radio Access Control Packet Network (Internet) 4G IP RAN Security threats are spead over the fixed and mobile networks! 3G … 5G 2G GSM 2G/2.5G

Impacts of Globalization on Information Technology ! Globalization (Borderless) Unlimited resources Unrestricted resources Easy untraceable access No national boarders/Law? Manageability ? controllability ? Abuse-ability Security is still a serious issue in most communication systems, and is a very essential one !!

Two Major Security Tasks Authentication Securely identify an entity Secrecy Keep data safe against illegal users Security tasks require to deploy cryptographic mechanisms to be realized Cryptography: is the science dealing with hiding information and data security questions

1. Secret Key Cryptography Overview Concepts

Secret Key Cryptography (Symmetric System) K-open = K-close - Open and close using shared secret keys (mostly one shared key) !! - Secret key agreement required !

Secret Key Crypto-System : mechanical simulation SENDER RECEIVER Key = Z Secret key agreement Key = Z Z Lock Message Message Z

2. Public-Key Cryptography Scientific Breakthrough 1976

Public-Key Secrecy Systems K-open K-secret - Open and close with different keys!! - No Secret Key Agreement required Two Major Schemes in Public Key Cryptography: Diffie-Hellman Public Key exchange scheme RSA public Key secrecy system

Basic Public Key Secrecy System (RSA system1978) (Mechanical simulation: user B gets a secured message from A) User A User B Public register Ko= Kc-1 Close Kc open ( )Kc (mod m) Kc M MKc.Ko = M (MKc)Ko Ko MKc

Identification, Signature /Certificates.. 3. Authentication Identification, Signature /Certificates.. Secret Key Techniques Public-Key Techniques

International Mobile Equipment Identity Subscriber Identity Module Secured Identity (Authentic Identity) International Mobile Equipment Identity IMEI (non-secured) SIM (secured) Subscriber Identity Module

4. Network Security Protocols SSL, IPSEC, KERBEROS, PGP, X509 .. Standards, Applications

Example: SSL: Secure Socket Layer “Security Protocols” Server

“Network Security” Objectives (course objectives summary) The aims of this course is to give a basic understanding of the design fundamentals and tools used in modern network security systems mainly includes: Review Fundamentals of Cryptology (4-5 sessions) Network security primitives, Certificates, Ciphering, Integrity Network security Standards, SSL, IPSEC, PGP .. Network security applications. E-Money, E-Vote .. Course strategy: less proofs, more practical design hints!