1 MSc EEM118 Research Dissertation CITE, UEL Cryptography and Network Security Dr David Xiao

Slides:



Advertisements
Similar presentations
Security+ All-In-One Edition Chapter 10 – Wireless Security
Advertisements

Doc.: IEEE /178 Submission July 2000 A. Prasad, A. Raji Lucent TechnologiesSlide 1 A Proposal for IEEE e Security IEEE Task Group.
ITEC 6324 – Assignment Seven IEM Baseline Activity / Tool (Netstumbler, Kismet, Airopeek & AirSnort. Name: Victor Wong Instructor: Dr Crowley.
Virtual Private Networks
Network Security.
Attacks and defense strategies in a wireless local area network Course: CSCI5235 Instructor: Dr. Andrew T. Yang Student: Fan Yang.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Computer Networking Revision Dr Sandra I. Woolley.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
Principles of Information Security, 2nd edition1 Cryptography.
Final Presentation Presented By: Gal Leibovich Liran Manor Supervisor: Hai Vortman.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Chapter 8 Network Security 4/17/2017
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Feb 19, 2002Mårten Trolin1 Previous lecture Practical things about the course. Example of cryptosystem — substitution cipher. Symmetric vs. asymmetric.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Network Security Sorina Persa Group 3250 Group 3250.
Agenda 10:00 11:00 Securing wireless networks 11:00 11:15 Break 11:15 12:00Patch Management in the Enterprise 12:00 1:00 Lunch 1:00 2:30 Network Isolation.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
MASNET GroupXiuzhen ChengFeb 8, 2006 CSCI388 Project 1 Crack the WEP key Liran Ma Department of Computer Science The George Washington University
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Linux Networking and Security Chapter 8 Making Data Secure.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Computer encryption is… Based on the science of cryptography.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Network Security Section 1: Introduction to security.
Midterm Review Cryptography & Network Security
Professional Encryption Software FINECRYPT 8.1. Contents Introduction Introduction Features Features Installation Installation Tests Tests Results Results.
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 23/10/2015 | pag. 2.
Exam Review for First Half of C430 2 May pm in Huxley 308 Michael Huth 2 May pm in Huxley 308 Michael Huth.
Chapter 7: Cryptographic Systems
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
IPSec VPN: How does it really work? Yasushi Kono (ComputerLinks Frankfurt)
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Potential vulnerabilities of IPsec-based VPN
Network Security Chapter 8 12/13/ Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
KSU 2015-Summer Cyber Security | Group 1 | Seul Alice Bang Get a Wifi Password.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Course web page: ECE 646 Cryptography and Computer Network Security ECE web page  Courses  Course web pages  ECE 646.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
System Security: Cryptography Technologies CPE Operating Systems
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Wireless LAN Security Daniel Reichle Seminar Security Protocols and Applications SS2003.
Network Security Chapter 8 Institute of Information Science and Technology. Chengdu University YiYong 2008 年 2 月 25 日.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY.
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
Chapter 8 Network Security.
Cryptography and Security Fall 2009 Steve Lai
Chapter 8 Network Security.
Public-Key, Digital Signatures, Management, Security
Presentation transcript:

1 MSc EEM118 Research Dissertation CITE, UEL Cryptography and Network Security Dr David Xiao

2 General idea of symmetric-key cipher

3 Public-Key Cryptography Locking and unlocking in asymmetric-key cryptosystem

4 Possible project areas: 1. Symmetric-key cryptography, DES, AES… 2. Asymmetric-key cryptography, RSA, Diffie-Hellman… 3. Reed-Solomon codes in error detection and correction of network communication. 4. Evaluation of network simulation software Network II and OPNET, and integration with MALTAB Wireless network security:

5 5.1 To assess the security posture of an organization's Ipsec based VPN architecture using IKEProbe. 5.2 To assess the security posture of an organization's network using IKE/IPSec authentication crack tool. 5.3 To assess the security posture of an organization's network using Ettercap, a Unix and Windows tool for computer network protocol analysis and security auditing. 5.4 To assess the wireless b network security using AirSnort for decrypting WEP encryption of Linux and Microsoft Windows utility. 5.5 To assess Weaknesses in the Key Scheduling Algorithm of RC4 (RSA). 5.6 To assess wireless LANs using Aircrack-ng detector, packet sniffer, WEP and WPA/WPA2-PSK analysis tool for raw monitoring mode and sniff a, b and g traffic.

6 Some references for “Cryptography” from the UEL library: Applied cryptography : protocols, algorithms and source code in C / Bruce Sc.-2nd ed. Basic methods of cryptography / Jan C.A. van der Lubbe Computer security and cryptography [electronic resource] / Alan G. Konheim Cryptography : proceedings of the Workshop on Cryptography, Burg Feuerstein, Cryptography : an introduction to computer security / Jennifer Seberry, Jose Cryptography and network security / Behrouz A. Forouzan. - International ed. Cryptography and network security : principles and practices / William Stall. - 4th ed. Introduction to cryptography : principles and applications / Hans Delfs, Hel Introduction to cryptology and PC security / Brian Beckett Java cryptography … If you are interested and have knowledge of C++, C#, or Java…, please send me your “proposal form” by

7 Some of previous MSc dissertations: 1. “Development of secured cryptosystem” Software developed using UML and ASP.Net to calculate cryptographic DES, 3DES, AES and RSA 2. “Application licensing with XML digital signature” Software developed in XML language using C#.net for generating digital signatures including MAC addresses and/or system names. 3. “Security analysis of WLANs” Wireless LAN performance assessment using “Iperf” software, keys generations of WEP, WPA and WPA2, Cracking WEP and WPA passwords using “aircrack-ng”, Cracking WPA2 password using “backtrack”.

8 Some of previous MSc dissertations (continued) 4. “A measurement based admission control scheme to enhance QoS of VoIP networks” 5. “Modelling and designing of peer-to-peer network using OPNET package” 6. “Development of software scheme for RSA algorithm in C”