1 Chapter 10 Network Security. 2 Security Requirements zConfidentiality zIntegrity zAvailability.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Internet Security CSCE 813 IPsec
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Computer Networks with Internet Technology William Stallings Chapter 16 Network Security.
Sri Lanka Institute of Information Technology
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Information Security Principles & Applications Topic 4: Message Authentication 虞慧群
Henric Johnson1 Chapter 6 IP Security Henric Johnson Blekinge Institute of Technology, Sweden
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Henric Johnson1 Chapter 6 IP Security. Henric Johnson2 Outline Internetworking and Internet Protocols IP Security Overview IP Security Architecture Authentication.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Chapter 18: Network Security Business Data Communications, 5e.
Cryptographic Technologies
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Chapter 20: Network Security Business Data Communications, 4e.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Network Security Sorina Persa Group 3250 Group 3250.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Computer Networks with Internet Technology William Stallings Network Security.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
An Introduction to Encrypting Messages on the Internet Mike Kaderly INFS 750 Summer 2010.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
/IPsecurity.ppt 1 - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall.
Chapter 21 Public-Key Cryptography and Message Authentication.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
William Stallings Data and Computer Communications Chapter 18 Network Security.
William Stallings Data and Computer Communications Chapter 18 Network Security.
1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
William Stallings Data and Computer Communications Chapter 18 Network Security.
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
Chapter 2 Symmetric Encryption.
UNIT-VIII Syllabus Application Layer – Network Security, Domain name system, SNMP, Electronic Mail; the World WEB, Multi Media.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
1 IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Twelve Network Security.
IP Security
The Secure Sockets Layer (SSL) Protocol
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Chapter 18 IP Security  IP Security (IPSec)
Network Security.
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
NET 536 Network Security Lecture 5: IPSec and VPN
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Chapter 6 IP Security.
Presentation transcript:

1 Chapter 10 Network Security

2 Security Requirements zConfidentiality zIntegrity zAvailability

3 Security Threats

4 Encryption – Ingredients (Conventional)

5 Encryption – Basics zRequirements yStrong encryption algorithm ySender and receiver must obtain secret key securely yOnce key is known, all communication using this key is readable zAttacks yCrypt analysis yBrute force

6 Encryption – Algorithms zBlock cipher yProcess plain text in fixed block sizes producing block of cipher text of equal size zSchemes/algorithms  DES – Data Encryption Standard  DEA – Data Encryption Algoritm  TDEA – Triple Data Encryption Algoritm

7 Encryption - DES Algorithm

8 Encryption – Strength of DES zDeclared insecure in 1998 zElectronic Frontier Foundation zDES Cracker machine zDES now worthless zAlternatives include TDEA

9 Encryption – Location of Encryption Devices

10 Encryption – Key Distribution zKey selected by A and delivered to B zThird party selects key and delivers to A and B zUse old key to encrypt and transmit new key from A to B zUse old key to transmit new key from third party to A and B

11 Encryption – Automatic Key Distribution

12 Authentication – Basics zProtection against active attacks zAuthentication allows receiver to verify that message is authentic yMessage has not been altered yMessage is from authentic source yMessage timeliness zAuthentication may be achieved using encryption

13 Authentication – Without Encryption zAdvantages of authentication without encryption yEncryption is slow yEncryption hardware expensive yEncryption hardware optimized to large data yAlgorithms covered by patents yAlgorithms subject to export controls (from USA) zAuthentication tag generated and appended to each message

14 Authentication – Using Message Authentication Code

15 Authen- tication - Using One Way Hash

16 Authentication – Secure Hash Functions zHash function must have following properties yCan be applied to any size data block yProduce fixed length output yEasy to compute yNot feasible to reverse yNot feasible to find two message that give the same hash zExample: The SHA-1 Secure Hash Function

17 Public Key Encryption – Basics zBased on mathematical algorithms zAsymmetric yUse two separate keys yOne key made public yOther key kept private zEither key can be used for encryption, the other for decryption zInfeasible to determine decryption key given encryption key and algorithm

18 Public Key Encryption - Ingredients

19 Public Key Encryption – Digital Signature zSender encrypts message with their private key zReceiver can decrypt using senders public key zThis authenticates sender, who is only person who has the matching key

20 Public Key Encryption – RSA Algorithm

21 Public Key Encryption – RSA Example

22 IP Security – Basics zIPSec zExample applications ySecure branch office connectivity over Internet ySecure remote access over Internet yExtranet and intranet connectivity yEnhanced electronic commerce security

23 IP Security – Scope and Modes zIPSec scope yAuthentication header (AH) yEncapsulated security payload (ESP) yKey exchange zTransport mode yProtection for upper layer protocols yExtends to payload of IP packet yEnd to end between hosts zTunnel mode yProtection for IP packet  Entire packet treated as payload for “ outer ” IP packet  No routers examine “ inner ” packet yMay be implemented at firewall

24 Summary zIntro yRequirements (CIA) yAttacks and defences zEncryption (incl. DES) zAuthentication (incl. MAC and one way hash) zPublic-key encryption (incl. digital signatures) zIP security