Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.

Slides:



Advertisements
Similar presentations
Security and Privacy over the Internet Chan Hing Wing, Anthony Mphil Yr. 1, CSE, CUHK Oct 19, 1998.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Sri Lanka Institute of Information Technology
Chapter 11: Cryptography
Chapter 15 Security Bernard Chen Spring Protection vs. Security Protection (Ch.14) deals with internal problem Security (Ch. 15) Deals with external.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Applied Cryptography for Network Security
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Security Module – Part 1 Spring 2006 V.T. Raja, Ph.D., Oregon State University.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Encryption Methods By: Michael A. Scott
Network Security Sorina Persa Group 3250 Group 3250.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Cryptography, Authentication and Digital Signatures
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Network Security David Lazăr.
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Information Security in Distributed Systems Distributed Systems1.
CIS 325: Data Communications1 Chapter Seventeen Network Security.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
UNIT-VIII Syllabus Application Layer – Network Security, Domain name system, SNMP, Electronic Mail; the World WEB, Multi Media.
Network Security Introduction
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Network Security Celia Li Computer Science and Engineering York University.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Network Security.
What is network security?
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 2 Mumtaz Ali Rajput +92 – 301-
Security.
Security Attacks, Mechanisms, and Services
Presentation transcript:

Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system and network security –Relate security services to security attacks –Compare different symmetric encryption algorithms: DES and AES

Security Internet Management & Security 06 Introduction With the high availability of resources on the Internet, security has become a very relevant issue. The main aim is to protect the resources on the Internet so that they cannot: –Be accessed –Be changed –Be deleted by non-authorised or malicious users

Security Internet Management & Security 06 Vulnerability of systems and networks A B C D Malicious user Malicious user Malicious user Malicious user

Security Types of Security Attacks Attacks can be categorised as : – Passive Security Attacks – Active Security Attacks

Security Passive security attacks A passive attack is an attack where an unauthorized attacker monitors or listens in on the communication between two parties.

Security Internet Management & Security 06 Passive security attacks Passive attacks –Obtain information being transmitted or stored in a system –Do not alter the contents of messages or files –Difficult to detect Solution: –Prevent the attack: data confidentiality –Encrypt information, strongly authenticate access

Security Internet Management & Security 06 Active security attacks Active attacks requires the attacker to be able to transmit data to one or both of the parties, or block the data stream in one or both directions. –Modify or delete data stored or being transmitted Masquerade Replay Modification Denial of service –Easier to detect –Harder to prevent

Security Internet Management & Security 06 Active security attacks –the attacker can stop all or parts of the data sent by the communicating parties. –This attacker can e.g. try to take the place of the client (or server) when the authentication procedure has been performed. –Without integrity checks of the received data, the server will not detect that the origin of the data is not the authenticated person. –A clever programmer can, with not to much effort, implement a system like this on a computer acting as a gateway (bridge) between two subnets.

Security Internet Management & Security 06 Active security attacks The following are examples of different attacks this person could impose. –Inserting his own data into the data stream. –Playback of data from another connection. –Playback of data that had previously been sent in the same and opposite direction on the same connection. –Deletion of data. –Man-in-the-middle attack. The man-in-the-middle-attack is an attack where the intruder sits in the middle of the communication link, intercepting messages and substituting them with his own messages. In this way, he tries to fool the parties to believe they are talking to each other directly, while they really are talking to the attacker him-selves.

Security Internet Management & Security 06 Active security attacks Solution: –Authentication –Access control –Data confidentiality –Data integrity –Non-repudiation –Availability

Security Internet Management & Security 06 Conclusions Security strategies are important because they: –help maintain good performance of resources on a network –guarantee users that their information is safe and private –deter potential attacks on resources

Security Internet Management & Security 06 Cryptography Cryptography modifies the content of a message according to a predetermined pattern only known by sender and receiver with the aim to prevent other parties from reading the content An encrypted message is: 1 Transformed 2 Transmitted 3 Unchanged The predetermined pattern or key needs to be transmitted separately

Security Internet Management & Security 06 Symmetric cryptography Process of cryptography: Message Encryption algorithm Secret key Cipher text Decryption algorithm (the success of the process relies on the secrecy of the key, but it must be known by the sender and the receiver)

Security Cryptography on the Internet Internet Management & Security 06 An iterated block cipher maybe be used to get a few rounds of security

Security Internet Management & Security 06 Triple DES What we all call Triple DES is EDE (encrypt, decrypt, encrypt). The way that it works is that you take three 56-bit keys, and encrypt with K1, decrypt with K2 and encrypt with K3. There are two-key and three-key versions. Think of the two-key version as merely one where K1=K3. Note that if K1=K2=K3, then Triple DES is really Single DES.

Security Internet Management & Security 06 Triple DES The same as DES but it uses three executions of the full DES algorithm with three different keys Used in financial applications C=E K 3 [D K 2 [E K 1 [P]]] C – cipher text P – plaintext E K [X] – encryption of X using key K D K [X] – decryption of X using key K Advantage – effective key of 128 bits Disadvantage – more processing power needed

Security Internet Management & Security 06 Advanced Encryption Standard (AES) AES – first thought of to replace 3DES with a lighter algorithm that provides the same security as 3DES Block length – 128 bits Supports keys of – 128, 192 and 256 bits (most common key is 128) NOT a Feistel structure