DC 6 - 1 DATACOMM John Abbott College JPC Datacomm Security M. E. Kabay, PhD, CISSP Director of Education, ICSA President, JINBU Corp Copyright © 1998.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
9-1 Chapter 9 - Communication Principles of Computer Architecture by M. Murdocca and V. Heuring © 1999 M. Murdocca and V. Heuring Principles of Computer.
Computer Networks TCP/IP Protocol Suite.
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Symmetric Encryption Prof. Ravi Sandhu.
DC DATACOMM John Abbott College JPC Architectures & Protocols M. E. Kabay, PhD, CISSP Director of Education, ICSA President, JINBU Corp Copyright.
The Relational Model and Normalization (3) IS 240 – Database Management Lecture # Prof. M. E. Kabay, PhD, CISSP Norwich University
DC DATACOMM John Abbott College JPC Network Management M. E. Kabay, PhD, CISSP Director of Education, ICSA President, JINBU Corp Copyright © 1998.
DC DATACOMM John Abbott College JPC Basic Concepts M. E. Kabay, PhD, CISSP Director of Education, ICSA President, JINBU Corp Copyright © 1998 JINBU.
DC DATACOMM John Abbott College JPC Data Communications Course Overview M. E. Kabay, PhD, CISSP Director of Education, ICSA President, JINBU Corp.
DC DATACOMM John Abbott College JPC Efficiency of Communications M. E. Kabay, PhD, CISSP Director of Education, ICSA President, JINBU Corp Copyright.
1 Pretty Good Privacy (PGP) Security for Electronic .
Public Key Cryptosystem
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.
Block Cipher Modes of Operation and Stream Ciphers
ECE454/CS594 Computer and Network Security
Gareth Ellis Senior Solutions Consultant Session 5a Key and PIN Management.
Chapter 6 Computer Assisted Audit Tools and Techniques
1 Kerberos Anita Jones November, Kerberos * : Objective Assumed environment Assumed environment –Open distributed environment –Wireless and Ethernetted.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
Network Operations & administration CS 4592 Lecture 15 Instructor: Ibrahim Tariq.
1 Kingdom of Saudi Arabia Prince Norah Bint Abdul Rahman University College of Computer Since and Information System NET201.
A lesson approach © 2011 The McGraw-Hill Companies, Inc. All rights reserved. a lesson approach Microsoft® PowerPoint 2010 © 2011 The McGraw-Hill Companies,
Off-the-Record Communication, or, Why Not To Use PGP
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
CSCI 4550/8556 Computer Networks Comer, Chapter 7: Packets, Frames, And Error Detection.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Chapter 10: Authentication Guide to Computer Network Security.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Characteristics of Communication Systems
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Data and Computer Communications by William Stallings Eighth Edition Digital Data Communications Techniques Digital Data Communications Techniques Click.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
CIS 325: Data Communications1 Chapter Seventeen Network Security.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
FUNDAMENTALS OF NETWORKING
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
1 Example security systems n Kerberos n Secure shell.
Unit 3 Section 6.4: Internet Security
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Controlling Computer-Based Information Systems, Part II
Chapter 8 roadmap 8.1 What is network security?
Lecture 36.
Lecture 36.
Presentation transcript:

DC DATACOMM John Abbott College JPC Datacomm Security M. E. Kabay, PhD, CISSP Director of Education, ICSA President, JINBU Corp Copyright © 1998 JINBU Corp. All rights reserved

DC Datacomm Security l Data Integrity l Sources of Error l Controlling Errors l Other Elements of Security

DC Data Integrity l Integrity refers to correctness and completeness l Switched telephone system has variable quality – Some virtual circuits are silent – Others are noisy--contain random and non- random extraneous and transient signals l Effects of noise – Obliterates differences between 0s and 1s – High-frequency transfers especially susceptible to distortion of signal – Results in data loss l Noise originates in electrical interference – e.g., lightning storms, motors, transmitters

DC Sources of Error Options for handling errors l Check nothing l Error detection with flagging l Error detection with request for retransmission l Forward error correction (FEC) – intelligent receiver – detect and correct certain errors

DC Controlling Errors l Echo Checking l Parity Checking l Cyclical Parity l Hamming Code l Checksums l Cyclical Redundancy Check

DC Controlling Errors Echo Checking l Send back all data to host (transmitter) for comparison with original message l Echoplex data transmission on old terminals sent data to host and then back to display l Expensive: at least doubles transmission time l Effectiveness depends on how errors are detected solely on the host l May introduce false positives where terminal received data OK but return to host had noise l Used for critical applications

DC Controlling Errors Parity Checking l Typically checks every character l Add a parity bit to each 7-bit character l Even parity – 0 if even # of 1s in byte – 1 if odd # of 1s in byte l Odd parity – 0 if odd # of 1s in byte – 1 if even # of 1s in byte l Does not permit correction of the error

DC Controlling Errors Cyclical Parity l Two or more parity bits l Permits detection of more types of error than simple parity check l Can have each parity bit depend on specific bits in byte – E.g., parity bit #1 could check bits 1, 3 & 5 of a 6-bit sequence; – parity bit #2 could check bits 2, 4 & 6 of the 6-bit sequence

DC Controlling Errors Hamming Code l FEC using 4 parity bits per byte l Places parity bits in positions 1, 2, 4 & 8 l Data bits in positions 3, 5, 6, 7, 9, 10 & 11 l Each data bit is part of the parity calculation for two or three parity bits l Can detect all single-bit errors and exactly correct the error l High overhead (4 parity bits for 7 data bits) has kept applications rare

DC Controlling Errors Checksums l Add up the data l Append results to data l After transmission, recalculate checksum l Compare new checksum with transmitted checksum

DC Controlling Errors Cyclical Redundancy Check l Similar to checksum l Uses more complicated arithmetic; e.g., addition, multiplication, division, subtraction l Generates a hash total l Can ensure that almost all errors, including multi-bit errors, will be caught l Widely used – client account numbers – telephone and credit card numbers

DC Other Elements of Security NIST goals of datacomm: message should be l sealed--unmodifiable without authorization l sequenced--numbered to prevent loss or duplication l secret--incomprehensible except to authorized recipient(s) l signed--non-repudiable authentication l stamped--non-repudiable receipt of message

DC Datacomm Security l Secure Transmission Facilities l Passwords l Historical and Statistical Logging l Closed User Groups l Firewalls l Encryption l Confidentiality and Authenticity

DC Secure Transmission Facilities Transmission media have different vulnerabilities l Easiest to tap: wireless & cellular telecomm l Easy: twisted pair, coax l Possible: satellite and terrestrial microwave l Hardest: fibre optic lines

DC Passwords l Security uses I&A: identification and authentication l Identification depends on user ID l Authentication can depend on – what you know; or – what you have; or both – what you are (or how you do stuff) l Commonest form of authentication is password l Other devices include one-time password generator l Call-back devices limit access to known locations

DC Historical and Statistical Logging l Historical: – record all data passing through device – AKA audit trails l Mainframe systems typically log – all login/logout – file opens/closes & which records changed – device requests (printers, tapes….) l Statistical logging – How long user IDs access specific files – Does not keep record-level detail

DC Closed User Groups l Set of user IDs that can access information l Can also define CUGs on VANs such as CompuServe l ICSA has CUGs for clients taking on-line courses

DC Firewalls l Firewall = data filter to examine all inbound and outbound data l Firewall can prevent intruders from gaining access to certain parts (or any) of system l Accept inbound connection only from trusted hosts l Can set up internal firewalls to segregate certain systems from each other; e.g., research computers protected from sales users l Application-level firewalls search data stream for , database access, file transfers l Firewalls susceptible to IP address spoofing

DC Encryption l Scramble data using a key and descramble using a key l Key is a secret data sequence

DC Encryption Symmetrical algorithms; e.g., DES l Problem of key management & distribution l Number of key pairs rises as n 2 CleartextCiphertext

DC Encryption l Asymmetrical algorithms l Keys and algorithms may both be different for encryption and decryption

DC Encryption l Public Key Cryptosystem; e.g., PGP l Generate 2 keys: keep 1 private, make 2 public l Only the other key can decrypt what 1 key encrypts

DC Confidentiality and Authenticity l To keep message secret, encrypt using recipients public key l To prove origin of message, encrypt message using authors private key l Current applications generally create a checksum and encrypt it with private key-- faster than encrypting entire message l See for freeware version of PGP for private use

DC Encryption: DES l Data Encryption Standard – example of symmetric encryption algorithm – especially useful for storing encrypted data Cleartext Key: ENCRYPT Ciphertext Key: DECRYPT Cleartext

DC Encryption: PKC l Public Key Cryptosystem – example of asymmetric encryption – especially good for communications and for digital signatures Cleartext Key: ENCRYPT Ciphertext Key: fu3f93jgf912=kjh#1sdfjdh1&... DECRYPT Cleartext

DC Encryption: PKC (contd) PGP is an example of the PKC l Key generation produces 2 keys l Each can decrypt only the ciphertext produced by the other l One is defined as public l Other is kept as private l Can easily send a message so only the desired recipient can read it: – encrypt using the _______________s _______________ key – decrypt using the _______________s _______________ key

DC Encryption: PKC (contd) l Signing a document using PKC This is the original text. Create message hash Unencrypted hash of msg and encrypt only hash with private key. This is the original text. 8u3ofdjgh djc9d_j3$ Encrypted hash of msg

DC This is the original text. 8u3ofdjgh djc9d_j3$ Encrypted hash of msg Encryption: PKC (contd) l Verifying the signature using PKC Decrypt the hash with sender public key… Unencrypted hash of msg and now create your own hash Newly computed hash of msg... and compare the two hashes SAME = VALID DIGITAL SIGNATURE

DC Communications Encryption l Encrypted messages – ideally all messages should be encrypted – public messages should be signed digitally l Virtual Private Networks – packets destined for remote network are encrypted before being sent to remote system – automatically decrypted upon receipt

DC Homework l Read Chapter 6 of your textbook in detail, adding to your workbook notes as appropriate. l Review and be prepared to define or expand all the terms listed at the end of Chapter 6 of your textbook (no hand-in required) l Answer all the exercises on pages 128 of the textbook using a computer word-processing program or absolutely legible handwriting (hand in after quiz tomorrow morning)