Network Security. Information secrecy-only specified parties know the information exchanged. Provided by criptography. Information integrity-the information.

Slides:



Advertisements
Similar presentations
Virtual Private Networks
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Chapter 5 Network Security Protocols in Practice Part I
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
Guide to Network Defense and Countermeasures Second Edition
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
Chapter 29 Internet Security
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Chapter 8 Network Security 4/17/2017
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Network Security Chapter 8.
Network Security Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
How HTTPS Works J. David Giese. Hyper Text Transfer Protocol BrowserHTTP Server GET / HTTP/1.1 HOST: edge-effect.github.io HEADERS BODY HTTP/ OK.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
1 Lecture #22: Network Security. 2 A classic lesson The chain is only as strong as its weakest link!
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Secure Socket Layer (SSL)
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
ICT 6621 : Advanced NetworkingKhaled Mahbub, IICT, BUET, 2008 Lecture 12 Network Security (2)
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Ch 8. Security in computer networks Myungchul Kim
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Network Security Understand principles of network security:
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 14 Network Security: Firewalls and VPNs.
Network Security7-1 Today r Reminder Ch7 HW due Wed r Finish Chapter 7 (Security) r Start Chapter 8 (Network Management)
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Network Security Chapter 8 12/13/ Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Computer and Network Security - Message Digests, Kerberos, PKI –
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
UNIT-VIII Syllabus Application Layer – Network Security, Domain name system, SNMP, Electronic Mail; the World WEB, Multi Media.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
Network Security Chapter 8 Institute of Information Science and Technology. Chengdu University YiYong 2008 年 2 月 25 日.
Network Security.
Chapter 8 Network Security.
Chapter 8 Network Security.
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
The Secure Sockets Layer (SSL) Protocol
Public-Key, Digital Signatures, Management, Security
Network Security Chapter 8.
Presentation transcript:

Network Security

Information secrecy-only specified parties know the information exchanged. Provided by criptography. Information integrity-the information is unaltered received by the specified party. Provided by digital signatures. Authenticaton-user is communicating with the user with whom he/she thinks is communicating.

Cryptography The encryption model (for a symmetric-key cipher).

Symmetric-Key Algorithms Transmitting and receiving users have the same key that they agreed on somehow. Plain text, P, is encrypted by the transmitting user based on key, K, and becomes E K (P). Receiver is decrypting E K (P) using the same key, and obtains plaintext P=D K (E K (P)). Function P is impossible (or very hard) to guess from E K (P). DES – Data Encryption Standard –Key has 64 bits AES – Advanced Encryption Standard –Key has 128 bits

Public-Key Algorithms Each user has a public and a private key. Plain text, P, is encrypted by the transmitting user based on the public key of the receiving user, Bpub, and becomes E Bpub (P). Receiving user is decrypting the message using its private key Bpri and obtains plaintext P=D Bpri (E Bpub (P)).

Public-Key Algorithms RSA (Rivest,Shamir, Adleman) 1.Choose two large prime numbers p and q (typically 1024 bits) 2.Compute n=pxq and z=(p-1)x(q-1) 3.Choose a number relatively prime to z and call it d. 4.Find e such that exd=1mod z 5.Public key is (n,e), private key is (n,d) 6.Encryption is C=P e mod n 7.Decryption is P=C d mod n

Learning Shared Keys Encryption using a symmetric shared key is much faster. Users can exchange the shared key, either by using public keys or key distribution centers (KDC). Transmitting user encrypts the shared-key using public key of the receiving user. Receiving user decrypts the message and learns the shared key. KDC has a key for each user. User A sends encrypted request that it wants to communicate with user B. KDC sends the shared key, S, and encrypted pair E B (A,S).

Digital Signatures Ensure to the receiving party that it is receive the exact information that was sent my the transmitting party. For example, transmitting user adds to the plaintext the signature which is the encrypted plaintext using its private key. Receiving user decrypts the signature using the public key of the transmitting user, and compares with the plaintext.

Public-Key Signatures Digital signatures using public-key cryptography.,P,P,P,P,P),P) P

Digital Signatures Using Message Digests (MD5,SHA-1) Forming the signature by encrypting the entire plaintext is time consuming, and incurs an inefficient communication. For this reason, a message digest is derived from the plaintext (message). Message digest is a function of the plaintext such that it is computationaly infeasible to find two messages with the same message digest (hash). Singature is encrypted hash. Since the message digest is much shorter than the message itself, the signature takes less time to compute and less bandwidth to transfer.

Authentication Protocol (Shared Key) User A sends to user B “I am A”, and nonce R A. B sends a nonce R B and HASH(R A,R B,A,B,S) to A. A sends HASH(R A,R B,S) and sends it to B

Authentication Protocol (Public Key) User A sends to user B “I am A”, and R A. B sends a nonce R B and E Bpriv (R A,R B,A,B) to A. A decrypts encrypted part of the message to check if it is B and sends encrypted nonces using its private key E Apriv (R A,R B ) and sends it to B. B decrypts encrypted message and checks if this is really A.

Management of Public Keys How users learn real public keys of other users. Certificate comprises the public key and basic data about some user, and is signed by the certificate authority (CA). X.509 defines certificate’s format. Public key infrastructures comprises CAs that are organized hierarchicaly.

Certificates A possible certificate and its signed hash. + Alg for hashing, Certificate Authority, Time validity

Public-Key Infrastructures (a) A hierarchical PKI. (b) A chain of certificates.

Network Security in Practice IPsec Firewalls Virtual Private Networks (VPNs) security (Pretty Good Privacy-PGP) DNS security WWW security (Secure Sockets Layer-SSL)

IPsec based on Authentication Header Protocol The IPsec authentication header in transport mode for IPv4. Determines security association with IP source address and security protocol Using encrypted message disgest based on a shared key

IPsec based on Encapsulation Security Payload Protocol (a) ESP in transport mode. (b) ESP in tunnel mode.

Firewalls Two types: packet filtering, and application gateways. Packet filtering is done based on IP addresses, TCP or UDP ports, ICMP message type, TCP SYN or ACK bits (first segment has ACK=0 so this prevents outside users to open TCP connections with inside servers). Application gateways may restrict certain applications to certain users.

Virtual Private Networks (a) A leased-line private network. (b) A virtual private network.

Security PGP – Pretty Good Privacy PGP in operation for sending a message. International Data Encryption Alg

Secure DNS An example RRSet for bob.com. The KEY record is Bob's public key. The SIG record is the top-level com server's signed hash of A and KEY records to verify their authenticity.

SSL A simplified version of the SSL connection establishment subprotocol.