Security 0 The Secure Environment. Security 1 The Secure Environment Security goals (C.I.A.) and threats.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
1 Security Chapter The security environment 9.2 Basics of cryptography 9.3 User authentication 9.4 Attacks from inside the system 9.5 Attacks from.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Attacks on Digital Signature Algorithm: RSA
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
1 Pertemuan 23 Sistem Keamanan Matakuliah: T0316/sistem Operasi Tahun: 2005 Versi/Revisi: 5.
EEC-484/584 Computer Networks Lecture 16 Wenbing Zhao
1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.
Chapter 9 Security Authentication Insider Attacks Exploiting Code Bugs.
EEC-484/584 Computer Networks Lecture 16 Wenbing Zhao
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Avishai Wool lecture Introduction to Systems Programming Lecture 13 Security.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Chapter 9 Security Environment Basics of Cryptography Protection Mechanisms Tanenbaum, Modern Operating Systems 3 e, (c) 2008 Prentice-Hall,
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Network Security Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
CS110: Computers and the Internet Encryption and Certificates.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
1 Security Chapter The security environment 9.2 Basics of cryptography 9.3 User authentication 9.4 Attacks from inside the system 9.5 Attacks from.
Cryptography, Authentication and Digital Signatures
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Security Chapter 9 Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Outline Objective: –Access Control Mechanisms. The Security Environment Threats Security goals and threats.
Lecture 2: Introduction to Cryptography
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic.
Encryption CS110: Computer Science and the Internet.
Intro to Cryptography Lesson Introduction
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
6.033 Quiz3 Review Spring How can we achieve security? Authenticate agent’s identity Verify the integrity of the request Check the agent’s authorization.
Software Security Seminar - 1 Chapter 2. Protocol Building Blocks 발표자 : 최두호 Applied Cryptography.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Chapter 9 Security 9.1 The security environment
Introduction to Symmetric-key and Public-key Cryptography
Chapter 3 - Public-Key Cryptography & Authentication
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Security 0 The Secure Environment

Security 1 The Secure Environment Security goals (C.I.A.) and threats

Security 2 Common Categories 1.Casual prying by nontechnical users 2.Snooping by insiders 3.Determined attempt to make money 4.Commercial or military espionage 5.Others (such as cyber wars) Intruders

Security 3 Basics of Cryptography

Security 4 Network Is NOT Secure A B C D ABC

Security 5 A B C D Encrypt Your Information

Security 6 Data Encryption Process Encryption Decryption Plaintext Ciphertext Network KEY

Security 7 (a) Conventional two-way Cryptography Encryption Decryption Plaintext Ciphertext Network KEY Encryption Decryption Plaintext Ciphertext Network (b) Public Key Cryptography KEY1KEY2 Two Types of Cryptography

Security 8 Conventional two-way Cryptography Encryption Decryption Plaintext Ciphertext Network KEY treaty impossible wuhdwb lpsrvvleoh treaty impossible abcdefghijklmnopqrstuvwxyz defghijklmnopqrstuvwxyzabc Encryption: c i =E(p i ) = p i + 3 Decryption: p i =D(c i ) = c i - 3 KEY: Caesar Cipher

Security 9 Conventional two-way Cryptography Substitution Cipher Caesar Cipher Playfair Cipher Etc.

Security 10 Conventional two-way Cryptography: Problems A B C D

Security 11 Public Key Cryptography Encryption Decryption Plaintext Ciphertext Network KEY1KEY2 Public Private

Security 12 Public Key Cryptography: Advantages A B C D Private key A Private key B Private key D Private key C Public key A Public key B Public key C Public key D

Security 13 PKI: Certification Authority What is a certificate? Why do we need Certification Authorities (CA) or trusted third party? A certificate is a digitally signed statement by a CA that provides independent confirmation of an attribute claimed by a person proffering a digital signature. More formally, a certificate is a computer-based record which: (1) identifies the CA issuing it, (2) names, identifies, or describes an attribute of the subscriber, (3) contains the subscriber's public key, and (4) is digitally signed by the CA issuing it.

Security 14 Trapdoor function Public Key Cryptography: Some Roads Are One-Way Easy Difficulty N5N5 N 1/5 Prime1 * Prime2 = Composite Composite = Prime1 * Prime2 Trapdoor characteristics: (1) It is easy to compute f(x) from x. (2) Computation of x from f(x) is likely to be intractable.

Security 15 An Example : Encryption E B (p) D B (E B (p)) = p Network User AUser B A encrypts message p using B’s public key B decrypts the ciphertext using its own private key

Security 16 Another Example : Digital Signature E B (D A (p)) E A (D B (E B (D A (p)))) = E A (D A (p)) = p Network User A User B A signs message p using its own private key and encrypts it using B’s public key B decrypts the ciphertext using its own private key and verifies it using A’s public key

Security 17 Hash functions ………. ……….. ………. ……… Hash Message Digest The basic requirements for a cryptographic hash function H(x) are as follows. The input can be of any length. The output has a fixed length. H(x) is relatively easy to compute for any given x. H(x) is one-way. H(x) is collision-free.

Security 18 More on Digital Signature ………. ……….. ………. ……… Hash Message Digest Signature Sign (decrypt) Using Private Key ………. ……….. Signature Append

Security 19 More on Digital Signature Hash Message Digest Verify (Encrypt operation) Using Public Key ………. ……….. Signature Message Digest

Security 20 User Authentication

Security 21 Basic Principles. Authentication must identify: 1.Something the user knows 2.Something the user has 3.Something the user is This is done before user can use the system User Authentication

Security 22 (a) A successful login (b) Login rejected after name entered (c) Login rejected after name and password typed Authentication Using Passwords Note: be careful when failed several times.

Security 23 Authentication Using Passwords How a cracker broke into LBL (source: A.S.Tanenbaum “Modern Operating System” course materials) a U.S. Dept. of Energy research lab

Security 24 Login Spoofing % Login: (a) Correct login screen (b) Phony login screen

Security 25 Authentication Using Passwords The use of salt to defeat precomputation of encrypted passwords Salt Password,,,,

Security 26 Authentication Using a Physical Object Magnetic cards magnetic stripe cards chip cards: stored value cards, smart cards

Security 27 Authentication Using Biometrics A device for measuring finger length.

Security 28 Countermeasures Limiting times when someone can log in Automatic callback at number prespecified Limited number of login tries A database of all logins Simple login name/password as a trap security personnel notified when attacker bites

Security 29 Secure Communications Over Insecure Channels R. C. Merkle’s Puzzle “secure Communications over Insecure Channels” Communications of the ACM, 1978, Vol. 21, No. 4.

Security 30 One-way Hash Chain and TESLA Adrian Perrig, Ran Canetti, Dawn Song, and J. D. Tygar. Efficient and secure source authentication for multicast. In Network and Distributed System Security Symposium, NDSS '01, February 2001.