Lecture Topics: 12/06 SSL Final Exam HW 7 & 8 Important concepts in 410 Other references Evaluations.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Cryptography and Network Security
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Mar 19, 2002Mårten Trolin1 This lecture On the assignment Certificates and key management SSL/TLS –Introduction –Phases –Commands.
CMSC 414 Computer (and Network) Security Lecture 26 Jonathan Katz.
Principles of Information Security, 2nd edition1 Cryptography.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
CSCD 433/533 Advanced Computer Networks Lecture 1 Course Overview Fall 2011.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Internet and Intranet Protocols and Applications Lecture 0: Administrivia January 23, 2002 Joseph Conron Computer Science Department New York University.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Cryptography 101 Frank Hecker
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Jim McLeod MyDBA  SQL Server Performance Tuning Consultant with MyDBA  Microsoft Certified Trainer with SQLskills Australia 
Masud Hasan Secue VS Hushmail Project 2.
Network Security. Information secrecy-only specified parties know the information exchanged. Provided by criptography. Information integrity-the information.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Types of Electronic Infection
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
Welcome! CSI 4118: Computer Networks and Protocols (3,0,0) Professor: Dr. Robert L. Probert Office: SITE 5098 Phone: x6709
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
© Uppsala University, IT Dept. Computer Networks I / DT014/1TT821 Computer Networks I Dr. Edith C.-H. Ngai Department of Information Technology.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Security March 9, Security What is security?  Techniques that control access to use a shared resource  Uses of shared resource must be authorized.
1 Kerberos n Part of project Athena (MIT). n Trusted 3rd party authentication scheme. n Assumes that hosts are not trustworthy. n Requires that each client.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
1 Thuy, Le Huu | Pentalog VN Web Services Security.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Course web page: ECE 646 Cryptography and Computer Network Security ECE web page  Courses  Course web pages  ECE 646.
Lecture Topics: 11/29 Cryptography –symmetric key (secret key) –public/private key –digital signatures.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
KERBEROS SYSTEM Kumar Madugula.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
PRESENTATION ON SECURE SOCKET LAYER (SSL) BY: ARZOO THAKUR M.E. C.S.E (REGULAR) BATCH
1 Internet data security (HTTPS and SSL) Ruiwu Chen.
Secure HTTP (HTTPS) Pat Morin COMP 2405.
Operating Systems Dr. Sadi Seker.
The Secure Sockets Layer (SSL) Protocol
Kerberos Part of project Athena (MIT).
Lecture 10: Network Security.
Intro. to Computer Network
Presentation transcript:

Lecture Topics: 12/06 SSL Final Exam HW 7 & 8 Important concepts in 410 Other references Evaluations

SSL Question Why is the nonce sent as clear text? –doesn’t having the plaintext and the ciphertext make finding the symmetric key easier? For modern encryption algorithms, having the plaintext and the ciphertext doesn’t help you much Avoid doing public key cryptography when you can because it’s so expensive

Simplified SSL Some additional information is transferred with each message, but this simplified version contains all of the necessary details Nonce 1 [Amazon.com, AmazonPubKey] VerisignPubKey 2 [SecretSessionKey] AmazonPubKey 3 [Nonce] SecretSessionKey 4 [Credit Card Number] SecretSessionKey 5 Establishing a secure connection with SSL You

Explanation of Simplified SSL 1.The client sends the server a nonce to prevent a replay attack, and the server stores this nonce 2.The server sends the client a certificate, which contains it’s name and public key. This certificate has been digitally signed by Verisign (a trusted third party) 3.The client chooses a secret (symmetric) session key to use for this connection. It encrypts this key with the server’s public key and sends it to the server. 4.The server decrypts the session key using it’s private key. It sends the original nonce back to the client encrypted with the session key. The client now has verified that it is actually talking with the correct server, because only the correct server can decrypt the session key sent in step 3. 5.Any remaining secret communication between the client and server can use the session key. There is much more to SSL than what is presented here. There are a vast number of options and features.

Final Exam Wednesday Dec 13 th at 8:30-10:20 in Thomson 125 Mostly over OS topics (85%) –see the review sheet for what you need to know –at least twice as long as the midterm –more difficult than the midterm Exam based on topics covered in lecture Review sessions (based on your questions) –Sunday Dec 10 th 5:00-7:30 in Johnson 223 no Seahawks game –Monday Dec 11 th 5:00-7:30 in Johnson 119 Office hours: –Monday no office hours –Tuesday Dec 12 th 12:30-4:30 –send me mail if you have questions

Johnson

HW 7 & HW 8 HW 7 graded out of 95 –mean = 81 –median = 90 HW 8 graded out of 70 –mean = 60 –median = 61

Grading Each homework counts 5%, drop one Programming assignments took more time –best grade out of HW #6, #7, or #9 will count 8% –worst grade of any other homework (after drop) will count 2% –(only if your grade is better under this scheme) Will a grade report to everyone by Friday (including everything but HW 9) HW 9 will be available in my office hours next Tuesday

Key Concepts Make the common case fast and the uncommon case correct Caches (common case has locality) –L1 & L2 caches –TLB –File cache –Memory a cache for virtual memory –DNS caches common translations

Key Concepts Any computer science problem can be solved by adding a layer of indirection Virtual addresses Handles (OS must control access) –file handles –process handles Network file servers (e.g. NFS) –looks like a local disk but it’s across a network DNS: you want to type but IP needs

Additional Resources Architecture –P&H “Computer Organization & Design” is the standard undergrad book –H&P “Computer Architecture: A Quantitative Approach, Second Edition” is the standard graduate book more advanced topics Operating Systems –“Inside Windows NT” or “Inside Windows 2000” –“The Design of the UNIX Operating System” –“Design and Implementation of the 4.4 BSD Operating System”

Additional Resources Networks –“TCP/IP Illustrated Volume 1” Richard Stevens –“Computer Networks: A Systems Approach 2 nd Edition” Peterson and Davie don’t get the first edition Cryptography –“Applied Cryptography” Bruce Schneier –“Cryptography : Theory and Practice (Discrete Mathematics and Its Applications)” Douglas R. Stinson Miscellaneous –“Mythical Man-Month” Fred Brooks –“Programming Pearls” Jon Bentley Perl –“Learning Perl” Schwartz and Christiansen –“Programming Perl” Larry Wall

Thank You I’ve had a tremendous amount of time teaching this class –a lot of work but worth it We’ve covered a lot of topics in a short amount of time –we’ve covered most of what is important –hopefully, you’ve learned something Continue to me questions about operating systems