Presentation is loading. Please wait.

Presentation is loading. Please wait.

Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-1 Overview and Introduction.

Similar presentations


Presentation on theme: "Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-1 Overview and Introduction."— Presentation transcript:

1

2 Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-1 Overview and Introduction (Lecture Contents Summary) Network Security Design Fundamentals ET-IDA-082 13.04.2016, v17 Prof. W. Adi

3 Page : 2 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Recommended References Possible Textbooks: 1. Cryptography and Network Security W. Stallings, Printice Hall 2003, ISBN: 0 13 111502 2 W. Stallings, Printice Hall 2003, ISBN: 0 13 111502 2 Or: Or: Network Security Essentials: Applications and Standards Network Security Essentials: Applications and Standards William Stallings, 3rd Edition, Prentice Hall, © 2007, ISBN: 0-13-238033-1 William Stallings, 3rd Edition, Prentice Hall, © 2007, ISBN: 0-13-238033-1 2. Network Security Private communication in a public world Private communication in a public world C. Kaufman, R. Perlman, M. Speciner, Printice-Hall 10th printing 2007, ISBN 0 13 046019 2 C. Kaufman, R. Perlman, M. Speciner, Printice-Hall 10th printing 2007, ISBN 0 13 046019 2 Other reference books: 1. Cryptography & Network Security FOROUZAN, McGraw-Hill 2007, ISBN10: 0073327530, ISBN13: 9780073327532 FOROUZAN, McGraw-Hill 2007, ISBN10: 0073327530, ISBN13: 9780073327532 2. Handbook of Applied Cryptography by Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone by Alfred J. Menezes, Paul C. Van Oorschot, Scott A. VanstoneAlfred J. MenezesPaul C. Van OorschotScott A. VanstoneAlfred J. MenezesPaul C. Van OorschotScott A. Vanstone CRC Press (October 16, 1996) (available free of charge on the WEB) CRC Press (October 16, 1996) (available free of charge on the WEB) Central TU Library

4 Page : 3 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Security of Information and Communication Networks Stamatios V. Kartalopoulos ISBN: 978-0-470-29025-5, Hardcover, 344 pages, April 2009, Wiley-IEEE Press Computer Security and Cryptography Alan G. Konheim ISBN: 978-0-471-94783-7, Hardcover, 544 pages February 2007, Wiley Mobile Communication Systems and Security Man Young Rhee ISBN: 978-0-470-82336-1, Hardcover, 448 pages April 2009, Wiley Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft Markus JakobssonMarkus Jakobsson (Editor), Steven Myers (Editor)Steven Myers ISBN: 978-0-471-78245-2, Hardcover, 700 pages, January 2007, Wiley Other books:

5 Page : 4 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Why Security ? Why Security ? The Story of Security Science The Story of Security Science Traditional Security Systems Overview Traditional Security Systems Overview Modern Security Systems Overview Modern Security Systems Overview Applications Applications Network Security Network Security Outlines This introduction presents essential examples of the main course contents, however with minimum mathematics !

6 Page : 5 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Widespread Expanding very fast unlimited applications Mobile-Commerce etc… 6000 million mobile devices Internet Power Station power line network Why Security ? Open Information World scenario Service node TV Global Information Short-Circuit (AAA Scenario) Anywhere Any time Any device

7 Page : 6 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 2G, 3G Mobile Network Architecture Circuit/ Signaling Gateway 2G/2.5G 2G GSM IN Services Call Agent Feature Server(s) RNC 3G Data + Packet Voice Circuit Switch Circuit Network Packet Network (Internet) Radio Access Control Voice Mobility Manager IP Core Network IP RAN Security threats are spead over the fixed and mobile networks! 4G … 5G

8 Page : 7 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Impacts of Globalization on Information Technology ! Security is still a serious issue in most communication systems, and is a very essential one !! Globalization (Borderless) Unlimited resources Unrestricted resources Easy untraceable access No national boarders/Law? Manageability ? controllability ? Abuse-ability

9 Page : 8 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Two Major Security Tasks Authentication Securely identify an entity Secrecy Keep data safe against illegal users Security tasks require to deploy cryptographic mechanisms to be realized Cryptography: is the science dealing with hiding information and data security questions

10 Page : 9 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 1. Secret Key Cryptography Overview Concepts

11 Page : 10 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Secret Key Cryptography K-open = K-close (Symmetric System) - Open and close using shared secret keys (mostly one shared key) !! - Secret key agreement required !

12 Page : 11 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 SENDER RECEIVER Secret Key Crypto-System : mechanical simulation Message Z Lock Z Key = Z Secret key agreement Key = Z Message

13 Page : 12 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 2. Public-Key Cryptography Scientific Breakthrough 1976

14 Page : 13 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Public-Key Secrecy Systems K-secret K-open Two Major Schemes in Public Key Cryptography: Diffie-Hellman Public Key exchange scheme RSA public Key secrecy system - Open and close with different keys!! - No Secret Key Agreement required

15 Page : 14 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 User A User B Basic Public Key Secrecy System (RSA system1978) (Mechanical simulation: user B gets a secured message from A) Public register Close Kc open ( ) Kc (mod m) Kc M M Kc M Kc.Ko = M Ko= Kc -1 (M Kc ) Ko Ko

16 Page : 15 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 3. Authentication Identification, Signature /Certificates.. - Secret Key Techniques - Public-Key Techniques

17 Page : 16 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 International Mobile Equipment Identity IMEI (non-secured) SIM (secured) Subscriber Identity Module Secured Identity (Authentic Identity)

18 Page : 17 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 4. Security Protocols SSL, IPSEC, KERBEROS, PGP, X509.. Standards, Applications

19 Page : 18 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Example: SSL: Secure Socket Layer “Security Protocols” Server

20 Page : 19 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 “Network Security” Objectives (course objectives summary) The aims of this course is to give a basic understanding of the design fundamentals and tools used in modern network security systems mainly includes: Course strategy: less proofs, more practical design hints! Review Fundamentals of Cryptology Review Fundamentals of Cryptology Network security primitives, Certificates, Ciphering, Integrity Network security primitives, Certificates, Ciphering, Integrity Network security Standards, SSL, IPSEC, PGP.. Network security Standards, SSL, IPSEC, PGP.. Network security applications. E-Money, E-Vote.. Network security applications. E-Money, E-Vote..


Download ppt "Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-1 Overview and Introduction."

Similar presentations


Ads by Google