Presentation is loading. Please wait.

Presentation is loading. Please wait.

Overview and Introduction (Lecture Contents Summary)

Similar presentations


Presentation on theme: "Overview and Introduction (Lecture Contents Summary)"— Presentation transcript:

1 Overview and Introduction (Lecture Contents Summary)
Network Security Design Fundamentals ET-IDA-082 Lecture-1 Overview and Introduction (Lecture Contents Summary) , v18 Prof. W. Adi

2 Recommended References
Possible Textbooks: 1. Cryptography and Network Security W. Stallings, Printice Hall 2003, ISBN: Or: Network Security Essentials: Applications and Standards William Stallings, 3rd Edition, Prentice Hall, © 2007, ISBN: 2. Network Security Private communication in a public world C. Kaufman, R. Perlman, M. Speciner, Printice-Hall 10th printing 2007, ISBN Other reference books: 1. Cryptography & Network Security FOROUZAN, McGraw-Hill 2007, ISBN10: , ISBN13: 2. Handbook of Applied Cryptography by Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone CRC Press (October 16, 1996) (available free of charge on the WEB) Central TU Library

3 Other books: Security of Information and Communication Networks
Stamatios V. Kartalopoulos ISBN: , Hardcover, 344 pages, April 2009, Wiley-IEEE Press Computer Security and Cryptography Alan G. Konheim ISBN: , Hardcover, 544 pages February 2007, Wiley Mobile Communication Systems and Security Man Young Rhee ISBN: , Hardcover, 448 pages April 2009, Wiley Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft Markus Jakobsson (Editor), Steven Myers (Editor) ISBN: , Hardcover, 700 pages, January 2007, Wiley

4 Outlines Why Security ? The Story of Security Science
This introduction presents essential examples of the main course contents, however with minimum mathematics ! Why Security ? The Story of Security Science Traditional Security Systems Overview Modern Security Systems Overview Applications Network Security

5 Open Information World scenario
Why Security ? Open Information World scenario Widespread Expanding very fast unlimited applications Mobile-Commerce etc… 6000 Million mobile devices Light Heating Kitchen Garage Door Gates ... Remote Control Car power - line CAN-Bus TV Global Information Short-Circuit (AAA Scenario) IoT Internet Of Things Power Station power line network Internet Wireless Network Anywhere Any time Any device

6 Evolving 2G, 3G .. 5G Mobile Network Architecture
Circuit Network Circuit/ Signaling Gateway Mobility Manager Feature Server(s) Circuit Switch IN Services RNC Call Agent Voice Data + Packet Voice IP Core Network Radio Access Control Packet Network (Internet) 4G IP RAN Security threats are spead over the fixed and mobile networks! 3G … 5G 2G GSM 2G/2.5G

7 Impacts of Globalization on Information Technology !
Globalization (Borderless) Unlimited resources Unrestricted resources Easy untraceable access No national boarders/Law? Manageability ? controllability ? Abuse-ability Security is still a serious issue in most communication systems, and is a very essential one !!

8 Two Major Security Tasks
Authentication Securely identify an entity Secrecy Keep data safe against illegal users Security tasks require to deploy cryptographic mechanisms to be realized Cryptography: is the science dealing with hiding information and data security questions

9 1. Secret Key Cryptography
Overview Concepts

10 Secret Key Cryptography
(Symmetric System) K-open = K-close - Open and close using shared secret keys (mostly one shared key) !! - Secret key agreement required !

11 Secret Key Crypto-System : mechanical simulation
SENDER RECEIVER Key = Z Secret key agreement Key = Z Z Lock Message Message Z

12 2. Public-Key Cryptography Scientific Breakthrough 1976

13 Public-Key Secrecy Systems
K-open K-secret - Open and close with different keys!! - No Secret Key Agreement required Two Major Schemes in Public Key Cryptography: Diffie-Hellman Public Key exchange scheme RSA public Key secrecy system

14 Basic Public Key Secrecy System (RSA system1978)
(Mechanical simulation: user B gets a secured message from A) User A User B Public register Ko= Kc-1 Close Kc open ( )Kc (mod m) Kc M MKc.Ko = M (MKc)Ko Ko MKc

15 Identification, Signature /Certificates..
3. Authentication Identification, Signature /Certificates.. Secret Key Techniques Public-Key Techniques

16 International Mobile Equipment Identity Subscriber Identity Module
Secured Identity (Authentic Identity) International Mobile Equipment Identity IMEI (non-secured) SIM (secured) Subscriber Identity Module

17 4. Network Security Protocols
SSL, IPSEC, KERBEROS, PGP, X509 .. Standards, Applications

18 Example: SSL: Secure Socket Layer “Security Protocols”
Server

19 “Network Security” Objectives
(course objectives summary) The aims of this course is to give a basic understanding of the design fundamentals and tools used in modern network security systems mainly includes: Review Fundamentals of Cryptology (4-5 sessions) Network security primitives, Certificates, Ciphering, Integrity Network security Standards, SSL, IPSEC, PGP .. Network security applications. E-Money, E-Vote .. Course strategy: less proofs, more practical design hints!


Download ppt "Overview and Introduction (Lecture Contents Summary)"

Similar presentations


Ads by Google