Download presentation
Presentation is loading. Please wait.
Published byΔιόδωρος Αθανασιάδης Modified over 5 years ago
1
Overview and Introduction (Lecture Contents Summary)
Network Security Design Fundamentals ET-IDA-082 Lecture-1 Overview and Introduction (Lecture Contents Summary) , v18 Prof. W. Adi
2
Recommended References
Possible Textbooks: 1. Cryptography and Network Security W. Stallings, Printice Hall 2003, ISBN: Or: Network Security Essentials: Applications and Standards William Stallings, 3rd Edition, Prentice Hall, © 2007, ISBN: 2. Network Security Private communication in a public world C. Kaufman, R. Perlman, M. Speciner, Printice-Hall 10th printing 2007, ISBN Other reference books: 1. Cryptography & Network Security FOROUZAN, McGraw-Hill 2007, ISBN10: , ISBN13: 2. Handbook of Applied Cryptography by Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone CRC Press (October 16, 1996) (available free of charge on the WEB) Central TU Library
3
Other books: Security of Information and Communication Networks
Stamatios V. Kartalopoulos ISBN: , Hardcover, 344 pages, April 2009, Wiley-IEEE Press Computer Security and Cryptography Alan G. Konheim ISBN: , Hardcover, 544 pages February 2007, Wiley Mobile Communication Systems and Security Man Young Rhee ISBN: , Hardcover, 448 pages April 2009, Wiley Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft Markus Jakobsson (Editor), Steven Myers (Editor) ISBN: , Hardcover, 700 pages, January 2007, Wiley
4
Outlines Why Security ? The Story of Security Science
This introduction presents essential examples of the main course contents, however with minimum mathematics ! Why Security ? The Story of Security Science Traditional Security Systems Overview Modern Security Systems Overview Applications Network Security
5
Open Information World scenario
Why Security ? Open Information World scenario Widespread Expanding very fast unlimited applications Mobile-Commerce etc… 6000 Million mobile devices Light Heating Kitchen Garage Door Gates ... Remote Control Car power - line CAN-Bus TV Global Information Short-Circuit (AAA Scenario) IoT Internet Of Things Power Station power line network Internet Wireless Network Anywhere Any time Any device
6
Evolving 2G, 3G .. 5G Mobile Network Architecture
Circuit Network Circuit/ Signaling Gateway Mobility Manager Feature Server(s) Circuit Switch IN Services RNC Call Agent Voice Data + Packet Voice IP Core Network Radio Access Control Packet Network (Internet) 4G IP RAN Security threats are spead over the fixed and mobile networks! 3G … 5G 2G GSM 2G/2.5G
7
Impacts of Globalization on Information Technology !
Globalization (Borderless) Unlimited resources Unrestricted resources Easy untraceable access No national boarders/Law? Manageability ? controllability ? Abuse-ability Security is still a serious issue in most communication systems, and is a very essential one !!
8
Two Major Security Tasks
Authentication Securely identify an entity Secrecy Keep data safe against illegal users Security tasks require to deploy cryptographic mechanisms to be realized Cryptography: is the science dealing with hiding information and data security questions
9
1. Secret Key Cryptography
Overview Concepts
10
Secret Key Cryptography
(Symmetric System) K-open = K-close - Open and close using shared secret keys (mostly one shared key) !! - Secret key agreement required !
11
Secret Key Crypto-System : mechanical simulation
SENDER RECEIVER Key = Z Secret key agreement Key = Z Z Lock Message Message Z
12
2. Public-Key Cryptography Scientific Breakthrough 1976
13
Public-Key Secrecy Systems
K-open K-secret - Open and close with different keys!! - No Secret Key Agreement required Two Major Schemes in Public Key Cryptography: Diffie-Hellman Public Key exchange scheme RSA public Key secrecy system
14
Basic Public Key Secrecy System (RSA system1978)
(Mechanical simulation: user B gets a secured message from A) User A User B Public register Ko= Kc-1 Close Kc open ( )Kc (mod m) Kc M MKc.Ko = M (MKc)Ko Ko MKc
15
Identification, Signature /Certificates..
3. Authentication Identification, Signature /Certificates.. Secret Key Techniques Public-Key Techniques
16
International Mobile Equipment Identity Subscriber Identity Module
Secured Identity (Authentic Identity) International Mobile Equipment Identity IMEI (non-secured) SIM (secured) Subscriber Identity Module
17
4. Network Security Protocols
SSL, IPSEC, KERBEROS, PGP, X509 .. Standards, Applications
18
Example: SSL: Secure Socket Layer “Security Protocols”
Server
19
“Network Security” Objectives
(course objectives summary) The aims of this course is to give a basic understanding of the design fundamentals and tools used in modern network security systems mainly includes: Review Fundamentals of Cryptology (4-5 sessions) Network security primitives, Certificates, Ciphering, Integrity Network security Standards, SSL, IPSEC, PGP .. Network security applications. E-Money, E-Vote .. Course strategy: less proofs, more practical design hints!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.