Download presentation
Presentation is loading. Please wait.
Published byJaden McCormack Modified over 11 years ago
1
Technical Seminar Presentation 2004 GOURAV PODDAR IT200147004 [1] DATA SECURITY IN X.25 NETWORKS Advisor: Mr. Anisur Rahman
2
Technical Seminar Presentation 2004 GOURAV PODDAR IT200147004 [2] DATA SECURITY IN X.25 NETWORKS INTRODUCTION X.25 : An ITU-T protocol for WAN Communication. User to Network Interfacing (UNI); DTE – DCE Interface. Many channels share one physical connection. Security mechanism: Data Encryption for secrecy Data & Entity Authentication for preserving Data Integrity
3
Technical Seminar Presentation 2004 GOURAV PODDAR IT200147004 [3] DATA SECURITY IN X.25 NETWORKS X.25 Network Devices DTE – Data Terminal equipment DCE – Data Circuit-terminating Equipment PSE – Packet Switching Exchange PAD – Packet Assembler / Disassembler
4
Technical Seminar Presentation 2004 GOURAV PODDAR IT200147004 [4] DATA SECURITY IN X.25 NETWORKS X.25 Network Device Operation
5
Technical Seminar Presentation 2004 GOURAV PODDAR IT200147004 [5] DATA SECURITY IN X.25 NETWORKS Virtual Circuits Virtual Call Two Types of Virtual Circuits: Switched virtual circuit (SVC): Phone call Permanent virtual circuit (PVC): Leased lines Up to 4095 VCs on one X.25 interface
6
Technical Seminar Presentation 2004 GOURAV PODDAR IT200147004 [6] DATA SECURITY IN X.25 NETWORKS X.25 Protocol Suite PLP – Packet Layer Protocol LAPB – Link Access Procedure – Balanced X.21bis Protocol
7
Technical Seminar Presentation 2004 GOURAV PODDAR IT200147004 [7] DATA SECURITY IN X.25 NETWORKS Threats to Data Security in X.25 Passive Wiretap : Tapping into the carrier medium and reading the data. Active Interference : Modification of Data during transmission.
8
Technical Seminar Presentation 2004 GOURAV PODDAR IT200147004 [8] DATA SECURITY IN X.25 NETWORKS Security Requirements Operational Secure Key Management Approval
9
Technical Seminar Presentation 2004 GOURAV PODDAR IT200147004 [9] DATA SECURITY IN X.25 NETWORKS X.25 Security Problem The Key Management Problem General Layer 6 and 7 Layer 3
10
Technical Seminar Presentation 2004 GOURAV PODDAR IT200147004 [10] DATA SECURITY IN X.25 NETWORKS Basis of Solution Unit Unique RSA Keys Key Encrypting Keys (KEKs) Data Encrypting Keys (DEKs)
11
Technical Seminar Presentation 2004 GOURAV PODDAR IT200147004 [11] DATA SECURITY IN X.25 NETWORKS Fast RSA Processing Completely automated key management across the network Relies on RSA for the secure mechanisms Reliant on RSA co-processor in each crypto unit Power to perform a 512-bit RSA decryption under a second
12
Technical Seminar Presentation 2004 GOURAV PODDAR IT200147004 [12] DATA SECURITY IN X.25 NETWORKS CONCLUSION Developed to overcome the problems inherent in transmitting the data over low quality copper wires. Ensured reliable transmission of data over WAN with supported speed of up-to 56 Kbps. Added overhead and processing imposed on the transmission to achieve high level of reliability was a drawback. But still remains cost effective and viable alternative for low speed connectivity among many locations.
13
Technical Seminar Presentation 2004 GOURAV PODDAR IT200147004 [13] DATA SECURITY IN X.25 NETWORKS THANK YOU !
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.