Download presentation
Presentation is loading. Please wait.
2
Conclusion 1 Conclusion
3
Conclusion 2 Course Summary Crypto o Basics, symmetric key, public key, hash functions and other topics, cryptanalysis Access Control o Authentication, authorization, firewalls, IDS Protocols o Simplified authentication protocols o Real-World protocols Software o Flaws, malware, SRE, development, trusted OS
4
Conclusion 3 Crypto Basics Terminology Classic ciphers o Simple substitution o Double transposition o Codebook o One-time pad Basic cryptanalysis
5
Conclusion 4 Symmetric Key Stream ciphers o A5/1 o RC4 Block ciphers o DES o AES, TEA, etc. o Modes of operation Data integrity (MAC)
6
Conclusion 5 Public Key Knapsack (insecure) RSA Diffie-Hellman Elliptic curve crypto (ECC) Digital signatures and non-repudiation PKI
7
Conclusion 6 Hashing and Other Birthday problem Tiger Hash HMAC Clever uses (online bids, spam reduction, …) Other topics o Secret sharing o Random numbers o Information hiding (stego, watermarking)
8
Conclusion 7 Advanced Cryptanalysis Enigma RC4 (as used in WEP) Linear and differential cryptanalysis Knapsack attack (lattice reduction) RSA timing attacks
9
Conclusion 8 Authentication Passwords o Verification and storage (salt, etc.) o Cracking (math) Biometrics o Fingerprint, hand geometry, iris scan, etc. o Error rates Two-factor, single sign on, Web cookies
10
Conclusion 9 Authorization History/system certification ACLs and capabilities Multilevel security (MLS) o BLP, Biba, compartments, covert channel, inference control CAPTCHA Firewalls IDS
11
Conclusion 10 Simple Protocols Authentication o Using symmetric key o Using public key o Session key o Perfect forward secrecy (PFS) o Timestamps Zero knowledge proof (Fiat-Shamir)
12
Conclusion 11 Real-World Protocols SSH SSL IPSec o IKE o ESP/AH, tunnel/transport modes, … Kerberos Wireless: WEP & GSM
13
Conclusion 12 Software Flaws and Malware Flaws o Buffer overflow o Incomplete mediation, race condition, etc. Malware o Brain, Morris Worm, Code Red, Slammer o Malware detection o Future of malware, botnets, etc. Other software-based attacks o Salami, linearization, etc.
14
Conclusion 13 Insecurity in Software Software reverse engineering (SRE) o Software protection Digital rights management (DRM) Software development o Open vs closed source o Finding flaws (do the math)
15
Conclusion 14 Operating Systems OS security functions o Separation o Memory protection, access control Trusted OS o MAC, DAC, trusted path, TCB, etc. NGSCB o Technical issues o Criticisms
16
Conclusion 15 Crystal Ball Cryptography o Well-established field o Don’t expect major changes o But some systems will be broken o ECC is a major “growth” area o Quantum crypto may prove worthwhile… o …but for now it’s mostly (all?) hype
17
Conclusion 16 Crystal Ball Authentication o Passwords will continue to be a problem o Biometrics should become more widely used o Smartcard/tokens will be used more Authorization o ACLs, etc., well-established areas o CAPTCHA’s interesting new topic o IDS is a very hot topic
18
Conclusion 17 Crystal Ball Protocols are challenging Difficult to get protocols right Protocol development often haphazard o “Kerckhoffs’ Principle” for protocols? o Would it help? Protocols will continue to be a source of subtle problem
19
Conclusion 18 Crystal Ball Software is a huge security problem today o Buffer overflows are on the decline… o …but race condition attacks might increase Virus writers are getting smarter o Botnets o Polymorphic, metamorphic, sophisticated attacks, … o Future of malware detection? Malware will continue to be a BIG problem
20
Conclusion 19 Crystal Ball Other software issues o Reverse engineering will not go away o Secure development will remain hard o Open source is not a panacea OS issues o NGSCB (or similar) might change things… o …but, for better or for worse?
21
Conclusion 20 The Bottom Line Security knowledge is needed today… …and it will be needed in the future Necessary to understand technical issues o The focus of this class But technical knowledge is not enough o Human nature, legal issues, business issues,... o As with anything, experience is helpful
22
Conclusion 21 A True Story The names have been changed… “Bob” took my information security class Bob then got an intern position o At a major company that does lots of security One meeting, an important customer asked o “Why do we need signed certificates?” o “After all, they cost money!” The silence was deafening
23
Conclusion 22 A True Story Bob’s boss remembered that Bob had taken a security class o So he asked Bob, the lowly intern, to answer o Bob mentioned man-in-the-middle attack on SSL Customer wanted to hear more o So, Bob explained MiM attack in some detail The next day, “Bob the lowly intern” became “Bob the fulltime employee”
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.