Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 8 Network Security 4/17/2017 www.noteshit.com.

Similar presentations


Presentation on theme: "Chapter 8 Network Security 4/17/2017 www.noteshit.com."— Presentation transcript:

1 Chapter 8 Network Security 4/17/2017

2 Cryptography Introduction to Cryptography Substitution Ciphers
Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles 4/17/2017

3 Some people who cause security problems and why.
Need for Security Some people who cause security problems and why. 4/17/2017

4 An Introduction to Cryptography
The encryption model (for a symmetric-key cipher). 4/17/2017

5 Transposition Ciphers
A transposition cipher. 4/17/2017

6 One-Time Pads The use of a one-time pad for encryption and the possibility of getting any possible plaintext from the ciphertext by the use of some other pad. 4/17/2017

7 An example of quantum cryptography.
4/17/2017

8 Symmetric-Key Algorithms
DES – The Data Encryption Standard AES – The Advanced Encryption Standard Cipher Modes Other Ciphers Cryptanalysis 4/17/2017

9 Basic elements of product ciphers. (a) P-box. (b) S-box. (c) Product.
4/17/2017

10 Data Encryption Standard
The data encryption standard. (a) General outline. (b) Detail of one iteration. The circled + means exclusive OR. 4/17/2017

11 (a) Triple encryption using DES. (b) Decryption.
Triple DES (a) Triple encryption using DES. (b) Decryption. 4/17/2017

12 AES – The Advanced Encryption Standard
Rules for AES proposals The algorithm must be a symmetric block cipher. The full design must be public. Key lengths of 128, 192, and 256 bits supported. Both software and hardware implementations required The algorithm must be public or licensed on nondiscriminatory terms. 4/17/2017

13 AES (2) An outline of Rijndael. 4/17/2017

14 Creating of the state and rk arrays.
AES (3) Creating of the state and rk arrays. 4/17/2017

15 Electronic Code Book Mode
The plaintext of a file encrypted as 16 DES blocks. 4/17/2017

16 Cipher Block Chaining Mode
Cipher block chaining. (a) Encryption. (b) Decryption. 4/17/2017

17 (a) Encryption. (c) Decryption.
Cipher Feedback Mode (a) Encryption. (c) Decryption. 4/17/2017

18 A stream cipher. (a) Encryption. (b) Decryption.
Stream Cipher Mode A stream cipher. (a) Encryption. (b) Decryption. 4/17/2017

19 Encryption using counter mode.
4/17/2017

20 Some common symmetric-key cryptographic algorithms.
Cryptanalysis Some common symmetric-key cryptographic algorithms. 4/17/2017

21 Public-Key Algorithms
RSA Other Public-Key Algorithms 4/17/2017

22 An example of the RSA algorithm.
4/17/2017

23 Digital Signatures Symmetric-Key Signatures Public-Key Signatures
Message Digests The Birthday Attack 4/17/2017

24 Symmetric-Key Signatures
Digital signatures with Big Brother. 4/17/2017

25 Public-Key Signatures
Digital signatures using public-key cryptography. 4/17/2017

26 Digital signatures using message digests.
4/17/2017

27 Use of SHA-1 and RSA for signing nonsecret messages.
4/17/2017

28 SHA-1 (2) (a) A message padded out to a multiple of 512 bits.
(b) The output variables. (c) The word array. 4/17/2017

29 Management of Public Keys
Certificates X.509 Public Key Infrastructures 4/17/2017

30 Problems with Public-Key Encryption
A way for Trudy to subvert public-key encryption. 4/17/2017

31 A possible certificate and its signed hash.
Certificates A possible certificate and its signed hash. 4/17/2017

32 The basic fields of an X.509 certificate.
4/17/2017

33 Public-Key Infrastructures
(a) A hierarchical PKI. (b) A chain of certificates. 4/17/2017

34 Communication Security
IPsec Firewalls Virtual Private Networks Wireless Security 4/17/2017

35 The IPsec authentication header in transport mode for IPv4.
4/17/2017

36 (a) ESP in transport mode. (b) ESP in tunnel mode.
IPsec (2) (a) ESP in transport mode. (b) ESP in tunnel mode. 4/17/2017

37 Firewalls A firewall consisting of two packet filters and an application gateway. 4/17/2017

38 Virtual Private Networks
(a) A leased-line private network. (b) A virtual private network. 4/17/2017

39 Packet encryption using WEP.
Security Packet encryption using WEP. 4/17/2017

40 Authentication Protocols
Authentication Based on a Shared Secret Key Establishing a Shared Key: Diffie-Hellman Authentication Using a Key Distribution Center Authentication Using Kerberos Authentication Using Public-Key Cryptography 4/17/2017

41 Authentication Based on a Shared Secret Key
Two-way authentication using a challenge-response protocol. 4/17/2017

42 Authentication Based on a Shared Secret Key (2)
A shortened two-way authentication protocol. 4/17/2017

43 Authentication Based on a Shared Secret Key (3)
The reflection attack. 4/17/2017

44 Authentication Based on a Shared Secret Key (4)
A reflection attack on the protocol of Fig 4/17/2017

45 Authentication Based on a Shared Secret Key (5)
Authentication using HMACs. 4/17/2017

46 Establishing a Shared Key: The Diffie-Hellman Key Exchange
4/17/2017

47 Establishing a Shared Key: The Diffie-Hellman Key Exchange
The bucket brigade or man-in-the-middle attack. 4/17/2017

48 Authentication Using a Key Distribution Center
A first attempt at an authentication protocol using a KDC. 4/17/2017

49 Authentication Using a Key Distribution Center (2)
The Needham-Schroeder authentication protocol. 4/17/2017

50 Authentication Using a Key Distribution Center (3)
The Otway-Rees authentication protocol (slightly simplified). 4/17/2017

51 Authentication Using Kerberos
The operation of Kerberos V4. 4/17/2017

52 Authentication Using Public-Key Cryptography
Mutual authentication using public-key cryptography. 4/17/2017

53 E-Mail Security PGP – Pretty Good Privacy PEM – Privacy Enhanced Mail
S/MIME 4/17/2017

54 PGP – Pretty Good Privacy
PGP in operation for sending a message. 4/17/2017

55 PGP – Pretty Good Privacy (2)
A PGP message. 4/17/2017

56 Web Security Threats Secure Naming SSL – The Secure Sockets Layer
Mobile Code Security 4/17/2017

57 Secure Naming (a) Normal situation. (b) An attack based on breaking into DNS and modifying Bob's record. 4/17/2017

58 How Trudy spoofs Alice's ISP.
Secure Naming (2) How Trudy spoofs Alice's ISP. 4/17/2017

59 Secure DNS An example RRSet for bob.com. The KEY record is Bob's public key. The SIG record is the top-level com server's signed has of the A and KEY records to verify their authenticity. 4/17/2017

60 Self-Certifying Names
A self-certifying URL containing a hash of server's name and public key. 4/17/2017

61 SSL—The Secure Sockets Layer
Layers (and protocols) for a home user browsing with SSL. 4/17/2017

62 A simplified version of the SSL connection establishment subprotocol.
4/17/2017

63 Data transmission using SSL.
4/17/2017

64 Java Applet Security Applets inserted into a Java Virtual Machine interpreter inside the browser. 4/17/2017

65 Social Issues Privacy Freedom of Speech Copyright 4/17/2017

66 Anonymous R ers Users who wish anonymity chain requests through multiple anonymous r ers. 4/17/2017

67 Freedom of Speech Possibly banned material:
Material inappropriate for children or teenagers. Hate aimed at various ethnic, religious, sexual, or other groups. Information about democracy and democratic values. Accounts of historical events contradicting the government's version. Manuals for picking locks, building weapons, encrypting messages, etc. 4/17/2017

68 Steganography (a) Three zebras and a tree. (b) Three zebras, a tree, and the complete text of five plays by William Shakespeare. 4/17/2017


Download ppt "Chapter 8 Network Security 4/17/2017 www.noteshit.com."

Similar presentations


Ads by Google