Presentation is loading. Please wait.

Presentation is loading. Please wait.

ECE 646 - Lecture 1 Security Services.

Similar presentations


Presentation on theme: "ECE 646 - Lecture 1 Security Services."— Presentation transcript:

1 ECE Lecture 1 Security Services

2 Need for information security
widespread use of data processing equipment: computer security widespread use of computer networks and distributed computing systems: network security

3 Security Threats in Banking Systems
Bank A Bank B interception fabrication modification Timing attacks ATM Radiation analysis unauthorized access

4 Electronic Commerce ELECTRONIC FUND TRANSFER - EFT ELECTRONIC DATA
INTERCHANGE - EDI intra-bank fund transfers inter-bank fund transfers home banking electronic cash financial transactions among companies HOME-SHOPPING non-digital goods (e.g., books, CDs) services (e.g., travel reservations) digital goods (e.g., software, music, video) micropayments (e.g., database access)

5 Electronic Data Interchange
transactions between computers human participation in routine transactions limited or non-existent paper records eliminated less time to detect and correct errors

6 Other types of data needing security
financial records medical records commercial secrets business and private correspondence technical specifications

7 Potential attackers hackers industrial competitors spies press
government agencies

8 Security on the Internet
Alice, Love you, Bob Alice Smurftown, SL 22030 Smurfland SECURE

9 NSA National Security Agency (also known as “No Such Agency”
or “Never Say Anything”) Created in 1952 by president Truman Goals: designing strong ciphers (to protect U.S. communications) breaking ciphers (to listen to non-U.S. communications) Budget and number of employees kept secret Largest employer of mathematicians in the world Larger purchaser of computer hardware

10 (currently the security division of EMC)
RSA Security Inc. (currently the security division of EMC) original patents for RSA (expired in 2000), RC5, RC6 and other cryptographic algorithms over 1 billion users of the basic cryptographic library BSAFE RSA Laboratories RSA Conference spin-off companies VeriSign - Public Key Infrastructure

11 American and international standards regarding public key cryptography
Banking standards Informal industrial standards ISO Industrial standards ISO ANSI RSA Labs PKCS IEEE ANSI X9 P1363 Federal standards PKCS NIST FIPS

12 American and international standards regarding public key cryptography
IEEE - Institute of Electrical and Electronics Engineers ANSI - American National Standards Institute NIST - National Institute of Standards and Technology ISO – International Organization for Standardization PKCS – Public Key Cryptography Standards FIPS - Federal Information Processing Standards

13 Security services Protecting data in transit at rest access control
- identification - authorization - auditing confidentiality integrity authentication non-repudiation availability

14 (User Authentication)
Identification (User Authentication) On the basis of what you know (passwords, PINs) what you have (magnetic card, smart card) what you are (fingerprints, handprints, voiceprints, keystroke timing, signatures, retinal scanners)

15

16

17 Basic Security Services (1)
1. Confidentiality Bob Alice Charlie 2. Message integrity Bob Alice Charlie 3. Message authentication Bob Alice Charlie

18 Basic Security Services (2)
4. Non-repudiation - of sender - of receiver - mutual Technique: digital signature Signature DIGITAL HANDWRITTEN A6E3891F2939E38C745B CA345BEF5349 245CBA653448E349EA47 Main Goals: unique identification proof of agreement to the contents of the document

19 Handwritten and digital signatures
Common Features Handwritten signature Digital signature 1. Unique 2. Impossible to be forged 3. Impossible to be denied by the author 4. Easy to verify by an independent judge 5. Easy to generate

20 Handwritten and digital signatures
Differences Handwritten signature Digital signature 6. Associated physically with the document 7. Almost identical for all documents 8. Usually at the last page 6. Can be stored and transmitted independently of the document 7. Function of the document 8. Covers the entire

21 Relations among security services
NON-REPUDIATION AUTHENTICATION CONFIDENTIALITY INTEGRITY

22 Network Security Threats (1)
Interruption Interception Modification Fabrication

23 Network Security Threats (2)
Active Passive Interception Interruption (availability) Fabrication (authenticity) Release of message contents Traffic analysis Modification (integrity)


Download ppt "ECE 646 - Lecture 1 Security Services."

Similar presentations


Ads by Google