PESIT SOUTH CAMPUS 10IS835: INFORMATION AND NETWORK SECURITY. Faculty Name: Aisha Begam No. of Hours: 52

Size: px
Start display at page:

Download "PESIT SOUTH CAMPUS 10IS835: INFORMATION AND NETWORK SECURITY. Faculty Name: Aisha Begam No. of Hours: 52"

Transcription

1 10IS835: INFORMATION AND NETWORK SECURITY Faculty Name: Aisha Begam No. of Hours: 52 Objectives In this electronic age, security and privacy are two of the issues whose importance cannot be stressed enough. How do we ensure the systems we use are resistant to electronic fraud? What are some of the safe computing/internet practices that we can follow to avoid attacks by hackers? How do we share private data over a public channel and be immune to eavesdropping or interceptions? How do we ensure information is sent to an authentic source and guard against repudiation? These are some of the many questions that a computer or information scientist and engineer ought to be aware of. From times immemorial, cryptography has captured the imagination of people. Though the discussions are largely qualitative and not mathematically involved, the course provides a broad overview of the challenges that face electronic storage and communication. Recognizing that it is as important in knowing what has been done to fortify against possible attacks over time, in the words of Dr. Bill Stallings (the author of one of the prescribed texts for this course), the course provides a survey of both the principles and practices of information and network security. B.E 8 th Sem Information Science & Engineering 1

2 INFORMATION NETWORK SECURITY LESSON PLAN SUBJECT CODE: 10IS835 % of portions to Chapter Title Class be covered /Reference No. Ref. Cumul- Literature Topics to be covered Chap. Ative 1. UNIT IV Introduction Cryptography Foundations of cryptology, cipher Methods 3. Cipher methods (continued) 4. Cryptographic algorithms 5. Cryptographic algorithms (contd.) 6. Cryptographic tools 7. Attacks on Cryptosystems 8. Review 9. UNIT II Introduction Physical Design 11. Security Firewalls, 12. Technology I Firewalls(contd..) 13. protecting remote connections 14. UNIT V Attacks, services and mechanisms Security attacks 16. Introduction to Security Services 17. Network A model for internetwork security, 18. Security, Internet standards and RFC s 19. Authentication Kerberos 20. Application X.509 Directory Authentication Services 21. UNIT VI Pretty good privacy (PGP) 22. Pretty good privacy (PGP) (Contd..) 23. Security S/ MIME 24. S/ MIME (Contd..) 25. S/ MIME (Contd..) 11.53% 53.82% 26. UNIT III Introduction 27. Security Intrusion detection system IDS 28. Technology II Honey pots, 29. Honey net 11.53% 65.35%

3 Chapter Title Class /Reference No. Literature Topics to be covered 30. Padded Cell Systems 31. Scanning and Analysis tools 32. Scanning and Analysis tools (Contd..) 33. UNIT VII IP Security overview 34. IP Security IP Security Architecture 35. Authentication header 36. Encapsulating security payload 37. Combining security associations 38. Combining security associations (Contd..) 39. Key Management 40. UNIT VIII Web security Considerations 41. Web Security Web security Considerations (Contd..) 42. Secure socket layer 43. Secure Transport layer 44. Secure electronic transactions 45. Secure electronic transactions (Contd..) 46. UNIT I Introduction 47. Information Security Policy 48. Planning and Standards and Practices 49. Security Information Security Blueprint 50. Contingency Plan 51. Model for Contingency Plan 52. Model for Contingency Plan (Contd..) % of portions to be covered Ref. Cumul- Chap. Ative 11.53% 76.88% 11.53% 88.41% 11.53% 100% B.E 8 th Sem Information Science & Engineering 2

4 Literature: Book Type Code Title & Author Publication Info Edition Publisher Year Text Book T1 Principles of Information Security Second Thomson 2005 by Michael E Whitman and Herbert Edition Mattord Text Book T2 Network Security Essentials - Third Edition Pearson 2000 Applications and Standards by Education William Stallings Reference R1 Cryptography and Network Tata McGraw 2007 Book Security Hill Study aids 1. Slides and other useful materials are available on the webpage of the author of the second textbook. The URL is: Recommended Readings 1. Simon Singh, The Code Book, Anchor Relevant articles/links will be posted on the course web page/ mentioned in class. B.E 8 th Sem Information Science & Engineering 4

5 QUESTION BANK Acknowledgement: This set of questions is based largely on the material available on the PESIT website for Cryptography and Network Security. A large number of questions have been extracted from previous years VTU papers. These are based on the old syllabus. Any updates would be intimated in class and posted on the class blog for this course. Sl No Questions Marks 1. Explain the classification of Security Services Define the term information security. With examples discuss about 10* various security violations during transmission of information 3. Describe the different Security attacks with figure 6 4. Explain briefly the four types of security attacks that are normally 10* encountered. Also distinguish between active and passive attacks 5. Explain the model for network Security 6 6. With a neat diagram explain each component of Model of 6 Conventional Crypto System. 7. Explain briefly the four types of security attacks that are normally 10 encountered. Also distinguish between active and passive attacks 8. Discuss Briefly about cryptanalysis 5 9. Explain Caesar cipher & mono alphabetic ciphers method of 10 encryption 10. Explain simplified DES method of encryption 10* 11. Explain what is meant by diffusion & confusion Explain the classical Feistel cipher structure Explain the differential Cryptanalysis mechanism 6* 14. Bring out the difference between the following pairs of terms: 10* i) Diffusion and confusion ii) Steganography and Cryptography iii) Known and chosen plaintext Cryptanalysis 15. Write a brief note on Steganography What is the need for public key cryptography? Explain its principle 10* and how it can be adopted for 1) encryption and 2) authentication 17. Explain in brief the schemes public key authority and public key 10* certificates proposed for the distribution of public keys 18. With suitable diagrams show how public key encryption can be used 10* in confidentiality, authentication and both 19. With schematic diagrams explain the single round of DES 10* encryption algorithm 20. Explain the principle of Diffie- Hellman key exchange with a 10* suitable example 21. Briefly explain the classical encryption techniques Briefly describe the two basic building blocks of all encryption 10 techniques 23. Briefly explain the Simplified DES scheme Describe stream ciphers and block ciphers 6 B.E 8 th Sem Information Science & Engineering 5

6 25. Explain the motivation for Feistel cipher structure Explain Feistel Decryption algorithm Describe briefly the DES encryption Describe briefly the DES decryption Explain Single Round DES algorithm Write a short note on Strength of DES Write a short note on Differential and linear cryptanalysis What is meant by triple DES How does it over come the problem 10* encountered in Double DES 33. How does triple DES differ from double DES? Discuss about the 10* known plain text attack on triple DES 34. Explain the design principles of IDEA. 10* 35. With the structure of IDEA explain the algorithm of IDEA 6* 36. With a detailed diagram explain the method of encryption and 10 decryption using Blowfish Algorithm 37. Define what is link and End-to-End encryption with advantages and 6* disadvantages of each. 38. State the steps followed in Key Distribution Scenario. With Diagram 6* 39. Explain Blum Blum Shub generator Explain a typical key distribution scenario. What are the tradeoffs 14* involved in determining the life of a particular session key. 41. Write a short note on Potential Locations for confidentiality Attacks Briefly explain Traffic Confidentiality Describe the different sources of Random numbers 15 B.E 8 th Sem Information Science & Engineering 6

7 Cryptography Algorithms (contd) PESIT SOUTH CAMPUS SlNo. Questions Marks 1. What are the important characteristics of that public key 10 Cryptosystems follow. Explain the public key encryption process 2. Differentiate between public key and conventional encryption 6* Techniques. 3. State the requirements of public key cryptography Describe the different applications for Public-Key Cryptosystems Write a short note on Public-Key Cryptanalysis Describe RSA algorithm. 10* 7. Explain the Security of RSA Explain the different methods of Distribution of Public Keys. 10* 9. Briefly explain the Public-Key Distribution of Secret Keys Explain DIFFIE-HELLMAN key exchange method. 10* 11. Why is gcd(n,n+1)=1 for two consecutive integers n and n+1? Using Ferments theorem find mod X=2(mod3); x=3(mod5); x=2(mod7); solve for x Explain the two theorems that play important roles in public-key 10 cryptography. 15. Explain Euclid s Algorithm Explain Chinese remainder theorem and Discrete Logarithms State and explain the requirements of message Authentication Explain the Authentication Functions Explain the message authentication codes Explain MD5 message digest Algorithm. 10* 21. What are the differences between MD5 and MD4 5* 22. Explain Digital Signature Algorithm. 5* 23. Explain the different requirements of digital signature Briefly describe the two approaches for the digital signature 10 function 25. Explain in detail the Mutual Authentication and One-Way 14 authentication 26. Explain the basic uses of Message Encryption With Example State the requirements of Hash Functions What is the need for public key cryptography? Explain it s principle 10* and how it can be adopted for i) Encryption and ii) Authentication. 29. Enunciate and explain the digital signature algorithm 10* B.E 8 th Sem Information Science & Engineering 7

8 Network Security Content: Network Security Practice: Covers important network security tools and applications including Kerberos, X.509v3 certificates, PGP, S/MIME, IP Security, SSL/TLS and SET. Sl No Questions Marks 1. Explain Kerberos 4? 8* 2. Explain kerberos 5? 8* 3. State and explain the differences between Keberos 4 and Keberos Explain at least 7 elements of X.509 public key certificate. 10* 5. Explain the different methods of X.509 strong Authentication 10 Procedures. 6. What does the key and policy information(of X.509 version 3) area 10 include 8 7. State the different features of PGP which has made it very popular. 8* 8. Explain the four types of keys which the PGP makes use of What is meant by PGP? why ois it widely used? Expalin the 10* general format of PGP message. 10. Explain the method revoking public keys in PGP List out the limitations of SMTP/ What is the importance of IP security? Discuss about the 10* applications and the benefits of IP security. 13. What is a security association? With neat diagrams discuss about 10* basic combinations of security associations 14. Explain the different MIME content Types. 10* 15. State and describe the functions of S/MIME Give the summary of web security threats, consequences and 10* counter measures 17. What is meant by a fire wall? Discuss about various types of fire 10* wall configuration 18. Explain the role of User Agent in S/MIME Certificate processing Briefly explain the arbitrated digital signature schemes using 10* conventional and public key encryptions 20. Describe the IP security Architecture What are the different applications of IPSec? 5* 22. Explain Transport and Tunnel modes of AH and ESP Show the format of IPSec Authentication Header What are the needs of padding field in a ESP packet Describe the IPSec ESP format with help of a neat diagram Explain Oakley key determination protocol and state its features. 10* 27. What is Kerboras? Discuss the motivation and requirements of 10* Kerberos approach. 28. What are the key features of a X.509 certificate? How are they 10* issued and revoked by the certificate authority? 29. What are the five basic services available for the users of Pretty 20* B.E 8 th Sem Information Science & Engineering 8

9 Good Privacy (PGP)? How are they provided? 30. What is ISAKMP? Briefly explain the ISAKMP header format Write short note on Ipv4 and Ipv State some of the web security considerations With a neat diagram explain SSL Protocol Stack Explain SSL Handshake Protocol and SSL record protocol. 10* 35. State the requirements of SET With the help of an example explain the steps in a Transaction using 10* SET. 37. Explain the key features of SET Explain the steps in Payment Processing using SET What is the need for dual signatures in SET? How are they 10* constructed? 40. Explain the secure socket layer (SSL-V3) architecture, indicating 10* how the session state and connection state are defined Information Security 1. What are the different classes of Intruders? Explain each of them State the different methods of learning passwords Explain the different Password selection strategies Explain the Vulnerability of password system used in Unix 6* 5. Explain the techniques that can be used to eliminate guessable 10* passwords. 6. Explain the different methods of Intrusion Detection State and explain the different methods of checking activities are 5 genuine or not. 8. Explain with suitable example, how to overload extraction and 5 insertion operator 9. Explain Distributed Intrusion detection. 10* 10. Explain trap Doors and Trojan Horses Explain the Nature Of Viruses How does a virus work and propagate 6* 13. Explain the different types of Viruses What is Macro viruses and why are they Threatening? 6* 15. Explain the Digital Immune System. 10* 16. Explain the Antivirus Approaches Write a short note on Macro viruses What are the four basic techniques of choosing passwords? 10* Compare their relative merits. 19. What is a Virus? What are the typical stages it passes through in 10* its lifetime? Suggest a suitable virus structure. 20. Explain the design principles of Firewall Describe the firewall characteristics Explain the different types of firewalls Explain the different Firewall configurations Explain the concept of Trusted systems Write a short note on trusted systems 8 B.E 8 th Sem Information Science & Engineering 9

10 Chapter-wise Questions from Previous year papers of Information & network security CHAPTER 1: Planning for security 1. Define Policy and explain issue specific security policy Explain the importance of incident response planning strategy Explain the Pipkin s three categories of incident indicators Explain the ISO/IEC 27001:2005 plan-do-check-act-cycle Discuss the system specific policy. How managerial guidance and 10 technical specifications can be used in SYSSP? 6. Who is responsible for a policy management? How a policy is 10 managed? Explain. 7. Define the terms : Policy,standards and practices in the context of 06 information security. Draw a schematic diagram depicting the interrelationship between the above. 8. What are the policies that must be defined by the managements (of 07 organizations) as per NIST SP ? Describe briefly the specific areas covered by any of these policies. 9. What are the components of contingency planning? Describe briefly 07 the important steps involved in the recovery process after the extent of damage causes by an incident has been assessed? 10. Explain the major steps specified in BS7799:2 documents. How 10 these steps help in security planning? CHAPTER 2: SECURITY TECHNOLOGY-1 1. Explain the firewall rules Explain the screened subnet firewall What is a firewall? Show the working of a screened host and dual 10 homed firewalls. 4. How a firewall can be configured and managed? Give examples What is firewall? Explain categories of firewalls based on 10 processing mode. 6. What is VPN? Explain two modes of a VPN What are VPN? Explain different techniques to implement a VPN? What is a firewall? List the type of firewalls categorized by 10 processing mode. Draw a schematic diagram of a packet filtering router used as a firewall and explain its function using a sample firewall rule. CHAPTER 3: SECURITY TECHNOLOGY-2 1. How a signature based IDPS differ from a behavior based IDPs? Explain the venerability scanners What is an intrusion? Briefly write about any eight IDPS 10 terminologies. 4. Explain network based intrusion detection and prevention systems. 10 B.E 8 th Sem Information Science & Engineering 10

11 5. Describe the need of operating system detecting tools Define the following terms related to IDS: 05 i) Alert ii) False attack stimulus iii) False negative iv) False positive v) True attack stimulus. 7. Discuss the reasons for acquisition and use of IDSs by organization Discuss the differences between host IDS and network IDS, with the 06 help of a schematic diagram. 9. Define the terms : honey pots,honey net and padded cells. 03 CHAPTER 4: CRYPTOGRAPHY 1. What are the differences between digital signature and digital 10 certificate? 2. Explain the two methods of encrypting plain text? What is an encryption? Discuss the symmetric and asymmetric 10 encryption methods? 4. List out the elements of cryptosystems and explain transposition 10 cipher technique. 5. Who can attack cryptosystems? Discuss different categories of 10 attacks on cryptosystems. 6. Define the following terms related to cryptography: 05 1) Algorithm 2) Cipher 3)Key 4) Link encryption 5) Work factor 7. Distinguish between symmetric encryption and asymmetric 06 encryption with suitable examples. CHAPTER 5: INTRODUCTION TO NETWORK SECURITY, AUTHENTICATION APPLICATIONS 1. Describe the terms: authentication, integrity, privacy, authorization 05 and non repudiation. 2. Discuss the man-in-the-middle attack What are the differences between active and passive security 05 attacks? 4. Explain the different authentication procedures in X.509 certificate Write the summary of Kerberos version five message exchange What is meant by information security? Discuss the three aspects of 10 information security. 7. Briefly explain the four types of security attacks that are normally 10 encountered.also distinguish between active and passive attacks. 8. With a schematic figure, explain Kerberos Ver-4 Authentication 10* dialogue. Clearly mention various steps. 9. Compare active and passive attacks With a neat diagram, explain network security model List out the differences between Kerberos version 4 and version Describe briefly the various security attacks and specific security 14 mechanisms covered by X Describe briefly the authentication procedures covered by X Describe the steps involved in Kerberos Login and Kerberos 10 Request for services, with suitable illustrations. CHAPTER 6: ELECTRONIC MAIL SECURITY B.E 8 th Sem Information Science & Engineering 11

12 1. With a neat diagram, explain the digital signature service provided 10 by PGP. 2. Explain the different MIME content types With flow charts, explain the process of transmission and reception 10 of PGP messages. 4. Explain PGP Message generation and PGP message reception 10 techniques. 5. Describe S/MIME functionality Explain S/MIME certificate processing method Describe the steps involved in providing authentication and 10 confidentiality by PGP, with suitable illustrations. 8. Discuss the limitations of SMTP/RFC 822 and how MIME 10 overcomes these limitations. CHAPTER 7: IP SECURITY 1. Explain the format of an ESP packet in IP Security Why does ESP include a padding field? Give an example of an aggressive 0akley key Give the general structure of IPSEC authentication header. Describe 10 how anti reply service is supported. 5. With neat diagrams, discuss the basic combinations of security 10 associations. 6. Describe SA parameters and SA selectors in detail Describe Oakley key determination protocol Describe the benefits of IPSec What is security association? Discuss briefly the parameters that are 05 used to define a security association. 10. Describe the transport and tunnel modes used for IPSec AH 10 authentication bringing out their scope relevant to IPV4. CHAPTER 8: WEB SECURITY 1. Explain the dual signature in SET protocol. What is its purpose? Explain the different alert codes of TLS protocols What is SET? Discuss the requirements and key features of SET Write short notes on: 1) SSL handshake protocol 2) SSL alert 10 protocol. 5. Explain SSL handshake protocol with a neat diagram List out the key features of secure electronic transaction and explain 10 in detail. 7. Discuss the SSL protocol stack What are the services provided by SSL record protocol? Describe 08 the operation of this protocol, with suitable illustration. 9. What is SET? Discuss its specifications. 08 Question Paper May/June 2004 Cryptography and Network Security: Total =100 marks (Please note that these questions pertain to the old syllabus; material relevant to the revised syllabus would be made available in class) B.E 8 th Sem Information Science & Engineering 12

13 1 a. Explain mxm Hill Cipher 5 b. Show how this Hill Cipher can be broken with a known 5 Plaintext attack. c. You intercept a message SONAFQCHMWPTVEVY, 10 resulting from a 2x2 Hill Cipher, where the sender used the usual 26-letter alphabet A-Z with numerical equivalents 0-25, respectively. An earlier statistical analysis of a long string of intercepted cipher text revealed that the most frequently occurring cipher text diagraphs were KH and XW in that order. You take a guess that those diagraphs correspond to TH and HE, respectively. Since those are the most frequently occulting diagraphs in most long plain text messages on the subject. Find the deciphering matrix and read the message. 2 a. Explain encryption and decryption operation of output 10 feedback mode of a block cipher. b. Explain double DES. What are its merits compared to single 5 DES? c. What is meet-in-the-middle attack? Explain with reference to 5 the Double DES. 3 a. describe RSA public key cryptosystem 5 b. Describe how to send digital signature in RSA 5 c. Suppose that n is known to be product of two distinct primes, 10 p and q. Show that the knowledge of Φ(N ) is equivalent to the knowledge of primes p, q. 4 a. What is the difference between message authentication and 10 digital signature? b. Develop a scheme for message authentication and digital 5 signature using a hash function. c. Describe message authentication code based on DES. 5 5 a. Write digital signature algorithm (DSA). 8 b. Prove the correctness of DSA 7 c. DSA specifies that if the signature generation process results 5 in a value s=0 for the signature (r,s) a new value of random integer k ( user s per message secret number) should be generated and signature should be recalculated. Why? 6 a. Explain the services provided by Pretty good Privacy(PGP) 12 b. List the cryptographic keys used in PGP. Explain briefly the 8 requirements of each key. 7 a. Why do we need IP level security? Explain the benefits and 8 applications of IPSec. b. Discuss the IPSec authentication Header format and describe 12 how anti-replay service and data integrity are supported. 8 a. Explain what is SSL, and how does it enable web security? 10 b. Explain the following terms with examples : viruses, worms and firewalls (3+3+4) Question paper from Jan/Feb 2005: Total Marks 100 B.E 8 th Sem Information Science & Engineering 13

14 Sl. No. Questions Marks 1 a. What are the different security services available in a 8 computer system? Explain. b. Discuss the following classical encryption techniques: 12 Playfair cipher, Hill cipher, rotor machines 2 a. With a neat diagram explain simple DES encryption 12 algorithm. b. What do you mean by cryptanalysis? Describe the two 8 promising approaches of cryptanalysis. 3 a. What are the characteristics of BLOWFISH? Discuss its 8 strengths. Further compare the speeds of various BLOCK ciphers on a Pentium machines. b. List the important characteristics of Public Key 8 Cryptosystems. Explain the essential steps to be followed in the Public key encryption process with an example. c. Write a note on Traffic confidentiality. 4 4 a. Define the following: 10 i. Prime and Relatively Prime Numbers ii. Fermat s theorem iii. Euler s theorem iv. Euler s Totient function v. Chinese reminder theorem b. What is a message authentication code? Describe MD5 10 Message Digest Algorithm. 5 a. Explain X.509 Directory authentication service 8 b. What is meant by PGP? Describe the operational principle of 12 PGP services. Also Compare it with S/MIME. 6 a. What are the benefits and applications of IP Security? 12 Explain IP Security architecture? b. Discuss the following with respect to IP Security: 8 i. Encapsulating Security Payload ii. Oakley key Determination protocol 7 a. Write the layer diagram of SSL protocol stack. Explain SSL. 10 Record protocol. b. What are the components of secure Electronic Transaction 10 (SET)? Describe SET participants in detail. 8 Write short notes on the following: 20 i. Intruders ii. Viruses iii. Firewalls iv. Trojan horse defence B.E 8 th Sem Information Science & Engineering 14

10EC832: NETWORK SECURITY

10EC832: NETWORK SECURITY 10EC832: NETWORK SECURITY Objective: In this electronic age, security and privacy are two of the issues whose importance cannot be stressed enough. How do we ensure the systems we use are resistant to

More information

Information and Network Security UNIT-I PLANNING FOR SECURITY

Information and Network Security UNIT-I PLANNING FOR SECURITY UNIT-I PLANNING FOR SECURITY 1 a Discuss the system specific security policy.how managerial guidelines and technical specification can be used in SysSP? (December 2010) 1 b. Who is responsible for policy

More information

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK UNIT-1 1. Answer the following: a. What is Non-repudiation b. Distinguish between stream and block ciphers c. List out the problems of one time pad d. Define

More information

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology Question Bank Subject: Information Security (160702) Class: BE Sem. VI (CE/IT) Unit-1: Conventional

More information

Total No. of Questions : 09 ] [ Total No.of Pages : 02

Total No. of Questions : 09 ] [ Total No.of Pages : 02 CS / IT 321 (CR) Total No. of Questions : 09 ] [ Total No.of Pages : 02 III/IV B. TECH. DEGREE EXAMINATIONS, OCT / NOV - 2015 Second Semester COMPUTER SCIENCE & ENGINEERING NETWK SECURITY Time : Three

More information

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography Code No: RR410504 Set No. 1 1. Write short notes on (a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography 3. (a) Illustrate Diffie-hellman Key Exchange scheme for GF(P) [6M] (b) Consider

More information

KALASALINGAM UNIVERSITY

KALASALINGAM UNIVERSITY KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLASS NOTES CRYPTOGRAPHY AND NETWOTK SECURITY (CSE 405) Prepared by M.RAJA AP/CSE

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

Introduction to information Security

Introduction to information Security First lecture Introduction to information Security Why Computer and information Security Cryptography Secret key algorithms: DES/AES Public key algorithms: RSA One-way hash functions & message digests:

More information

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography Principles of Information Security, Fourth Edition Chapter 8 Cryptography Learning Objectives Upon completion of this material, you should be able to: Chronicle the most significant events and discoveries

More information

SRI VENKATESWARA COLLEGE OF ENGINEERING

SRI VENKATESWARA COLLEGE OF ENGINEERING COURSE DELIVERY PLAN - THEORY Page 1 of 6 Department of Information Technology B.E/B.Tech :IT/CS Regulation:2013 LP: CS6701 Rev. No: 01 Date: 30.06.2017 Sub. Code / Sub. Name : CS6701 CRYPTOGRAPHY & NETWORK

More information

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National

More information

MLR Institute of Technology

MLR Institute of Technology MLR Institute of Technology Laxma Reddy Avenue, Dundigal, Quthbullapur (M), Hyderabad 500 043 Phone Nos: 08418 204066 / 204088, Fax: 08418 204088 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION Course

More information

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls 32.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 32.2 Figure 32.1 Common structure

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on

More information

Introduction and Overview. Why CSCI 454/554?

Introduction and Overview. Why CSCI 454/554? Introduction and Overview CSCI 454/554 Why CSCI 454/554? Get Credits and Graduate Security is important More job opportunities More research funds 1 Workload Five homework assignments Two exams (open book

More information

APNIC elearning: Cryptography Basics

APNIC elearning: Cryptography Basics APNIC elearning: Cryptography Basics 27 MAY 2015 03:00 PM AEST Brisbane (UTC+10) Issue Date: Revision: Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security

More information

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures MIS5206 Week 11 Identity and Access Control Week 10 continued Cryptography, Public Key Encryption and

More information

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Chapter 16 IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death,

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,

More information

L13. Reviews. Rocky K. C. Chang, April 10, 2015

L13. Reviews. Rocky K. C. Chang, April 10, 2015 L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing

More information

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010 Cryptography Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction

More information

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.). Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 2 M.M:50 The question paper contains 40 multiple choice questions with four choices and students will have to pick the

More information

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Hello and welcome to today's lecture on secured communication.

More information

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads Cryptography p y Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction

More information

CS 356 Internet Security Protocols. Fall 2013

CS 356 Internet Security Protocols. Fall 2013 CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5

More information

CRYPTOGRAPHY AND NETWORK SECURITY

CRYPTOGRAPHY AND NETWORK SECURITY CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE FIFTH EDITION William Stallings Prentice Hall Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai

More information

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security 1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of

More information

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption and secure channel May 17, 2018 1 / 45 1 2 3 4 5 2 / 45 Introduction Simplified model for and decryption key decryption key plain text X KE algorithm KD Y = E(KE, X ) decryption ciphertext algorithm X

More information

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1 IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service

More information

Introduction to Cryptography. Vasil Slavov William Jewell College

Introduction to Cryptography. Vasil Slavov William Jewell College Introduction to Cryptography Vasil Slavov William Jewell College Crypto definitions Cryptography studies how to keep messages secure Cryptanalysis studies how to break ciphertext Cryptology branch of mathematics,

More information

Network Security Chapter 8

Network Security Chapter 8 Network Security Chapter 8 Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Communication Security Authentication Protocols Email Security Web Security

More information

CS6701 CRYPTOGRAPHY AND NETWORK SECURITY 2 Mark Questions & Answers

CS6701 CRYPTOGRAPHY AND NETWORK SECURITY 2 Mark Questions & Answers CS6701 CRYPTOGRAPHY AND NETWORK SECURITY 2 Mark Questions & Answers UNIT-I INTRODUCTION & NUMBER THEORY 1. What is meant by cryptography and cryptanalysis? (N/D-09) Cryptography is an art of writing hidden

More information

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems History 2000 B.C. Egyptian Hieroglyphics Atbash - Hebrew Original alphabet mapped to different letter Type of Substitution Cipher

More information

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Int ernet w orking Internet Security Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Internet Security Internet security is difficult Internet protocols were not originally designed for security The

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 9 Encryption and Firewalls By Whitman, Mattord & Austin 2008 Course Technology Learning Objectives Describe the role encryption

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

CSCE 715: Network Systems Security

CSCE 715: Network Systems Security CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina Security in Network Layer Implementing security in application layer provides flexibility in security

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives

More information

Chapter 6. IP Security. Dr. BHARGAVI H. GOSWAMI Department of Computer Science Christ University

Chapter 6. IP Security. Dr. BHARGAVI H. GOSWAMI Department of Computer Science Christ University Chapter 6 IP Security Dr. BHARGAVI H. GOSWAMI Department of Computer Science Christ University +91 9426669020 bhargavigoswami@gmail.com Topic List 1. IP Security Overview 2. IP Security Architecture 3.

More information

Information Security: Principles and Practice Second Edition. Mark Stamp

Information Security: Principles and Practice Second Edition. Mark Stamp Information Security: Principles and Practice Second Edition Mark Stamp August 10, 2009 Contents Preface Second Edition Preface About The Author Acknowledgments xvii xix xxiii xxv 1 Introduction 1 1.1

More information

CSC/ECE 774 Advanced Network Security

CSC/ECE 774 Advanced Network Security Computer Science CSC/ECE 774 Advanced Network Security Topic 2. Network Security Primitives CSC/ECE 774 Dr. Peng Ning 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange;

More information

IP Security IK2218/EP2120

IP Security IK2218/EP2120 IP Security IK2218/EP2120 Markus Hidell, mahidell@kth.se KTH School of ICT Based partly on material by Vitaly Shmatikov, Univ. of Texas Acknowledgements The presentation builds upon material from - Previous

More information

14. Internet Security (J. Kurose)

14. Internet Security (J. Kurose) 14. Internet Security (J. Kurose) 1 Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer:

More information

Cryptographic Concepts

Cryptographic Concepts Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general

More information

Name of chapter & details.

Name of chapter & details. Course Title Course Code Information Security IT707 Theory : 03 Course Credit Practical : 01 Tutorial : 00 Course Learning Outcomes Credits : 04 On the completion of the course, students will be able to:

More information

DEPARTMENT OF COMPUTER APPLICATIONS B.C.A. - THIRD YEAR ( REGULATION) SIXTH SEMESTER LESSON PLAN SRM UNIVERSITY

DEPARTMENT OF COMPUTER APPLICATIONS B.C.A. - THIRD YEAR ( REGULATION) SIXTH SEMESTER LESSON PLAN SRM UNIVERSITY DEPARTMENT OF COMPUTER APPLICATIONS B.C.A. - THIRD YEAR (2011-2012 REGULATION) SIXTH SEMESTER LESSON PLAN SRM UNIVERSITY FACULTY OF SCIENCE AND HUMANITIES SRM NAGAR, KATTANKULATHUR 603 203 Semester Course

More information

BCA III Network security and Cryptography Examination-2016 Model Paper 1

BCA III Network security and Cryptography Examination-2016 Model Paper 1 Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 1 M.M:50 The question paper contains 40 multiple choice questions with four choices and student will have to pick the correct

More information

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : ISACA CISA ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : http://killexams.com/pass4sure/exam-detail/cisa QUESTION: 390 Applying a digital signature to data traveling in a

More information

AIT 682: Network and Systems Security

AIT 682: Network and Systems Security AIT 682: Network and Systems Security Final Exam Review Instructor: Dr. Kun Sun Topics covered by Final Topic before Midterm 10% Topic after Midterm 90% Date: 12/13/2017 7:30am 10:15am Place: the same

More information

COURSE PLAN. Name of the Faculty:: K.ROSHAN & M.A.MUNEER Designation: Assoc.Professor Asst. Professor. Name Of The Programme:: B.

COURSE PLAN. Name of the Faculty:: K.ROSHAN & M.A.MUNEER Designation: Assoc.Professor Asst. Professor. Name Of The Programme:: B. COURSE PLAN Name of the Faculty:: K.ROSHAN & M.A.MUNEER Designation: Assoc.Professor Asst. Professor Department:: Information Technology COURSE DETAILS Name Of The Programme:: B.TECH Batch:: 2011 Designation

More information

Syllabus: The syllabus is broadly structured as follows:

Syllabus: The syllabus is broadly structured as follows: Syllabus: The syllabus is broadly structured as follows: SR. NO. TOPICS SUBTOPICS 1 Foundations of Network Security Principles of Network Security Network Security Terminologies Network Security and Data

More information

Network Security and Cryptography. December Sample Exam Marking Scheme

Network Security and Cryptography. December Sample Exam Marking Scheme Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers

More information

Study Guide to Mideterm Exam

Study Guide to Mideterm Exam YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Handout #7 Professor M. J. Fischer February 20, 2012 Study Guide to Mideterm Exam For the exam, you are responsible

More information

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any

More information

The Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME,

The Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME, 1 The Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME, PGP), client/server (Kerberos), Web access (Secure Sockets

More information

Network Encryption 3 4/20/17

Network Encryption 3 4/20/17 The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

CSC 774 Network Security

CSC 774 Network Security CSC 774 Network Security Topic 2. Review of Cryptographic Techniques CSC 774 Dr. Peng Ning 1 Outline Encryption/Decryption Digital signatures Hash functions Pseudo random functions Key exchange/agreement/distribution

More information

Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings Chapter 20 IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death, together with

More information

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography Chapter 7: Network security 15-441 Computer Networking Network Security: Cryptography, Authentication, Integrity Foundations: what is security? cryptography authentication message integrity key distribution

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Security Architecture. Lecture 13: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Security Architecture. Lecture 13: Prof. Shervin Shirmohammadi CEG Lecture 13: Security Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 13-1 Network Assets and Security Threats Assets: Hardware (PC, workstation,

More information

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to 1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, yderabad - 500 043 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Course Code Regulation Course Structure Course Coordinator

More information

Public Key Cryptography

Public Key Cryptography graphy CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L07, Steve/Courses/2011/S2/CSS322/Lectures/rsa.tex,

More information

Network Security. Chapter 8. MYcsvtu Notes.

Network Security. Chapter 8. MYcsvtu Notes. Network Security Chapter 8 Network Security Some people who cause security problems and why. Cryptography Introduction Substitution ciphers Transposition ciphers One-time pads Fundamental cryptographic

More information

KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN

KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER 2008-2012 COURSE PLAN Name of the Staff(s) : Mr. M.Raja Name of the Subject / Code : Cryptography and Network / CSE

More information

Cryptography MIS

Cryptography MIS Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message

More information

Network Security - ISA 656 IPsec IPsec Key Management (IKE)

Network Security - ISA 656 IPsec IPsec Key Management (IKE) Network Security - ISA 656 IPsec IPsec (IKE) Angelos Stavrou September 28, 2008 What is IPsec, and Why? What is IPsec, and Why? History IPsec Structure Packet Layout Header (AH) AH Layout Encapsulating

More information

KINGS IT2042 INFORMATION SECURITY. Batch : Staff Name : NALAYINI P & AMBIKA J. Academic Year. Page 1. Kings College of Engineering

KINGS IT2042 INFORMATION SECURITY. Batch : Staff Name : NALAYINI P & AMBIKA J. Academic Year. Page 1. Kings College of Engineering KINGS COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK IT2042 INFORMATION SECURITY Branch / Year / Sem : B.E / IV /VIII Batch : 2010-2014 Staff Name : NALAYINI P & AMBIKA

More information

Security. Communication security. System Security

Security. Communication security. System Security Security Communication security security of data channel typical assumption: adversary has access to the physical link over which data is transmitted cryptographic separation is necessary System Security

More information

Verteilte Systeme (Distributed Systems)

Verteilte Systeme (Distributed Systems) Verteilte Systeme (Distributed Systems) Lorenz Froihofer l.froihofer@infosys.tuwien.ac.at http://www.infosys.tuwien.ac.at/teaching/courses/ VerteilteSysteme/ Security Threats, mechanisms, design issues

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

Security: Focus of Control. Authentication

Security: Focus of Control. Authentication Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security CRYPTOGRAPHY AND NETWORK SECURITY PRAKASH C. GUPTA Former Head Department of Information Technology Maharashtra Institute of Technology Pune Delhi-110092 2015 CRYPTOGRAPHY

More information

CSCE 813 Internet Security Symmetric Cryptography

CSCE 813 Internet Security Symmetric Cryptography CSCE 813 Internet Security Symmetric Cryptography Professor Lisa Luo Fall 2017 Previous Class Essential Internet Security Requirements Confidentiality Integrity Authenticity Availability Accountability

More information

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment. CS355: Cryptography Lecture 17: X509. PGP. Authentication protocols. Key establishment. Public Keys and Trust Public Key:P A Secret key: S A Public Key:P B Secret key: S B How are public keys stored How

More information

iii PPTP... 7 L2TP/IPsec... 7 Pre-shared keys (L2TP/IPsec)... 8 X.509 certificates (L2TP/IPsec)... 8 IPsec Architecture... 11

iii PPTP... 7 L2TP/IPsec... 7 Pre-shared keys (L2TP/IPsec)... 8 X.509 certificates (L2TP/IPsec)... 8 IPsec Architecture... 11 iii PPTP................................................................................ 7 L2TP/IPsec........................................................................... 7 Pre-shared keys (L2TP/IPsec)............................................................

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Chapter 8 Network Security Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.

More information

MARIA COLLEGE OF ENGINEERING AND TECHNOLOGY

MARIA COLLEGE OF ENGINEERING AND TECHNOLOGY MARIA COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY Subject Name : Cryptography and Network Security 1. Specify the four categories of security threads? Interruption Interception

More information

David Wetherall, with some slides from Radia Perlman s security lectures.

David Wetherall, with some slides from Radia Perlman s security lectures. David Wetherall, with some slides from Radia Perlman s security lectures. djw@cs.washington.edu Networks are shared: Want to secure communication between legitimate participants from others with (passive

More information

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements CONTENTS Preface Acknowledgements xiii xvii Chapter 1 TCP/IP Overview 1 1.1 Some History 2 1.2 TCP/IP Protocol Architecture 4 1.2.1 Data-link Layer 4 1.2.2 Network Layer 5 1.2.2.1 Internet Protocol 5 IPv4

More information

Chapter 6/8. IP Security

Chapter 6/8. IP Security Chapter 6/8 IP Security Prof. Bhargavi H Goswami Department of MCA, Sunshine Group of Institutes, Rajkot, Gujarat, India. Mob: +918140099018. Email: bhargavigoswami@gmail.com Topic List 1. IP Security

More information

VPN Overview. VPN Types

VPN Overview. VPN Types VPN Types A virtual private network (VPN) connection establishes a secure tunnel between endpoints over a public network such as the Internet. This chapter applies to Site-to-site VPNs on Firepower Threat

More information

IPSec. Overview. Overview. Levente Buttyán

IPSec. Overview. Overview. Levente Buttyán IPSec - brief overview - security associations (SAs) - Authentication Header (AH) protocol - Encapsulated Security Payload () protocol - combining SAs (examples) Overview Overview IPSec is an Internet

More information

Security: Focus of Control

Security: Focus of Control Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized

More information

Cryptanalysis. Ed Crowley

Cryptanalysis. Ed Crowley Cryptanalysis Ed Crowley 1 Topics Cryptanalysis History Modern Cryptanalysis Characterization of Cryptanalysis Attacks Attack Types 2 Cryptanalysis Science of cracking ciphers and codes, decoding secrets,

More information

Most Common Security Threats (cont.)

Most Common Security Threats (cont.) Most Common Security Threats (cont.) Denial of service (DoS) attack Distributed denial of service (DDoS) attack Insider attacks. Any examples? Poorly designed software What is a zero-day vulnerability?

More information

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 08r. Pre-exam 2 Last-minute Review Cryptography Paul Krzyzanowski Rutgers University Spring 2018 March 26, 2018 CS 419 2018 Paul Krzyzanowski 1 Cryptographic Systems March 26, 2018 CS

More information

8. Network Layer Contents

8. Network Layer Contents Contents 1 / 43 * Earlier Work * IETF IP sec Working Group * IP Security Protocol * Security Associations * Authentication Header * Encapsulation Security Payload * Internet Key Management Protocol * Modular

More information

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science History of computer network protocol development in 20 th century. Development of hierarchical

More information

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Public Key Cryptography Modular Arithmetic RSA

More information

IP Security. Have a range of application specific security mechanisms

IP Security. Have a range of application specific security mechanisms IP Security IP Security Have a range of application specific security mechanisms eg. S/MIME, PGP, Kerberos, SSL/HTTPS However there are security concerns that cut across protocol layers Would like security

More information

Public Key Algorithms

Public Key Algorithms Public Key Algorithms 1 Public Key Algorithms It is necessary to know some number theory to really understand how and why public key algorithms work Most of the public key algorithms are based on modular

More information

CRYPTOGRAPHY. BY, Ayesha Farhin

CRYPTOGRAPHY. BY, Ayesha Farhin CRYPTOGRAPHY BY, Ayesha Farhin Overview Introduction Types Advantages n Disadvantages Future Developments Bibliography Introduction Cryptography considered as a branch of both mathematics and computer

More information

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 10r. Recitation assignment & concept review Paul Krzyzanowski Rutgers University Spring 2018 April 3, 2018 CS 419 2018 Paul Krzyzanowski 1 1. What is a necessary condition for perfect

More information

19.1. Security must consider external environment of the system, and protect it from:

19.1. Security must consider external environment of the system, and protect it from: Module 19: Security The Security Problem Authentication Program Threats System Threats Securing Systems Intrusion Detection Encryption Windows NT 19.1 The Security Problem Security must consider external

More information

E-commerce security: SSL/TLS, SET and others. 4.1

E-commerce security: SSL/TLS, SET and others. 4.1 E-commerce security: SSL/TLS, SET and others. 4.1 1 Electronic payment systems Purpose: facilitate the safe and secure transfer of monetary value electronically between multiple parties Participating parties:

More information

CSC 6575: Internet Security Fall 2017

CSC 6575: Internet Security Fall 2017 CSC 6575: Internet Security Fall 2017 Network Security Devices IP Security Mohammad Ashiqur Rahman Department of Computer Science College of Engineering Tennessee Tech University 2 IPSec Agenda Architecture

More information

2.1 Basic Cryptography Concepts

2.1 Basic Cryptography Concepts ENEE739B Fall 2005 Part 2 Secure Media Communications 2.1 Basic Cryptography Concepts Min Wu Electrical and Computer Engineering University of Maryland, College Park Outline: Basic Security/Crypto Concepts

More information