Application Security and Wireless Applications

Size: px
Start display at page:

Download "Application Security and Wireless Applications"

Transcription

1 Application Security and Wireless Applications Silvia Giordano DTI - SUPSI University of Applied Science, Manno Switzerland silvia.giordano@supsi.ch SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 1 Outline of this lesson Application Networks Security what is security? cryptography authentication message integrity key distribution and certification Wireless applications SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 2

2 Application Networks Security SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 3 Application Networks Security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure transport layer: Internet commerce, SSL, SET network layer: IP security SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 4

3 Friends and enemies: Alice, Bob, Trudy Figure 7.1 goes here well-known in network security world Bob, Alice (lovers!) want to communicate securely Trudy, the intruder may intercept, delete, add messages SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 5 What is network security? Secrecy: only sender, intended receiver should understand msg contents sender encrypts msg receiver decrypts msg Authentication: sender, receiver want to confirm identity of each other Message Integrity: sender, receiver want to ensure message not altered (in transit, or afterwards) without detection SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 6

4 Internet security threats Packet sniffing: broadcast media promiscuous NIC reads all packets passing by can read all unencrypted data (e.g. passwords) e.g.: C sniffs B s packets A C src:b dest:a payload B SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 7 Internet security threats IP Spoofing: can generate raw IP packets directly from application, putting any value into IP source address field receiver can t tell if source is spoofed e.g.: C pretends to be B A C src:b dest:a payload B SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 8

5 Internet security threats Denial of service (DOS): flood of maliciously generated packets swamp receiver Distributed DOS (DDOS): multiple coordinated sources swamp receiver e.g., C and remote host SYN-attack A A C SYN SYN SYN SYN SYN SYN SYN SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 9 B The language of cryptography plaintext K K Figure A 7.3 goes here B ciphertext plaintext symmetric key crypto: sender, receiver keys identical public-key crypto: encrypt key public, decrypt key secret SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 10

6 Symmetric key cryptography substitution cipher: substituting one thing for another monoalphabetic cipher: substitute one letter for another plaintext: abcdefghijklmnopqrstuvwxyz ciphertext: mnbvcxzasdfghjklpoiuytrewq E.g.: Plaintext: bob. i love you. alice ciphertext: nkn. s gktc wky. mgsbc SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 11 Symmetric key crypto: DES DES: Data Encryption Standard 56-bit symmetric key, 64 bit plaintext input How secure is DES? DES Challenge: 56-bit-key-encrypted phrase ( Strong cryptography makes the world a safer place ) decrypted (brute force) in 4 months no known backdoor decryption approach making DES more secure use three keys sequentially (3-DES) on each datum use cipher-block chaining SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 12

7 Public Key Cryptography symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if never met )? public key cryptography radically different approach [Diffie- Hellman76, RSA78] sender, receiver do not share secret key encryption key public (known to all) decryption key private (known only to receiver) SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 13 Public key cryptography Figure 7.7 goes here SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 14

8 Public key encryption algorithms Two inter-related requirements: 1.. B B d need (e (m)) d ( ) = and m e ( ) such that B B 2 need public and private keys.. for d ( ) and e ( ) B B RSA: Rivest, Shamir, Adelson algorithm SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 15 RSA: Choosing keys 1. Choose two large prime numbers p, q. (e.g., 1024 bits each) 2. Compute n = pq, z = (p-1)(q-1) 3. Choose e (with e<n) that has no common factors with z. (e, z are relatively prime ). 4. Choose d such that ed-1 is exactly divisible by z. (in other words: ed mod z = 1 ). 5. Public key is (n,e). Private key is (n,d). SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 16

9 RSA: Encryption, decryption 0. Given (n,e) and (n,d) as computed above 1. To encrypt bit pattern, m, compute c = m e e mod n (i.e., remainder when m is divided by n) 2. To decrypt received bit pattern, c, compute m = c d mod n (i.e., remainder when c d is divided by n) Magic happens! m = (m e d mod n) mod n SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 17 RSA example: Bob chooses p=5, q=7. Then n=35, z=24. e=5 (so e, z relatively prime). d=29 (so ed-1 exactly divisible by z. encrypt: letter m m e c = m e mod n l decrypt: c c d m = c d mod n letter l SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 18

10 RSA: Why: m = (m e d mod n) mod n Number theory result: If p,q prime, n = pq, then y ymod (p-1)(q-1) x mod n = x mod n e (m mod n) d mod n = m ed mod n ed mod (p-1)(q-1) = m mod n (using number theory result above) 1 = m mod n (since we chose ed to be divisible by (p-1)(q-1) with remainder 1 ) = m SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 19 Authentication Goal: Bob wants Alice to prove her identity to him Protocol ap1.0: Alice says I am Alice Failure scenario?? SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 20

11 Authentication Failure Protocol ap1.0: Trudy says I am Alice SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 21 Authentication: another try Protocol ap2.0: Alice says I am Alice and sends her IP address along to prove it. Failure scenario?? SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 22

12 Authentication: another try Failure Protocol ap2.0: Trudy says I am Alice and sends Alice s IP address along to prove it. SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 23 Authentication: another try Protocol ap3.0: Alice says I am Alice and sends her secret password to prove it. Failure scenario? SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 24

13 Authentication: another try Failure Protocol ap3.0: Trudy says I am Alice and sends Alice s secret password to prove it. SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 25 Authentication: yet another try Protocol ap3.1: Alice says I am Alice and sends her encrypted secret password to prove it. I am Alice encrypt password Failure scenario? SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 26

14 Authentication: yet another try Failure Protocol ap3.1: Alice says I am Alice and sends Alice s encrypted secret password to prove it. I am Alice encrypt password I am Alice encrypt password SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 27 Authentication: yet another try Goal: avoid playback attack Nonce: number (R) used onlyonce in a lifetime ap4.0: to prove Alice live, Bob sends Alice nonce, R. Alice must return R, encrypted with shared secret key Failures, drawbacks? SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 28

15 Authentication: ap5.0 ap4.0 requires shared symmetric key problem: how do Bob, Alice agree on key can we authenticate using public key techniques? ap5.0: use nonce, public key cryptography Figure 7.12 goes here SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 29 ap5.0: security hole Man (woman) in the middle attack: Trudy poses as Alice (to Bob) and as Bob (to Alice) Figure 7.14 goes here Need certified public keys SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 30

16 Cryptographic technique analogous to handwritten signatures. Sender (Bob) digitally signs document, establishing he is document owner/creator. Verifiable, nonforgeable: recipient (Alice) can verify that Bob, and no one else, signed document. Digital Signatures Simple digital signature for message m: Bob encrypts m with his public key d B, creating signed message, d B (m). Bob sends m and d B (m) to Alice. SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 31 Digital Signatures (more) Suppose Alice receives msg m, and digital signature d B (m) Alice verifies m signed by Bob by applying Bob s public key e B to d B (m) then checks e B (d B (m) ) = m. If e B (d B (m) ) = m, whoever signed m must have used Bob s private key. Alice thus verifies that: Bob signed m. No one else signed m. Bob signed m and not m. Non-repudiation: Alice can take m, and signature d B (m) to court and prove that Bob signed m. SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 32

17 Message Digests Computationally expensive to public-key-encrypt long messages Goal: fixedlength,easy to compute digital signature, fingerprint apply hash function H to m, get fixed size message digest, H(m). Hash function properties: Many-to-1 Produces fixed-size msg digest (fingerprint) Given message digest x, computationally infeasible to find m such that x = H(m) computationally infeasible to find any two messages m and m such that H(m) = H(m ). SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 33 Digital signature = Signed message digest Bob sends digitally signed message: Alice verifies signature and integrity of digitally signed message: SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 34

18 Internet checksum would make a poor message digest. Too easy to find two messages with same checksum. Hash Function Algorithms MD5 hash function widely used. Computes 128-bit message digest in 4-step process. arbitrary 128-bit string x, appears difficult to construct msg m whose MD5 hash is equal to x. SHA-1 is also used. US standard 160-bit message digest SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 35 Problem: Trusted Intermediaries How do two entities establish shared secret key over network? Solution: trusted key distribution center (KDC) acting as intermediary between entities Problem: When Alice obtains Bob s public key (from web site, e- mail, diskette), how does she know it is Bob s public key, not Trudy s? Solution: trusted certification authority (CA) SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 36

19 Key Distribution Center (KDC) Alice,Bob need shared symmetric key. KDC: server shares different secret key with each registered user. Alice, Bob know own symmetric keys, K A-KDC K B-KDC, for communicating with KDC. Alice communicates with KDC, gets session key R1, and K B- KDC (A,R1) Alice sends Bob K B-KDC (A,R1), Bob extracts R1 Alice, Bob now share the symmetric key R1. SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 37 Certification authority (CA) binds public key to particular entity. Entity (person, router, etc.) can register its public key with CA. Entity provides proof of identity to CA. CA creates certificate binding entity to public key. Certificate digitally signed by CA. Certification Authorities When Alice wants Bob s public key: gets Bob s certificate (Bob or elsewhere). Apply CA s public key to Bob s certificate, get Bob s public key SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 38

20 Secure Alice wants to send secret message, m, to Bob. generates random symmetric private key, K S. encrypts message with K S also encrypts K S with Bob s public key. sends both K S (m) and e B (K S ) to Bob. SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 39 Secure (continued) Alice wants to provide sender authentication message integrity. Alice digitally signs message. sends both message (in the clear) and digital signature. SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 40

21 Secure (continued) Alice wants to provide secrecy, sender authentication, message integrity. Note: Alice uses both her private key, Bob s public key. SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 41 Pretty good privacy (PGP) Internet encryption scheme, a de-facto standard. Uses symmetric key cryptography, public key cryptography, hash function, and digital signature as described. Provides secrecy, sender authentication, integrity. Inventor, Phil Zimmerman, was target of 3-year federal investigation. A PGP signed message: ---BEGIN PGP SIGNED MESSAGE--- Hash: SHA1 Bob:My husband is out of town tonight.passionately yours, Alice ---BEGIN PGP SIGNATURE--- Version: PGP 5.0 Charset: noconv yhhjrhhgjghgg/12epj+lo8ge4vb3mqj hfevzp9t6n7g6m5gw2 ---END PGP SIGNATURE--- SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 42

22 Secure sockets layer (SSL) PGP provides security for a specific network app. SSL works at transport layer. Provides security to any TCP-based app using SSL services. SSL: used between WWW browsers, servers for I- commerce (shttp). SSL security services: server authentication data encryption client authentication (optional) Server authentication: SSL-enabled browser includes public keys for trusted CAs. Browser requests server certificate, issued by trusted CA. Browser uses CA s public key to extract server s public key from certificate. Visit your browser s security menu to see its trusted CAs. SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 43 Encrypted SSL session: Browser generates symmetric session key, encrypts it with server s public key, sends encrypted key to server. Using its private key, server decrypts session key. Browser, server agree that future msgs will be encrypted. All data sent into TCP socket (by client or server) i encrypted with session key. SSL (continued) SSL: basis of IETF Transport Layer Security (TLS). SSL can be used for non- Web applications, e.g., IMAP. Client authentication can be done with client certificates. SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 44

23 Secure electronic transactions (SET) designed for payment-card transactions over Internet. provides security services among 3 players: customer merchant merchant s bank All must have certificates. SET specifies legal meanings of certificates. apportionment of liabilities for transactions SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 45 Customer s card number passed to merchant s bank without merchant ever seeing number in plain text. Prevents merchants from stealing, leaking payment card numbers. Three software components: Browser wallet Merchant server Acquirer gateway See text for description of SET transaction. Ipsec: Network Layer Security Network-layer secrecy: sending host encrypts the data in IP datagram TCP and UDP segments; ICMP and SNMP messages. Network-layer authentication destination host can authenticate source IP address Two principle protocols: authentication header (AH) protocol encapsulation security payload (ESP) protocol For both AH and ESP, source, destination handshake: create network-layer logical channel called a service agreement (SA) Each SA unidirectional. Uniquely determined by: security protocol (AH or ESP) source IP address 32-bit connection ID SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 46

24 Provides secrecy, host authentication, data integrity. Data, ESP trailer encrypted. Next header field is in ESP trailer. ESP Protocol ESP authentication field is similar to AH authentication field. Protocol = 50. SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 47 Authentication Header (AH) Protocol Provides source host AH header includes: authentication, data integrity, connection identifier but not secrecy. AH header inserted between IP header and IP data field. Protocol field = 51. Intermediate routers process datagrams as usual. authentication data: signed message digest, calculated over original IP datagram, providing source authentication, data integrity. Next header field: specifies type of data (TCP, UDP, ICMP, etc.) SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 48

25 Application Security (summary) Basic techniques... cryptography (symmetric and public) authentication message integrity. used in many different security scenarios secure secure transport (SSL) IP sec See also: firewalls, in network management SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 49 Wireless Application Networks SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 50

26 laptops, PDAs What is wireless networking? Wireless communications allows novel classes of applications Not simply computer-to-computer Ubiquitous scenarios Interdisciplinary applications In same case, is the communication paradigm that makes the difference (no killer applications) SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 51 Wireless Data Vision Region TAXI City Campus In-Building Seamless Multimedia Networks with Mobility and Freedom from Tethers [R. Katz, "Does Wireless Data Have a Future?", Plenary Talk, INFOCOM '96] SUPSI-DTI Silvia Giordano 8C Cimini-7/98

27 Ubiquitous and Pervasive Computing The environment saturated with computing (ubiquitous) and communications capabilities (pervasive) to make intelligent decisions in automated, context-aware manner Technology transparently weaved into the fabric of our daily lives technology that disappears. (Weiser 1990) Portable devices around users networked with personal area networks e sensors networks Environment that takes care of itself or users (proactive) Examples: Smart home, office, mall, hotel, hospital, park, airport SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 53 Ubiquitous Computing one computer for many one computer for one many computers for one SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 54

28 Examples of Wireless & Mobile Applications Vehicles transmission of news, road condition etc ad-hoc network with near vehicles to prevent accidents Emergencies early transmission of patient data to the hospital ad-hoc network in case of earthquakes, cyclones military... Healthy direct communication with hospitals constant personal monitoring electronic information to doctors SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 55 Design Challenges Wireless Communication brings challenges to mobile computing because of Disconnections Low Bandwidth High Bandwidth Variability Heterogeneous Networks Security Risks High Layers Dependences Mobile Systems and Applications should consider these issues for good operation/functionality performance availability SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 56

29 Disconnections Todays computers depend heavily on network Network File Systems, ftp servers, telnet serves, X- servers, Web servers Network failure will stall the applications and systems Network failure is greater concern for mobile computing Disconnections can be much more frequent SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 57 Disconnections There is trade-off between autonomy and distributed computing The more autonomous the mobile computers, the better they can tolerate to network disconnections However, since mobile computer resources are scarce and limited, it is preferable to use the network and network services as much as possible to off-load computation and storage to network For example using a network file system prevents storing all the files in the local mobile computer SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 58

30 Disconnections Code File System is a good example of handling network disconnections Designed as a file system for mobile computers like laptops Information from user profiles is used to locally cache best selection of files on the mobile computer A whole file is cached (not only some blocks) Optimistic caching scheme is used Users can update the cached copies Studies show that only rarely (1%) are files actually shared and written to in a distributed system When network reconnects, the cache is automatically reconciled with the master copy in the server. SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 59 Disconnections Hoarding: Periodically a good set of files are copied from the master repository at the server to the mobile computer cache. The mobile users make their updates on the files All events are logged into a log file. When network reconnects, the log file is used to merge the updates and to make the caches consistent. SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 60

31 Low bandwidth Mobile computing designs need to be more concerned about network bandwidth consumption and constraints than designs for stationary computing Wireless networks deliver lower bandwidth than wired networks 1 Mbps Infrared communication Mbps wireless local radio communications (shared) 9.6 Kbps for wide-area wireless communication Wired networks Mbps for Ethernet 100 Mbps for FDDI 155 Mbps for ATM 1 Gbps for Gigabit Ethernet SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 61 Low bandwidth To increase the system s effective bandwidth per user 1) Use small areas with many APs OR 2) Use different frequencies with overlapping areas Weiser defined the capacity of wireless network as Bandwidth provided per cubic meter There is a hardware tradeoff between bandwidth and coverage area Transmitters covering a smaller area achieve higher bandwidths SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 62

32 Low bandwidth Some software techniques to cope with low bandwidths Compress data that is to be transmitted Log the data, and use bulk transfers Bulk transfers are more efficient than many individual transfers in terms of bandwidth usage Lazy-write back of local caches of mobile computers may also reduce the network bandwidth demand Pre-fetching allows transferring the data ahead of need and thereby reduces the peek loads at time of many demands Scheduling packets on the wireless channels is also important. Priority should be given to packets that belong time-critical applications SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 63 High bandwidth variability High Bandwidth Variability Mobile computers face much more variability in effective bandwidth than stationary computers Bandwidth can shift 1 to 4 orders of magnitude between wired and wireless communication A mobile application can cope with this bandwidth variability in 3 ways Assuming availability of high bandwidth connections and operating only on wired networks Assuming low bandwidth connections and not taking advantage of wired access and high bandwidths Adapting to the currently available bandwidth: providing the user with a variable level of quality and detail SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 64

33 Heterogeneous Networks Stationary computers access the network over the same link for a long time No change in link characteristics: bandwidth, delay, lossrate Mobile computers encounters heterogeneous network connections Using different base stations Some have better quality and less number of users Using different wireless technologies Indoor: infrared link; Outdoor: wide-area radio link Cities: cellular network; Rural areas: satellite network SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 65 Security Risks It is much easier to connect to a wireless link than to connect to a wired link Two kind of security concerns Access control to wireless network You may not want other un-authorized people to access your wireless local area network at the company Use security protocols such as 802.1x that requires authentication of users to the Wireless LAN before they can transmit packets Prevent others to sniff and read the data packets that are sent over a wireless link Use encryption for data transmitted Shared keys are used (manual or automatic key management) SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 66

34 laptops, PDAs High Layers Dependences In wireless networks most of information could be useful to several layers: e.g. traffic type, channel perturbations, network status There is no more a strict separation among layers cross layering: joint optimization of protocols belonging to different layers Balance between cross-layering and traditional layer separation SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 67 From wireless toward pervasive Region TAXI City Campus In-Building Personal Area Network Body Area Network Sensor Network SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 68

35 From ubiquitous toward pervasive one computer for many one computer for one many computers for one any object communicate for one SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 69 Pervasive Computing The concept of Pervasive Computing is relies on the existences of computer networks that provides immersive communication in the environment Novel classes of networks with the capability of following the mobile users and to perceive the context Body Area Networks Personal Area Networks Sensor Networks SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 70

36 Novel Network technologies SUPSI-DTI Silvia Giordano Body Area Networks (BANs) Network that interconnects devices distributed onto the body of a person connects heterogeneous devices Personal Digital Assistant MP3 display, phones, etc supports different data types supports heterogeneous connections wired, wireless BODY AREA NETWORK SUPSI-DTI Silvia Giordano easy to use and set up protection for users privacy

37 Body Area Networks (BANs) Human body as media for data transmission a small device creates the power through the body the modulation allows the data transmission 100 Kbps Possible applications: data exchange between 2 people with simple handshaking devices for users recognition doctor can recognize a patient and find his clinic files SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 73 Body Area Networks (BANs) MITHRIL Ethernet around user body microphone, video camera, infrared sensor, optical visor and micro-keyboard LEVIS ICD+ First example of commercial BAN. Cellular, MP3, phones e microphone integrated in a jacket and manageable by a single intelligent device wireless network represents the most flexible solutions for interconnection of wearable devices! SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 74

38 Personal Area Networks (PANs) Bluetooth 2.5GHz ISM band 10m range, 1mW transmit power 100m range, requires increase in transmit power 1 Mbps data rate shared between 7 devices FHSS spread spectrum use TDD duplex scheme Polling based multiple access Restricted start topology 1 master connects to 7 slaves SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 75 Personal Area Networks (PANs) wireless network with short range for external connection in ad hoc and reconfigurable fashion heterogeneous devices cellular, notebooks printers, home-devices video cameras, sensors, etc differentiated services dynamic external connection data security PERSONAL AREA NETWORK SUPSI-DTI Silvia Giordano

39 Personal Area Networks (PANs) TECHMOBILE IBM Example of PAN inside a car TSpaces: software system that allows communication, recognition, management and data transfer among car s devices BlueEyes: system for perceiving the user status ViaVoice: system for voice recognition BlueDrekar: system for remote car control SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 77 Sensor Networks Internet, Satellite, etc Task Manager Sink Sink Several thousands of nodes A sensor node is a battery-powered, wireless computer nodes are physically small (a few cubic centimeters) and use extremely low power SUPSI-DTI Silvia Giordano

40 Sensor Networks Applications Military, Environmental, Health, Home, Space Exploration, Chemical Processing, Disaster Relief. SENSOR TYPES: Seismic, Low sampling rate magnetic, Thermal, Visual, Infrared, Acoustic, Radar SENSOR TASKS: Temperature, Humidity, Vehicular Movement, Lightning Condition, Pressure, Soil Makeup, Noise Levels, Presence or Absence of Certain Types of Objects, Mechanical Stress Levels on Attached Objects, Current Characteristics Speed, Direction, Size) of an Object. SUPSI-DTI Silvia Giordano Summary Internet applications are already running on the network There are new aspects relevant for applications: Security Wireless SUPSI-DTI Silvia Giordano 10/06/2004 Security, Network Management and Wireless 80

14. Internet Security (J. Kurose)

14. Internet Security (J. Kurose) 14. Internet Security (J. Kurose) 1 Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer:

More information

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography Chapter 7: Network security 15-441 Computer Networking Network Security: Cryptography, Authentication, Integrity Foundations: what is security? cryptography authentication message integrity key distribution

More information

Internet and Intranet Protocols and Applications

Internet and Intranet Protocols and Applications Internet and Intranet Protocols and Applications Lecture 10: Internet and Network Security April 9, 2003 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu What is network

More information

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005 Lecture 30 Security April 11, 2005 Cryptography K A ciphertext Figure 7.3 goes here K B symmetric-key crypto: sender, receiver keys identical public-key crypto: encrypt key public, decrypt key secret Symmetric

More information

Network Security. Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2002.

Network Security. Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2002. Network Security Computer Networking: A Top Down Approach Featuring the Internet, 1. What is network security 2. Principles of cryptography 3. Authentication 4. Integrity 5. Key Distribution and certification

More information

Encryption. INST 346, Section 0201 April 3, 2018

Encryption. INST 346, Section 0201 April 3, 2018 Encryption INST 346, Section 0201 April 3, 2018 Goals for Today Symmetric Key Encryption Public Key Encryption Certificate Authorities Secure Sockets Layer Simple encryption scheme substitution cipher:

More information

Chapter 8. Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004.

Chapter 8. Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. Chapter 8 Network Security A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and

More information

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Chapter 8 Security A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and can add,

More information

CSC 8560 Computer Networks: Network Security

CSC 8560 Computer Networks: Network Security CSC 8560 Computer Networks: Network Security Professor Henry Carter Fall 2017 Last Time We talked about mobility as a matter of context: How is mobility handled as you move around a room? Between rooms

More information

Chapter 8 Network Security

Chapter 8 Network Security Chapter 8 Network Security A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and

More information

Kurose & Ross, Chapters (5 th ed.)

Kurose & Ross, Chapters (5 th ed.) Kurose & Ross, Chapters 8.2-8.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) Addison-Wesley, April 2009. Copyright 1996-2010, J.F Kurose and

More information

SECURITY IN NETWORKS 1

SECURITY IN NETWORKS 1 SECURITY IN NETWORKS 1 GOALS Understand principles of network security: Cryptography and its many uses beyond con dentiality Authentication Message integrity 2. 1 WHAT IS NETWORK SECURITY? Con dentiality:

More information

SECURITY IN NETWORKS

SECURITY IN NETWORKS SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond con dentiality Authentication Message integrity WHAT IS NETWORK SECURITY? Con dentiality: only

More information

CS 332 Computer Networks Security

CS 332 Computer Networks Security CS 332 Computer Networks Security Professor Szajda Last Time We talked about mobility as a matter of context: How is mobility handled as you move around a room? Between rooms in the same building? As your

More information

Computer Communication Networks Network Security

Computer Communication Networks Network Security Computer Communication Networks Network Security ICEN/ICSI 416 Fall 2016 Prof. Dola Saha 1 Network Security Goals: understand principles of network security: cryptography and its many uses beyond confidentiality

More information

The Network Security Model. What can an adversary do? Who might Bob and Alice be? Computer Networks 12/2/2009. CSC 257/457 - Fall

The Network Security Model. What can an adversary do? Who might Bob and Alice be? Computer Networks 12/2/2009. CSC 257/457 - Fall The Network Security Model Bob and lice want to communicate securely. Trudy (the adversary) has access to the channel. Kai Shen lice data channel secure sender data, control s secure receiver Bob data

More information

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

ח'/סיון/תשע א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms Public Key Cryptography Kurose & Ross, Chapters 8.28.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) AddisonWesley, April 2009. Copyright 19962010,

More information

CS Computer Networks 1: Authentication

CS Computer Networks 1: Authentication CS 3251- Computer Networks 1: Authentication Professor Patrick Traynor 4/14/11 Lecture 25 Announcements Homework 3 is due next class. Submit via T-Square or in person. Project 3 has been graded. Scores

More information

Ref:

Ref: Cryptography & digital signature Dec. 2013 Ref: http://cis.poly.edu/~ross/ 2 Cryptography Overview Symmetric Key Cryptography Public Key Cryptography Message integrity and digital signatures References:

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Chapter 8 Network Security Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.

More information

Security: Focus of Control. Authentication

Security: Focus of Control. Authentication Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized

More information

Security: Focus of Control

Security: Focus of Control Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 7. Network Security Network Attacks Cryptographic Technologies Message Integrity and Authentication Key Distribution Firewalls Transport Layer

More information

Welcome to CS 395/495 Internet Security: A Measurement-based Approach

Welcome to CS 395/495 Internet Security: A Measurement-based Approach Welcome to CS 395/495 Internet Security: A Measurement-based Approach Why Internet Security Internet attacks are increasing in frequency, severity and sophistication Denial of service (DoS) attacks Cost

More information

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005 Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks

More information

System and Network Security

System and Network Security System and Network Giuseppe Anastasi g.anastasi@iet.unipi.it Pervasive Computing & Networking Lab. () Dept. of Information Engineering, University of Pisa Based on original slides by - Silberschatz, Galvin

More information

Security issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS.

Security issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS. Security issues: Threats Methods of attack Encryption algorithms Secret-key Public-key Hybrid protocols Lecture 15 Page 2 1965-75 1975-89 1990-99 Current Platforms Multi-user timesharing computers Distributed

More information

COSC : mobility within same subnet. Lecture 26. H1 remains in same IP subnet: IP address can remain same

COSC : mobility within same subnet. Lecture 26. H1 remains in same IP subnet: IP address can remain same Lecture 26 802.11: mobility within same subnet H1 remains in same IP subnet: IP address can remain same switch: which AP is associated with H1? self learning (Ch. 5): switch will see frame from H1 and

More information

Chapter 8 Security. Computer Networking: A Top Down Approach. Andrei Gurtov. 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016

Chapter 8 Security. Computer Networking: A Top Down Approach. Andrei Gurtov. 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 Chapter 8 Andrei Gurtov All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley

More information

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security 1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by

More information

"$% "& & Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved. 8: Network Security 8-1

$% & & Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved. 8: Network Security 8-1 A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete slides (including this

More information

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Chapter 8 Security A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and can add,

More information

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Hello and welcome to today's lecture on secured communication.

More information

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

key distribution requirements for public key algorithms asymmetric (or public) key algorithms topics: cis3.2 electronic commerce 24 april 2006 lecture # 22 internet security (part 2) finish from last time: symmetric (single key) and asymmetric (public key) methods different cryptographic systems

More information

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Int ernet w orking Internet Security Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Internet Security Internet security is difficult Internet protocols were not originally designed for security The

More information

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Overview Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message

More information

EEC-682/782 Computer Networks I

EEC-682/782 Computer Networks I EEC-682/782 Computer Networks I Lecture 24 Wenbing Zhao wenbingz@gmail.com http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB

More information

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any

More information

Modern cryptography 2. CSCI 470: Web Science Keith Vertanen

Modern cryptography 2. CSCI 470: Web Science Keith Vertanen Modern cryptography 2 CSCI 470: Web Science Keith Vertanen Modern cryptography Overview Asymmetric cryptography Diffie-Hellman key exchange (last time) Pubic key: RSA Pretty Good Privacy (PGP) Digital

More information

L13. Reviews. Rocky K. C. Chang, April 10, 2015

L13. Reviews. Rocky K. C. Chang, April 10, 2015 L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing

More information

Chapter 8 Security. Computer Networking: A Top Down Approach

Chapter 8 Security. Computer Networking: A Top Down Approach Chapter 8 A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and can add,

More information

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Chapter 8 Security A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and can add,

More information

CSC 4900 Computer Networks: Security Protocols (2)

CSC 4900 Computer Networks: Security Protocols (2) CSC 4900 Computer Networks: Security Protocols (2) Professor Henry Carter Fall 2017 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message Integrity 8.4 End point Authentication

More information

Network Security. Chapter 8. MYcsvtu Notes.

Network Security. Chapter 8. MYcsvtu Notes. Network Security Chapter 8 Network Security Some people who cause security problems and why. Cryptography Introduction Substitution ciphers Transposition ciphers One-time pads Fundamental cryptographic

More information

Issues. Separation of. Distributed system security. Security services. Security policies. Security mechanism

Issues. Separation of. Distributed system security. Security services. Security policies. Security mechanism Module 9 - Security Issues Separation of Security policies Precise definition of which entities in the system can take what actions Security mechanism Means of enforcing that policy Distributed system

More information

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology Question Bank Subject: Information Security (160702) Class: BE Sem. VI (CE/IT) Unit-1: Conventional

More information

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010 Cryptography Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction

More information

Internet Technology. Security

Internet Technology. Security Uni Innsbruck Informatik - 1 Internet Technology Security Michael Welzl michael.welzl@uibk.ac.at DPS NSG Team http://dps.uibk.ac.at dps.uibk.ac.at/nsg Institute of Computer Science University of Innsbruck,

More information

On the Internet, nobody knows you re a dog.

On the Internet, nobody knows you re a dog. On the Internet, nobody knows you re a dog. THREATS TO DISTRIBUTED APPLICATIONS 1 Jane Q. Public Big Bank client s How do I know I am connecting to my bank? server s Maybe an attacker...... sends you phishing

More information

COSC4377. Chapter 8 roadmap

COSC4377. Chapter 8 roadmap Lecture 28 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7

More information

Network Security Chapter 8

Network Security Chapter 8 Network Security Chapter 8 Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Communication Security Authentication Protocols Email Security Web Security

More information

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads Cryptography p y Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction

More information

Internet security and privacy

Internet security and privacy Internet security and privacy IPsec 1 Layer 3 App. TCP/UDP IP L2 L1 2 Operating system layers App. TCP/UDP IP L2 L1 User process Kernel process Interface specific Socket API Device driver 3 IPsec Create

More information

EEC-682/782 Computer Networks I

EEC-682/782 Computer Networks I EEC-682/782 Computer Networks I Lecture 25 Wenbing Zhao wenbingz@gmail.com http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB

More information

UNIT - IV Cryptographic Hash Function 31.1

UNIT - IV Cryptographic Hash Function 31.1 UNIT - IV Cryptographic Hash Function 31.1 31-11 SECURITY SERVICES Network security can provide five services. Four of these services are related to the message exchanged using the network. The fifth service

More information

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography Principles of Information Security, Fourth Edition Chapter 8 Cryptography Learning Objectives Upon completion of this material, you should be able to: Chronicle the most significant events and discoveries

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

Introduction and Overview. Why CSCI 454/554?

Introduction and Overview. Why CSCI 454/554? Introduction and Overview CSCI 454/554 Why CSCI 454/554? Get Credits and Graduate Security is important More job opportunities More research funds 1 Workload Five homework assignments Two exams (open book

More information

Chapter 8 Network Security. Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.

Chapter 8 Network Security. Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009. Chapter 8 Network Security Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009. Chapter 8: Network Security Chapter goals: understand principles of

More information

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1 IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service

More information

Chapter 8 Network Security

Chapter 8 Network Security Advanced Computer Networking Graduate Course from Electrical Engineering School A. Beheshti Communication Group Iran University of Science and Technology Chapter 8 Text Book: Computer Networking: A Top

More information

Information Security. message M. fingerprint f = H(M) one-way hash. 4/19/2006 Information Security 1

Information Security. message M. fingerprint f = H(M) one-way hash. 4/19/2006 Information Security 1 Information Security message M one-way hash fingerprint f = H(M) 4/19/2006 Information Security 1 Outline and Reading Digital signatures Definition RSA signature and verification One-way hash functions

More information

From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design. Edition 4 Pearson Education 2005

From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design. Edition 4 Pearson Education 2005 Chapter 7: Security From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4 Introduction Security policies Provide for the sharing of resources within specified limits

More information

CS 356 Internet Security Protocols. Fall 2013

CS 356 Internet Security Protocols. Fall 2013 CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5

More information

Chapter 8 Network Security

Chapter 8 Network Security Chapter 8 Network Security A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and

More information

Chapter 4: Securing TCP connections

Chapter 4: Securing TCP connections Managing and Securing Computer Networks Guy Leduc Chapter 5: Securing TCP connections Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley, March 2012. (section

More information

8. Network Layer Contents

8. Network Layer Contents Contents 1 / 43 * Earlier Work * IETF IP sec Working Group * IP Security Protocol * Security Associations * Authentication Header * Encapsulation Security Payload * Internet Key Management Protocol * Modular

More information

E-commerce security: SSL/TLS, SET and others. 4.1

E-commerce security: SSL/TLS, SET and others. 4.1 E-commerce security: SSL/TLS, SET and others. 4.1 1 Electronic payment systems Purpose: facilitate the safe and secure transfer of monetary value electronically between multiple parties Participating parties:

More information

Public Key Algorithms

Public Key Algorithms Public Key Algorithms 1 Public Key Algorithms It is necessary to know some number theory to really understand how and why public key algorithms work Most of the public key algorithms are based on modular

More information

Security in Distributed Systems. Network Security

Security in Distributed Systems. Network Security Security in Distributed Systems Introduction Cryptography Authentication Key exchange Readings: Tannenbaum, chapter 8 Ross/Kurose, Ch 7 (available online) Computer Science Lecture 22, page 1 Network Security

More information

Sample excerpt. Virtual Private Networks. Contents

Sample excerpt. Virtual Private Networks. Contents Contents Overview...................................................... 7-3.................................................... 7-5 Overview of...................................... 7-5 IPsec Headers...........................................

More information

Verteilte Systeme (Distributed Systems)

Verteilte Systeme (Distributed Systems) Verteilte Systeme (Distributed Systems) Lorenz Froihofer l.froihofer@infosys.tuwien.ac.at http://www.infosys.tuwien.ac.at/teaching/courses/ VerteilteSysteme/ Security Threats, mechanisms, design issues

More information

CSC 8560 Computer Networks: Security Protocols

CSC 8560 Computer Networks: Security Protocols CSC 8560 Computer Networks: Security Protocols Professor Henry Carter Fall 2017 CATS Reports Now available online! Go to MyNova -> Blackboard Learn -> Course Evaluations Take 10 minutes Will not be visible

More information

Network Encryption 3 4/20/17

Network Encryption 3 4/20/17 The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

David Wetherall, with some slides from Radia Perlman s security lectures.

David Wetherall, with some slides from Radia Perlman s security lectures. David Wetherall, with some slides from Radia Perlman s security lectures. djw@cs.washington.edu Networks are shared: Want to secure communication between legitimate participants from others with (passive

More information

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2. P2 Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE 802.11i, IEEE 802.1X P2.2 IP Security IPsec transport mode (host-to-host), ESP and

More information

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography CSCI 454/554 Computer and Network Security Topic 5.2 Public Key Cryptography Outline 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard 2 Introduction Public Key Cryptography

More information

Lecture 2 Applied Cryptography (Part 2)

Lecture 2 Applied Cryptography (Part 2) Lecture 2 Applied Cryptography (Part 2) Patrick P. C. Lee Tsinghua Summer Course 2010 2-1 Roadmap Number theory Public key cryptography RSA Diffie-Hellman DSA Certificates Tsinghua Summer Course 2010 2-2

More information

BCA III Network security and Cryptography Examination-2016 Model Paper 1

BCA III Network security and Cryptography Examination-2016 Model Paper 1 Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 1 M.M:50 The question paper contains 40 multiple choice questions with four choices and student will have to pick the correct

More information

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA CSCI 454/554 Computer and Network Security Topic 5.2 Public Key Cryptography 1. Introduction 2. RSA Outline 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard 2 Introduction Public Key Cryptography

More information

Key Exchange. References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings

Key Exchange. References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings Key Exchange References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings Outlines Primitives Root Discrete Logarithm Diffie-Hellman ElGamal Shamir s Three Pass

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,

More information

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption and secure channel May 17, 2018 1 / 45 1 2 3 4 5 2 / 45 Introduction Simplified model for and decryption key decryption key plain text X KE algorithm KD Y = E(KE, X ) decryption ciphertext algorithm X

More information

Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 1: Overview What is Cryptography? Cryptography is the study of

More information

Applied Networks & Security

Applied Networks & Security Applied Networks & Security Crypto with Critical Analysis http://condor.depaul.edu/~jkristof/it263/ John Kristoff jtk@depaul.edu IT 263 Winter 2006/2007 John Kristoff - DePaul University 1 Critical analysis

More information

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National

More information

Network Security and Cryptography. December Sample Exam Marking Scheme

Network Security and Cryptography. December Sample Exam Marking Scheme Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers

More information

CSC/ECE 774 Advanced Network Security

CSC/ECE 774 Advanced Network Security Computer Science CSC/ECE 774 Advanced Network Security Topic 2. Network Security Primitives CSC/ECE 774 Dr. Peng Ning 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange;

More information

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d) Outline AIT 682: Network and Systems Security 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard Topic 5.2 Public Key Cryptography Instructor: Dr. Kun Sun 2 Public Key

More information

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls 32.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 32.2 Figure 32.1 Common structure

More information

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK UNIT-1 1. Answer the following: a. What is Non-repudiation b. Distinguish between stream and block ciphers c. List out the problems of one time pad d. Define

More information

PROTECTING CONVERSATIONS

PROTECTING CONVERSATIONS PROTECTING CONVERSATIONS Basics of Encrypted Network Communications Naïve Conversations Captured messages could be read by anyone Cannot be sure who sent the message you are reading Basic Definitions Authentication

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 24 April 16, 2012 CPSC 467b, Lecture 24 1/33 Kerberos Secure Shell (SSH) Transport Layer Security (TLS) Digital Rights Management

More information

Network Security - ISA 656 IPsec IPsec Key Management (IKE)

Network Security - ISA 656 IPsec IPsec Key Management (IKE) Network Security - ISA 656 IPsec IPsec (IKE) Angelos Stavrou September 28, 2008 What is IPsec, and Why? What is IPsec, and Why? History IPsec Structure Packet Layout Header (AH) AH Layout Encapsulating

More information

VPNs and VPN Technologies

VPNs and VPN Technologies C H A P T E R 1 VPNs and VPN Technologies This chapter defines virtual private networks (VPNs) and explores fundamental Internet Protocol Security (IPSec) technologies. This chapter covers the following

More information

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems History 2000 B.C. Egyptian Hieroglyphics Atbash - Hebrew Original alphabet mapped to different letter Type of Substitution Cipher

More information

Chapter 8 Web Security

Chapter 8 Web Security Chapter 8 Web Security Web security includes three parts: security of server, security of client, and network traffic security between a browser and a server. Security of server and security of client

More information