Introduction to information Security

Similar documents
Cryptography and Network Security

10EC832: NETWORK SECURITY

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

APNIC elearning: Cryptography Basics

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

KALASALINGAM UNIVERSITY

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Study Guide to Mideterm Exam

Introduction and Overview. Why CSCI 454/554?

BCA III Network security and Cryptography Examination-2016 Model Paper 1

Cryptography and Network Security

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

Cryptography MIS

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Name of chapter & details.

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

Introduction to Cryptography. Vasil Slavov William Jewell College

Computer Security: Principles and Practice

CRYPTOGRAPHY AND NETWORK SECURITY

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

PESIT SOUTH CAMPUS 10IS835: INFORMATION AND NETWORK SECURITY. Faculty Name: Aisha Begam No. of Hours: 52

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

Winter 2011 Josh Benaloh Brian LaMacchia

CSC 474/574 Information Systems Security

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Network Security. Chapter 8. MYcsvtu Notes.

Computer and Data Security. Lecture 3 Block cipher and DES

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

CSCE 813 Internet Security Symmetric Cryptography

Jaringan Komputer (IF8505) Pengamanan jaringan komputer. Cryptography

Understanding Cryptography by Christof Paar and Jan Pelzl. Chapter 4 The Advanced Encryption Standard (AES) ver. October 28, 2009

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption

WAP Security. Helsinki University of Technology S Security of Communication Protocols

Data Encryption Standard (DES)

CSC 774 Network Security

Network Security Essentials Chapter 2

Cryptographic Concepts

Total No. of Questions : 09 ] [ Total No.of Pages : 02

Uses of Cryptography

Symmetric Encryption. Thierry Sans

CIS 4360 Secure Computer Systems Symmetric Cryptography

Classical Encryption Techniques

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan

Cryptography (Overview)

Cipher Suite Configuration Mode Commands

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

Symmetric Encryption Algorithms

Encryption Details COMP620

L3. An Introduction to Block Ciphers. Rocky K. C. Chang, 29 January 2015

SRI VENKATESWARA COLLEGE OF ENGINEERING

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

L13. Reviews. Rocky K. C. Chang, April 10, 2015

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some

Cryptography and Network Security

Cryptography and Network Security. Sixth Edition by William Stallings

Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard

1.264 Lecture 28. Cryptography: Asymmetric keys

Symmetric, Asymmetric, and One Way Technologies

David Wetherall, with some slides from Radia Perlman s security lectures.

EEC-682/782 Computer Networks I

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

Modern Symmetric Block cipher

CSE 127: Computer Security Cryptography. Kirill Levchenko

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Transport Level Security

Cryptography and Network Security Block Ciphers + DES. Lectured by Nguyễn Đức Thái

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Block Encryption and DES

(2½ hours) Total Marks: 75

Double-DES, Triple-DES & Modes of Operation

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Introduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Lecture 2: Secret Key Cryptography

Cryptography Functions

Delineation of Trivial PGP Security

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

Introduction to Modern Cryptography. Lecture 2. Symmetric Encryption: Stream & Block Ciphers

Network Security Chapter 8

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

Security. Communication security. System Security

Network Security Essentials

Classical Cryptography. Thierry Sans

Chapter 6: Contemporary Symmetric Ciphers

ECE596C: Handout #7. Analysis of DES and the AES Standard. Electrical and Computer Engineering, University of Arizona, Loukas Lazos

Block Ciphers. Lucifer, DES, RC5, AES. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk Block Ciphers 1

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Advanced Encryption Standard and Modes of Operation. Foundations of Cryptography - AES pp. 1 / 50

Cryptography and Network Security. Sixth Edition by William Stallings

page 1 Introduction to Cryptography Benny Pinkas Lecture 3 November 18, 2008 Introduction to Cryptography, Benny Pinkas

Internet and Intranet Protocols and Applications

Cryptographic Algorithms - AES

Overview. SSL Cryptography Overview CHAPTER 1

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

Introduction to Symmetric Cryptography

Transcription:

First lecture Introduction to information Security Why Computer and information Security Cryptography Secret key algorithms: DES/AES Public key algorithms: RSA One-way hash functions & message digests: MD5, SHA2

The Definition of information Security The Basic Components Security Threats and Attacks Security Policy and Mechanism

References Cryptography and Network Security, by William Stallings, 5rd Edition, Prentice Hall, 2010

Second lecture Classical and modern cryptography Overview of Cryptography Classical Symmetric Cipher Modern Symmetric Ciphers (DES)

Classification of Cryptography Secret Key vs. Secret Algorithm Cryptanalysis Scheme Unconditional vs. Computational Security Brute Force Search

Symmetric Cipher Model Requirements Caesar Cipher One-Time Pad Transposition Ciphers Rail Fence cipher Product Ciphers

Modern Symmetric Ciphers (DES) Block vs Stream Ciphers Block Cipher Principles Substitution-Permutation Ciphers Confusion and Diffusion Feistel Cipher Structure DES (Data Encryption Standard)

Third lecture Introduction to Practical Cryptography Stream Ciphers Properties Building Blocks Competitions Examples Uses Encryption of streaming data Random bit generation

Stream cipher Speed Initialization Keystream generation Resources memory, power, cpu Hardware, software suitability Stream Ciphers Approaches Feedback Shift Register

Stream Cipher Examples RC4 A5/1 A5/3 LILI Sober Trivium Lex

Lecture five Data Encryption Standard(DES) DES Background The Algorithm Keylength Weakness S-box Construction Future of DES Modes of Operation Message Authentication

Lecture six Advanced Encryption Standard Rijndael GF(256) ByteSub ShiftRow MixColumn Key Schedule Decrypting Rijndael AES

Lecture seven RSA Cryptography RSA Cryptography: Motivation RSA Cryptography: Mathematical Principles RSA Cryptography: The Basic System RSA Cryptography: Square and Multiply RSA Cryptography: General Security RSA Cryptography: The Factoring Problem RSA Cryptography: Key Length and Complexity RSA Cryptography: Digital Signatures

RSA Cryptography: Attacks RSA Cryptography: Weak Message Attacks RSA Cryptography: Short Exponent Attack RSA Cryptography: Side Channel Attacks

Lecture Eight Key management Key Establishment Symmeric key approaches Key distribution problem Key distribution center protocols Authenticated and key agreement protocols

Lecture nine Digital Signatures & Authentication Protocols Digital Signature Properties Direct Digital Signatures Arbitrated Digital Signatures Authentication Protocols Replay Attacks Using Symmetric Encryption Using Public-Key Encryption One-Way AuthenticationUsing Public-Key Encryption Digital Signature Algorithm (DSA)

Lecture Ten IT System Services Life cycle Communication encryption encrypting communications channels Link by- Link Encryption End-by End Encryption encrypting data for storage

Lecture 11 IP Security Benefits of IPSec IP Security architecture IPSec Services Key Management Oakley Protocol ISAKMP Protocol

Lecture 12 Electronic Mail Security Pretty Good Privacy (PGP) PGP Operation:Confidentiality & Authentication PGP Operation Compression PGP Operation Email Compatibility PGP Message Format PGP Key Management S/MIME (Secure/Multipurpose Internet Mail Extensions)

Lecture 13 Secure Electronic Transaction Credit Cards on the Internet Credit Card Protocols SET Business Requirements SET Transactions Key Technologies of SET Dual Signature for SET SET Supported Transactions

Lecture 14 The secure socket layer(ssl) Layer. Location of SSL in the TCP/IP protocol stack. SSL Phases Handshake protocol Record protocol

Lecture 15 Firewalls What is a Firewall? Classification of Firewall Firewalls Packet Filters Firewall Gateways Application-Level Filtering Firewalls - Circuit Level Gateway Dynamic Packet Filters Distributed Firewalls