Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

Similar documents
Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Jaringan Komputer (IF8505) Pengamanan jaringan komputer. Cryptography

Network Security. Chapter 8. MYcsvtu Notes.

Network Security Chapter 8

Cryptography and Network Security

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

BCA III Network security and Cryptography Examination-2016 Model Paper 1

Introduction to information Security

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

EEC-682/782 Computer Networks I

Computer Networks SYLLABUS CHAPTER - 2 : NETWORK LAYER CHAPTER - 3 : INTERNETWORKING

L13. Reviews. Rocky K. C. Chang, April 10, 2015

APNIC elearning: Cryptography Basics

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

EEC-484/584 Computer Networks

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

Security: Focus of Control. Authentication

Introduction and Overview. Why CSCI 454/554?

Total No. of Questions : 09 ] [ Total No.of Pages : 02

14. Internet Security (J. Kurose)

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

Information Security CS 526

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Introduction to Cryptography. Vasil Slavov William Jewell College

10EC832: NETWORK SECURITY

Cryptography MIS

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

Security: Focus of Control

Chapter 8 Network Security

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Security Architecture. Lecture 13: Prof. Shervin Shirmohammadi CEG

Introduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

EEC-682/782 Computer Networks I

CSC 774 Network Security

CS 356 Internet Security Protocols. Fall 2013

EEC-682/782 Computer Networks I

KALASALINGAM UNIVERSITY

(2½ hours) Total Marks: 75

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

David Wetherall, with some slides from Radia Perlman s security lectures.

SRI VENKATESWARA COLLEGE OF ENGINEERING

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018

Security+ SY0-501 Study Guide Table of Contents

Internet security and privacy

Cryptographic Concepts

CRYPTOGRAPHY AND NETWORK SECURITY

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Internet and Intranet Protocols and Applications

CIS 6930/4930 Computer and Network Security. Final exam review

Data Security and Privacy. Topic 14: Authentication and Key Establishment

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Information Security: Principles and Practice Second Edition. Mark Stamp

Cipher Suite Configuration Mode Commands

Computer Security: Principles and Practice

Cryptography and Network Security

CSC/ECE 774 Advanced Network Security

Encryption. INST 346, Section 0201 April 3, 2018

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class

COSC4377. Chapter 8 roadmap

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

Ref:

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

Overview. SSL Cryptography Overview CHAPTER 1

Authentication Handshakes

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

Cryptography Functions

Grenzen der Kryptographie

Public Key Algorithms

CSC 474/574 Information Systems Security

CIS 6930/4930 Computer and Network Security. Topic 6.2 Authentication Protocols

1.264 Lecture 28. Cryptography: Asymmetric keys

Modern cryptography 2. CSCI 470: Web Science Keith Vertanen

Lecture 1 Applied Cryptography (Part 1)

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

WAP Security. Helsinki University of Technology S Security of Communication Protocols

Chapter 4: Securing TCP connections

NIST Cryptographic Toolkit

CS Computer Networks 1: Authentication

Chapter 6. IP Security. Dr. BHARGAVI H. GOSWAMI Department of Computer Science Christ University

Cryptography (Overview)

Kurose & Ross, Chapters (5 th ed.)

CCNA Security 1.1 Instructional Resource

Configuration of an IPSec VPN Server on RV130 and RV130W

Chapter 8 Web Security

Pretty Good Privacy (PGP

Threat Pragmatics & Cryptography Basics. PacNOG July, 2017 Suva, Fiji

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

Outline. Login w/ Shared Secret: Variant 1. Login With Shared Secret: Variant 2. Login Only Authentication (One Way) Mutual Authentication

PROTECTING CONVERSATIONS

Transcription:

Cryptography Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction to Cryptography Some people who cause security problems and why. The encryption model (for a symmetric-key cipher). Transposition Ciphers One-Time Pads A transposition cipher. The use of a one-time pad for encryption and the possibility of getting any possible plaintext from the ciphertext by the use of some other pad. 1

Quantum Cryptography Symmetric-Key Algorithms DES The Data Encryption Standard AES The Advanced Encryption Standard Cipher Modes Other Ciphers Cryptanalysis An example of quantum cryptography. Product Ciphers Data Encryption Standard Basic elements of product ciphers. (a) P-box. (b) S-box. (c) Product. The data encryption standard. (a) General outline. (b) Detail of one iteration. The circled + means exclusive OR. Triple DES AES The Advanced Encryption Standard Rules for AES proposals 1. The algorithm must be a symmetric block cipher. 2. The full design must be public. 3. Key lengths of 128, 192, and 256 bits supported. 4. Both software and hardware implementations required 5. The algorithm must be public or licensed on nondiscriminatory terms. (a) Triple encryption using DES. (b) Decryption. 2

AES (2) AES (3) An outline of Rijndael. Creating of the state and rk arrays. Electronic Code Book Mode Cipher Block Chaining Mode The plaintext of a file encrypted as 16 DES blocks. Cipher block chaining. (a) Encryption. (b) Decryption. Cipher Feedback Mode Stream Cipher Mode (a) Encryption. (c) Decryption. A stream cipher. (a) Encryption. (b) Decryption. 3

Counter Mode Cryptanalysis Encryption using counter mode. Some common symmetric-key cryptographic algorithms. Public-Key Algorithms RSA RSA Other Public-Key Algorithms An example of the RSA algorithm. Digital Signatures Symmetric-Key Signatures Symmetric-Key Signatures Public-Key Signatures Message Digests The Birthday Attack Digital signatures with Big Brother. 4

Public-Key Signatures Message Digests Digital signatures using public-key cryptography. Digital signatures using message digests. SHA-1 SHA-1 (2) Use of SHA-1 and RSA for signing nonsecret messages. (a) A message padded out to a multiple of 512 bits. (b) The output variables. (c) The word array. Management of Public Keys Problems with Public-Key Encryption Certificates X.509 Public Key Infrastructures A way for Trudy to subvert public-key encryption. 5

Certificates X.509 A possible certificate and its signed hash. The basic fields of an X.509 certificate. Public-Key Infrastructures Communication Security IPsec Firewalls Virtual Private Networks Wireless Security (a) A hierarchical PKI. (b) A chain of certificates. IPsec IPsec (2) The IPsec authentication header in transport mode for IPv4. (a) ESP in transport mode. (b) ESP in tunnel mode. 6

Firewalls Virtual Private Networks A firewall consisting of two packet filters and an application gateway. (a) A leased-line private network. (b) A virtual private network. 802.11 Security Authentication Protocols Authentication Based on a Shared Secret Key Establishing a Shared Key: Diffie-Hellman Authentication Using a Key Distribution Center Authentication Using Kerberos Authentication Using Public-Key Cryptography Packet encryption using WEP. Authentication Based on a Shared Secret Key Authentication Based on a Shared Secret Key (2) Two-way authentication using a challenge-response protocol. A shortened two-way authentication protocol. 7

Authentication Based on a Shared Secret Key (3) Authentication Based on a Shared Secret Key (4) The reflection attack. A reflection attack on the protocol of Fig. 8-32. Authentication Based on a Shared Secret Key (5) Establishing a Shared Key: The Diffie-Hellman Key Exchange Authentication using HMACs. The Diffie-Hellman key exchange. Establishing a Shared Key: The Diffie-Hellman Key Exchange Authentication Using a Key Distribution Center The bucket brigade or man-in-the-middle attack. A first attempt at an authentication protocol using a KDC. 8

Authentication Using a Key Distribution Center (2) Authentication Using a Key Distribution Center (3) The Needham-Schroeder authentication protocol. The Otway-Rees authentication protocol (slightly simplified). Authentication Using Kerberos Authentication Using Public-Key Cryptography The operation of Kerberos V4. Mutual authentication using public-key cryptography. E-Mail Security PGP Pretty Good Privacy PGP Pretty Good Privacy PEM Privacy Enhanced Mail S/MIME PGP in operation for sending a message. 9

PGP Pretty Good Privacy (2) Web Security Threats Secure Naming SSL The Secure Sockets Layer Mobile Code Security A PGP message. Secure Naming Secure Naming (2) (a) Normal situation. (b) An attack based on breaking into DNS and modifying Bob's record. How Trudy spoofs Alice's ISP. Secure DNS Self-Certifying Names An example RRSet for bob.com. The KEY record is Bob's public key. The SIG record is the top-level com server's signed has of the A and KEY records to verify their authenticity. A self-certifying URL containing a hash of server's name and public key. 10

SSL The Secure Sockets Layer SSL (2) Layers (and protocols) for a home user browsing with SSL. A simplified version of the SSL connection establishment subprotocol. SSL (3) Java Applet Security Data transmission using SSL. Applets inserted into a Java Virtual Machine interpreter inside the browser. Social Issues Anonymous Remailers Privacy Freedom of Speech Copyright Users who wish anonymity chain requests through multiple anonymous remailers. 11

Freedom of Speech Steganography Possibly banned material: 1. Material inappropriate for children or teenagers. 2. Hate aimed at various ethnic, religious, sexual, or other groups. 3. Information about democracy and democratic values. 4. Accounts of historical events contradicting the government's version. 5. Manuals for picking locks, building weapons, encrypting messages, etc. (a) Three zebras and a tree. (b) Three zebras, a tree, and the complete text of five plays by William Shakespeare. 12