CRYPTOGRAPHY AND NETWORK SECURITY

Save this PDF as:

Size: px
Start display at page:

Transcription

1 CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE SIXTH EDITION William Stallings International Edition contributions by Mohit P Tahiliani NITK Surathkal PEARSON Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo

2 CONTENTS Notation 11 Preface 13 Chapter Chapter Guide for Readers and Instructors 21 Outline of This Book 22 A Roadmap for Readers and Instructors 23 Internet and Web Resources 24 Standards 25 Overview 27 Computer Security Concepts 29 The OSI Security Architecture 34 Security Attacks 35 Security Services 37 Security Mechanisms 40 A Model for Network Security 42 Recommended Reading 44 Key Terms, Review Questions, and Problems 45 PART ONE SYMMETRIC CIPHERS 47 Chapter 2 Classical Encryption Techniques Symmetric Cipher Model Substitution Techniques Transposition Techniques Rotor Machines Steganography Recommended Reading Key Terms, Review Questions, and Problems 75 Chapter 3 Block Ciphers and the Data Encryption Standard Traditional Block Cipher Structure The Data Encryption Standard A DES Example The Strength of DES Block Cipher Design Principles Recommended Reading Key Terms, Review Questions, and Problems 101 Chapter 4 Basic Concepts in Number Theory and Finite Fields Divisibility and the Division Algorithm The Euclidean Algorithm 108 4

3 CONTENTS Modular Arithmetic Groups, Rings, and Fields Finite Fields of the Form GF(p) Polynomial Arithmetic Finite Fields of the Form GF(2") Recommended Reading Key Terms, Review Questions, and Problems 144 Appendix 4A The Meaning of mod 147 Chapter 5 Advanced Encryption Standard Finite Field Arithmetic AES Structure AES Transformation Functions AES Key Expansion An AES Example, AES Implementation Recommended Reading Key Terms, Review Questions, and Problems 180 Appendix 5A Polynomials with Coefficients in GF(2 8 ) 182 Appendix 5.13 Simplified AES 184 Chapter 6 Block Cipher Operation Multiple Encryption and Triple DES Electronic Code book Cipher Block Chaining Mode Cipher Feedback Mode Output Feedback Mode Counter Mode XTS-AES Mode for Block-Oriented Storage Devices Recommended Reading Key Terms, Review Questions, and Problems 218 Chapter 7 Pseudorandom Number Generation and Stream Ciphers Principles of Pseudorandom Number Generation Pseudorandom Number Generators Pseudorandom Number Generation Using a Block Cipher Stream Ciphers RC True Random Number Generators Recommended Reading Key Terms, Review Questions, and Problems 248 PART TWO ASYMMETRIC CIPHERS 251 Chapter 8 More Number Theory Prime Numbers Fermat's and Euler's Theorems Testing for Primality 259, 8.4 The Chinese Remainder Theorem 262

4 6 CONTENTS 8.5 Discrete Logarithms Recommended Reading Key Terms, Review Questions, and Problems 270 Chapter 9 Public-Key Cryptography and RSA Principles of Public-Key Cryptosystems The RSA Algorithm Recommended Reading Key Terms, Review Questions, and Problems 299 Appendix 9A The Complexity of Algorithms 303 Chapter 10 Other Public-Key Cryptosystems Diffie-Hellman Key Exchange Elgamal Cryptographic System Elliptic Curve Arithmetic Elliptic Curve Cryptography Pseudorandom Number Generation Based on an Asymmetric Cipher Recommended Reading Key Terms, Review Questions, and Problems 329 PART THREE CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS 333 Chapter 11 Cryptographic Hash Functions Applications of Cryptographic Hash Functions Two Simple Hash Functions Requirements and Security Hash Functions Based on Cipher Block Chaining Secure Hash Algorithm (SHA) SHA Recommended Reading Key Terms, Review Questions, and Problems 371 Chapter 12 Message Authentication Codes Message Authentication Requirements Message Authentication Functions Requirements for Message Authentication Codes Security of MACs MACs Based on Hash Functions: HMAC MACs Based on Block Ciphers: DAA and CMAC Authenticated Encryption: CCM and GCM Key Wrapping Pseudorandom Number Generation using Hash Functions and MACs Recommended Reading Key Terms, Review Questions, and Problems 410 Chapter 13 Digital Signatures Digital Signatures Elgamal Digital Signature Scheme Schnorr Digital Signature Scheme 420

5 13.4 NIST Digital Signature Algorithm Elliptic Curve Digital Signature Algorithm RSA-PSS Digital Signature Algorithm Recommended Reading Key Terms, Review Questions, and Problems 432 PART FOUR MUTUAL TRUST 437 Chapter 14 Key Management and Distribution Symmetric Key Distribution Using Symmetric Encryption Symmetric Key Distribution Using Asymmetric Encryption Distribution of Public Keys X.509 Certificates Public-Key Infrastructure Recommended Reading Key Terms, Review Questions, and Problems 466 Chapter 15 User Authentication Remote User-Authentication Principles Remote User-Authentication Using Symmetric Encryption Kerberos Remote User Authentication Using Asymmetric Encryption Federated Identity Management Personal Identity Verification Recommended Reading Key Terms, Review Questions, and Problems 511 PART FIVE NETWORK AND INTERNET SECURITY 515 Chapter 16 Network Access Control and Cloud Security Network Access Control Extensible Authentication Protocol IEEE 802.1X Port-Based Network Access Control Cloud Computing Cloud Security Risks and Countermeasures Data Protection in the Cloud Cloud Security as a Service Recommended Reading Key Terms, Review Questions, and Problems 541 Chapter 17 Transport-Level Security Web Security Considerations Secure Sockets Layer Transport Layer Security HTTPS Secure Shell (SSH) Recommended Reading Key Terms, Review Questions, and Problems 576

6 8 CONTENTS Chapter 18 Wireless Network Security Wireless Security Mobile Device Security IEEE Wireless LAN Overview IEEE 802.lli Wireless LAN Security Recommended Reading Key Terms, Review Questions, and Problems 607 Chapter 19 Electronic Mail Security Pretty Good Privacy S/MIME DomainKeys Identified Mail Recommended Reading Key Terms, Review Questions, and Problems 642 Appendix 19A Radix-64 Conversion 643 Chapter 20 IP Security IP Security Overview IP Security Policy Encapsulating Security Payload Combining Security Associations Internet Key Exchange Cryptographic Suites Recommended Reading Key Terms, Review Questions, and Problems 679 APPENDICES 681 Appendix A Projects for Teaching Cryptography and Network Security 681 A.l Sage Computer Algebra Projects 682 A.2 Hacking Project 683 A.3 Block Cipher Projects 684 A.4 Laboratory Exercises 684 A.5 Research Projects 684 A.6 Programming Projects 685 A.7 Practical Security Assessments 685 A.8 Firewall Projects 686 A.9 Case Studies 686 A.10 Writing Assignments 686 A.11 Reading/Report Assignments 687 A.12 Discussion Topics 687 Appendix B Sage Examples 688 B.l Linear Algebra and Matrix Functionality 689 B.2 Chapter 2: Classical Encryption 680 B.3 Chapter 3: Block Ciphers and the Data Encryption Standard 693 B.4 Chapter 4: Basic Concepts in Number Theory and Finite Fields 697 B.5 Chapter 5: Advanced Encryption Standard 704

7 CONTENTS 9 B.6 Chapter B.7 Chapter B.8 Chapter B.9 Chapter B.10 Chapter B.ll Chapter References 730 Credits 740 Index 743 ONLINE CHAPTERS AND APPENDICES 1 PART SIX SYSTEM SECURITY Chapter 21 Malicious Software 21.1 Types of Malicious Software 21.2 Propagation Infected Content - Viruses 21.3 Propagation Vulnerability Exploit - Worms 21.4 Propagation Social Engineering - SPAM, Trojans 21.5 Payload - System Corruption 21.6 Payload Attack Agent Zombie, Bots 21.7 Payload - Information Theft Keyloggers, Phishing, Spyware 21.8 Payload - Stealthing Backdoors, Rootkits 21.9 Countermeasures Distributed Denial of Service Attacks Recommended Reading Key Terms, Review Questions, and Problems Chapter 22 Intruders 22.1 Intruders 22.2 Intrusion Detection 22.3 Password Management 22.4 Recommended Reading 22.5 Key Terms, Review Questions, and Problems Appendix 22A The Base-Rate Fallacy Chapter 23 Firewalls 23.1 The Need for Firewalls 23.2 Firewall Characteristics 23.3 Types of Firewalls 23.4 Firewall Basing 23.5 Firewall Location and Configurations 23.6 Recommended Reading 23.7 Key Terms, Review Questions, and Problems 'Online chapters, appendices, and other documents are Premium Content, available via the access card at the front of this book. \

8 10 CONTENTS PART SEVEN LEGAL AND ETHICAL ISSUES Chapter 24 Legal and Ethical Issues 24.1 Cybercrime and Computer Crime 24.2 Intellectual Property 24.3 Privacy 24.4 Ethical Issues 24.5 Recommended Reading 24.6 Key Terms, Review Questions, and Problems Appendix C Appendix D Appendix E Appendix F Appendix G Appendix H Appendix I Appendix J Appendix K Appendix L Appendix M Appendix N Appendix O Appendix P Appendix Q Appendix R Appendix S Appendix T Appendix U Appendix V Sage Exercises Standards and Standards-Setting Organizations Basic Concepts from Linear Algebra Measures of Security and Secrecy Simplified DES Evaluation Criteria for AES More on Simplified AES Rnapsack Public-Key Algorithm Proof of the Digital Signature Algorithm TCP/IP and OSI Java Cryptographic APIs MD5 and Whirlpool Hash Functions Data Compression Using ZIP More on PGP The International Reference Alphabet Proof of the RSA Algorithm Data Encryption Standard (DES) Kerberos Encryption Techniques Mathematical Basis of the Birthday Attack Evaluation Criteria for SHA-3 Glossary

Network Security Essentials:

Network Security Essentials: Applications and Standards Fifth Edition William Stallings International Editions contributions by B. R. Chandavarkar National Institute of Technology Karnataka, Surathkal

CRYPTOG NETWORK SECURITY

CRYPTOG NETWORK SECURITY PRINCIPLES AND PRACTICES FOURTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458 'jkfetmhki^^rij^jibwfcmf «MMr""'-^.;

CRYPTOGRAPHY AND NETWORK SECURITY Principles and Practice

CRYPTOGRAPHY AND NETWORK SECURITY Principles and Practice THIRD EDITION William Stallings Prentice Hall Pearson Education International CONTENTS CHAPTER 1 OVERVIEW 1 1.1 1.2 1.3 1.4 1.5 1.6 PART ONE CHAPTER

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,

1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

Introduction to Computer Security International Edition Michael T. Goodrich Department of Computer Science University of California, Irvine Roberto Tamassia Department of Computer Science Brown University

EXAM questions for the course TTM4135 - Information Security May 2013. Part 1

EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question

Cryptography and Network Security

PART-A Questions 1. Name the aspects to be considered of information security. 2. What is meant by deciphering? 3. What are the two different uses of public key cryptography related to key distribution?

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.

CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and

Computer Organization

Computer Organization and Architecture Designing for Performance Ninth Edition William Stallings International Edition contributions by R. Mohan National Institute of Technology, Tiruchirappalli PEARSON

Cryptography and network security CNET4523

1. Name of Course 2. Course Code 3. Name(s) of academic staff 4. Rationale for the inclusion of the course/module in the programme Cryptography and network security CNET4523 Major The Great use of local

Chapter 8. Network Security

Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who

VALLIAMMAI ENGINEERING COLLEGE

VALLIAMMAI ENGINEERING COLLEGE (A member of SRM Institution) SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year and Semester : I / II Section : 1 Subject Code : NE7202

Authentication requirement Authentication function MAC Hash function Security of

UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

COURSE TITLE : INFORMATION SECURITY COURSE CODE : 5136 COURSE CATEGORY : ELECTIVE PERIODS/WEEK : 4 PERIODS/SEMESTER : 52 CREDITS : 4 TIME SCHEDULE MODULE TOPICS PERIODS 1 Introduction to Computer Security

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Department of Computer & Information Sciences CSCI-445: Computer and Network Security Syllabus Course Description This course provides detailed, in depth overview of pressing network security problems

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Elective course in Computer Science University of Macau Faculty of Science and Technology Department of Computer and Information Science SFTW498 Information Security Syllabus 2nd Semester 2011/2012 Part

Chapter 10. Network Security

Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce

NETWORK ADMINISTRATION AND SECURITY Unit I (NAS) (W- 10) Q. 1) What is Security Attack? Explain general categories of attack with examples. 7 Q. 2) List and define the five security services. 5 Q. 3) Define

INFORMATION SECURITY PRINCIPLES AND PRACTICE

INFORMATION SECURITY PRINCIPLES AND PRACTICE Mark Stamp San Jose State University 'INTERSCIENCE A JOHN WILEY & SONS, INC., PUBLICATION Preface About The Author Acknowledgments xv xix xxi 1 INTRODUCTION

Wireless Mobile Internet Security. 2nd Edition

Brochure More information from http://www.researchandmarkets.com/reports/2330593/ Wireless Mobile Internet Security. 2nd Edition Description: The mobile industry for wireless cellular services has grown

Chapter 7 Transport-Level Security

Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell

The Crossroads of Accounting & IT

The Crossroads of Accounting & IT Donna Kay, MBA, PhD, CPA, CITP Maryville University of Saint Louis Ali Ovlia, MS, DM Webster University Pearson Boston Columbus- Indianapolis New York San Francisco Upper

IT Networks & Security CERT Luncheon Series: Cryptography

IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

Computer and Network Security PG 6697. Unit Outline 2007. School of Information Sciences and Engineering

Computer and Network Security PG 6697 Unit Outline 2007 School of Information Sciences and Engineering Division of Business, Law and Information Sciences University of Canberra Australian Government Higher

APNIC elearning: Cryptography Basics. Contact: esec02_v1.0

APNIC elearning: Cryptography Basics Contact: training@apnic.net esec02_v1.0 Overview Cryptography Cryptographic Algorithms Encryption Symmetric-Key Algorithm Block and Stream Cipher Asymmetric Key Algorithm

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering Sixth Semester Subject: Network Security & Management Contact Hrs / week: 4 Total hrs: 64 Table of Contents

CORPORATE COMPUTER AND NETWORK SECURITY

Second Edition CORPORATE COMPUTER AND NETWORK SECURITY Raymond R. Panko University of Hawaii Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Department of Computer & Information Sciences INFO-450: Information Systems Security Syllabus Course Description This course provides a deep and comprehensive study of the security principles and practices

CISSP EXAM CRAM 2 1. The CISSP Certification Exam. Assessing Exam Readiness. Taking the Exam. Multiple-Choice Question Format. Exam Strategy. Question-Handling Strategies. Mastering the Inner Game. 2.

Security for Computer Networks

Security for Computer Networks An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer D. W. Davies Consultant for Data Security and W. L. Price National Physical Laboratory, Teddington,

Database Concepts. David M. Kroenke. David J. Auer. riiiversity. Fourth Edition

Database Concepts Fourth Edition David M. Kroenke David J. Auer : ; riiiversity Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

ALL ElNis ONE CEH Certified Ethical Hacker EXAM GUIDE Matt Walker Mc Grain/ New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto McGraw-Hill

General about the course. Course assignment. Outline. T Cryptosystems. Summary and review of lectures

General about the course T 110.5211 Cryptosystems Summary and review of lectures 4.12.2008 This is the fifth time the course was arranged We need a course covering practical cryptographic topics Security

Weighted Total Mark. Weighted Exam Mark

CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU

Lecture 9 - Network Security TDTS41-2006 (ht1)

Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA Schuba@IDA.LiU.SE Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Network Security 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

Network Security Essentials Chapter 5

Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got

SE 4472a / ECE 9064a: Information Security

Western University Faculty of Engineering Department of Electrical and Computer Engineering SE 4472a / ECE 9064a: Information Security Course Outline 2015-16 Description: This course provides an introduction

11557 - CRIPT - Cryptography and Network Security

Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 744 - ENTEL - Department of Network Engineering DEGREE IN ELECTRONIC ENGINEERING (Syllabus 1992). (Teaching unit Optional) MASTER'S

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer

Network Security. Outline of the Tutorial

Network Security Dr. Indranil Sen Gupta Head, School of Information Technology Professor, Computer Science & Engg. Indian Institute of Technology Kharagpur 1 Outline of the Tutorial Security attacks and

EXAM questions for the course TTM4135 - Information Security June 2010. Part 1

EXAM questions for the course TTM4135 - Information Security June 2010 Part 1 This part consists of 6 questions all from one common topic. The number of maximal points for every correctly answered question

CRYPTOGRAPHY IN NETWORK SECURITY

ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

Computer Security: Principles and Practice

Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography

Chapter 6 Electronic Mail Security

Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

ICTTEN8195B Evaluate and apply network security

ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,

Detailed Description about course module wise:

Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Network Security Chapter 8 Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Communication Security Authentication Protocols Email Security Web Security

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the

CS 5490/6490: Network Security Fall 2015

CS 5490/6490: Network Security Fall 2015 Professor Sneha Kumar Kasera School of Computing 1 What is this course about? Comprehensive introduction to network security Ø learn principles of network security

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2015-2016 (C)ITM 820 - Information Systems Security and Privacy

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

Cryptographic Hash Functions Message Authentication Digital Signatures

Cryptographic Hash Functions Message Authentication Digital Signatures Abstract We will discuss Cryptographic hash functions Message authentication codes HMAC and CBC-MAC Digital signatures 2 Encryption/Decryption

Eleventh Hour Security+

Eleventh Hour Security+ Exam SYO-201 Study Guide I do Dubrawsky Technical Editor Michael Cross AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO SYNGRESS.

Cryptography and Network Security Chapter 15

Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North

CHAINED EXPLOITS Advanced Hacking Attacks from Start to Finish

CHAINED EXPLOITS Advanced Hacking Attacks from Start to Finish Andrew Whitaker Keatron Evans Jack B.Voth TT r\ Addison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

ICOM 5018 Network Security and Cryptography

ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic techniques. Cryptographic algorithms and protocols

National Security Agency Perspective on Key Management

National Security Agency Perspective on Key Management IEEE Key Management Summit 5 May 2010 Petrina Gillman Information Assurance (IA) Infrastructure Development & Operations Technical Director National

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

City University of Hong Kong Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 01/013 Part I Course Title: Course Code: Course Duration: Cryptography

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

COMP-530 Cryptographic Systems Security *Requires Programming Background University of Nicosia, Cyprus Course Code Course Title ECTS Credits COMP-530 Cryptographic Systems 10 Security Department Semester

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email

CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure

ENTERPRISE SYSTEMS FOR MANAGEMENT

I I Second Edition ENTERPRISE SYSTEMS FOR MANAGEMENT Luvai F. Motiwalla University of Massachusetts Lowell and Jeff Thompson Oracle Consulting PEARSON Boston Columbus Indianapolis New York San Francisco

Curran, K. Tutorials. Independent study (including assessment) N/A

MODULE TITLE: MODULE CODE: Systems Security COM535 YEAR OF REVISION: 2013/14 MODULE LEVEL: 6 CREDIT POINTS: 20 MODULE STATUS: SEMESTER: 1 LOCATION: E-LEARNING: PREREQUISITE(S): CO-REQUISITE(S): MODULE

Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

SERVICES MARKETING PEOPLE, TECHNOLOGY, STRATEGY. Global Edition. Christopher Lovelock. Yale University Jochen Wirtz National University of Singapore

Seventh Edition SERVICES MARKETING PEOPLE, TECHNOLOGY, STRATEGY Global Edition Christopher Lovelock Yale University Jochen Wirtz National University of Singapore Boston Columbus Indianapolis New York San

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Friends and Enemies Security Outline Encryption lgorithms Protocols Message Integrity Protocols Key Distribution Firewalls Figure 7.1 goes here ob, lice want to communicate securely Trudy, the intruder

Chapter 17. Transport-Level Security

Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

Network Security Essentials Chapter 7

Network Security Essentials Chapter 7 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,

Network Security. Lecture 3

Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

TÜBİTAK Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü Introduction to Network Security (Revisit an Historical 12 year old Presentation) Prof. Dr. Halûk Gümüşkaya Why Security? Three primary reasons

CS 758: Cryptography / Network Security

CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: dstinson@uwaterloo.ca my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference

Course Specifications

Form (A) General Information Course name Course number Faculty Department Course type Course level Planning and Quality Assurance Affairs Course Specifications Information Security ITCS4301 Engineering

Course Outline Computing Science Department Faculty of Science. COMP 3260 3 Credits Computer Network Security (3,1,0) Fall 2015

Course Outline Computing Science Department Faculty of Science COMP 30 3 Credits Computer Network Security (3,,0) Fall 05 Instructor: E-Mail: Phone/Voice Mail: Office: Office Hours: CALENDAR DESCRIPTION

Network Security: A Practical Approach. Jan L. Harrington

Network Security: A Practical Approach Jan L. Harrington ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann is an imprint of

Lukasz Pater CMMS Administrator and Developer

Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign

SECOND EDITION BUSINESS INTELLIGENCE A MANAGERIAL APPROACH INTERNATIONAL EDITION Efraim Turban University of Hawaii Ramesh Sharda Oklahoma State University Dursun Deleii Oklahoma State University David

Information, Network & Cyber Security

School COMSC Information, Network & Cyber Security Information security officers are faced with strategic decisions on a daily basis, and are required to make informed decisions on the security options

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution

Chapter 15: Security

Chapter 15: Security Chapter 15: Security The Security Problem Program Threats System and Network Threats Cryptography as a Security Tool User Authentication Implementing Security Defenses Firewalling

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128

SPC5 Software Cryptography Library Data brief SHA-512 Random engine based on DRBG-AES-128 RSA signature functions with PKCS#1v1.5 ECC (Elliptic Curve Cryptography): Key generation Scalar multiplication

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC

THE PSYCHOLOGY OF INVESTING

Fourth Edition THE PSYCHOLOGY OF INVESTING John R. Nofsinger Washington State University Prentice Hall Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html

Computer Security Curriculum at the Univ. of Wisconsin Eau Claire. Paul J. Wagner wagnerpj@uwec.edu

Computer Security Curriculum at the Univ. of Wisconsin Eau Claire Paul J. Wagner wagnerpj@uwec.edu Background! Attended week-long workshop at Indiana University of Pennsylvania in 2002 with colleague Andy

CS 600.443 Final Exam

CS 600.443 Final Exam Name: This exam is closed book and closed notes. You are required to do this completely on your own without any help from anybody else. Feel free to write on the back of any page