Hugo Fruehauf, ViaLogy LLC, Rev 5-091

Size: px
Start display at page:

Download "Hugo Fruehauf, ViaLogy LLC, hugo.fruehauf@vialogy.com, 714-724-7069 Rev 5-091"

Transcription

1 Telecom and Internet Data Traffic Crypto Security Basics Hugo Fruehauf, ViaLogy LLC, Rev 5-091

2 Focus of this Presentation Encrypted TCP/IP packet data will be the norm for future wired and wireless networks via IPsec and other standard and non-standard protocols This presentation focuses on the encryption world as a whole, so that the technology-basics are more fully understood These insights may aid in achieving functional compatibility of crypto/key-exchange architectures in upcoming: Synchronized and asynchronous wired and wireless IP networks The particularities of high data rate IP backbones 2

3 Focus (cont.) Encryption Options OSI Internet Application (Payload) Presentation Session Transport 4 3 Application Layer (Payload) Host to Host (Transport Layer) Encryption can be at any layer: The lower in the stack, the more secure, but more complex as to compatibility with the receiving end TCP Packet DATA OH+P Pad Key A B TRANSPORT MODE 3 Network 2 Internet- Working Layer IP ESP IPsec C D A B TCP DATA TUNNEL MODE IP ESP IP TCP DATA 2 1 Data Link Physical 1 Network I/O (Network Access Layer) NAL IP ESP IP TCP DATA OSI - Open Systems Interconnection (Reference Model ) ESP- Encapsulating Security Payload TCP- Transmission Control Protocol TCP Addresses A and B ; Routing Addresses C and D NAL 3

4 Agenda Security Concepts Security Implementations Key Exchange Issues Principles of Cryptographic Algorithms DES, 3DES, AES, and SHA Encryption Modes IPsec and the Network Summary 4

5 Security Concepts 5

6 The Basic Four in Security Peer Authentication The process of proving one s identity; ensuring that t only the intended parties are participating Data Confidentiality (Encryption) Ensuring that the data is not disclosed to unintended parties Data Transit Integrity Ensuring the data has not changed while in transit; protecting data from third-part alterations Data Origin Authentication & Replay Protection (Nonrepudiation) Proof of delivery for the sender and proof of senders identity for the recipient; ensuring source authenticity has not been violated 6

7 The Basic Four in Security Peer Authentication - The process of proving one s identity; ensuring that only the intended parties are participating This includes ID, Authorization, ti and Access Control (in increasing order of security) Password, Passphrase, ID Number Magnetic Strip Card SmartCard (chip based) Digital Certificate (PKI) Biometrics (human anatomy) Combinations of the above 7

8 The Basic Four in Security Data Confidentiality (Encryption) - Ensuring that the data is not disclosed d to unintended d parties (in increasing order of security) Pi Private Networks, Lease Lines Asymmetric Cryptography (PKI) of data Symmetric Cryptography p y of data Related to all crypto schemes Crypto Algorithm Crypto Mode Key Management Key Length Hash Functions 8

9 The Basic Four in Security Data Transit Integrity - Ensuring the data has not changed while in transit; protecting ti data from third-part t alterations (in increasing order of security) SW for comparing Data/Files (no protection however) Checksums & CRCs Now is the time for all good = Now is the time for all good A06511A6EF9C43DDC50BB34 = A650 MICs (Message Integrity Codes or Checks) hash function crypto algorithms MACs (Message Authentication Codes or Checks) keyed hash HMAC (Hugo MAC*) keyed hash inside a keyed hash *Hugo Krawczyk 9

10 The Basic Four in Security Data Origin Authentication & Replay Protection (Nonrepudiation) - Proof of delivery for the sender and proof of senders identity for the recipient; ensuring source authenticity has not been violated Systemizing the individual security elements Sender - Message encryption with receiver s Public Key - Hashing the message - Encrypting the hash value with his Private Key (his digital signature) Receiver - Message decryption with his Private Key -Decrypting hash value with senders Public Key - Comparing hash values for integrity of data 10

11 Security Implementations 11

12 Three Main Categories of Encryption Symmetric (Secret-Key) Cryptography Single, same key for encryption and decryption Pros Fast crypto process, low latency, most secure Cons Key exchange security RSA Asymmetric (Public-Key) Cryptography p y and DH Asymmetric (Key Agreement) Cryptography RSA Two Keys (Public & Private), one encrypts, one decrypts DH Symmetric Key generation/agreement g on each end Pros Secure key exchange/agreement logistics (PKI) Cons Slow crypto process Hash Function (One-Way) Cryptography Message Digest, plaintext not recoverable from ciphertext Pros Good for data integrity and nonrepudiation Cons Slows down overall system, adds latency RSA Rivest, Shamir, Adleman DH Diffie-Hellman 12

13 Symmetric (Secret-Key) Cryptography Symmetric Key must be exchanged first, physically or electronically Physical Key Exchange Electronic Key Exchange Encrypt Network Decrypt Data to be Encrypted Sender Decrypted Data Receiver Symmetric Key Best for secure high speed data encryption/decryption 13

14 RSA Asymmetric (Public-Key) Cryptography Public Key Infrastructure (PKI) simplified Validation System Receiver s Public Key Encrypt Public Key Data Base Public Key Network Private Key Decrypt Data to be Encrypted Decrypted Data Sender Receiver Good for exchanging symmetric keys OK for low-speed data encryption/decryption 14

15 Symmetric Key Exchange via RSA Asymmetric Cryptography Validation System Receiver s Public Key Public Key Data Base Public Key Generates Symmetric Key Encrypt Network Private Key Key Exchange Decrypt Symmetric Key Rcv d Data Traffic Encrypt Data to be Encrypted Sender Receiver Decrypt Decrypted Data 15

16 Symmetric Key Agreement via DH Asymmetric Cryptography Private Key Public Key Database Private Key DH Math Public Key Public Key DH Math Network Generate Symmetric Key Encrypt Decrypt Generate Symmetric Key Party A Data to be Encrypted Decrypted Data Party B Good for symmetric key generation (agreement) OK for low-speed data encryption/decryption 16

17 Hash Function (One-Way) Cryptography Hashing An algorithm that digests data and re-presents its bits and bit patterns by a numerical equivalent - a Hash Value Single bit change in the data, may change half of the bits in the resultant hash-value Nonreversible algorithm; hash value can t reproduce data MAC (Hash) Message Authentication Code algorithm is Symmetric Key-dependant hash for more security Hash is mainly used in the Digital Signature process and for data integrity 17

18 Hash Function Cryptography for Data Integrity and Nonrepudiation Sender Receiver s Public Key Public Key Database Receiver s Private Key Receiver Data to be Encrypted Encrypted Encrypted Data Key Exchange Data Decrypt Data Decrypted Data OPTIONAL Keyed HASH Senders Private Key HASH Hash Value Network HASH Decrypt 111 Hash Value Hash Value Hash Value Verify Data Integrity and Nonrepudiation Encrypt Hash Value Senders Public Key 18

19 Public-Key Registration and Certification Process Complete Application 2 Applicant Applicant s Browser Generates Key Material Public Key Private Key (Not Sent back to RA) 3 Registration Authority 4 Send to RA Create Certificate 6 Request 1 5 Deliver Certificate Application Review Application Name Org Key Signature Date Send 9 Certificate to Applicant 7 Send to CA 8 Generate Certificate Certificate Issuer 19

20 What is in a certificate? DN: cn=hugo Fruehauf Serial #: Start: :00 End: :00 Name of Owner Serial Number Period of Validity Revocation Data CRL: cn=crl2 Name of issuing CA CA DN: o=acme, c=us Key: Public key CAs Digital Signature 20

21 Key Exchange Issues 21

22 Key Exchange Issues Symmetric Crypto Same Key Encrypts Must move Symmetric Key across somehow Decrypts Key Exchange Method: Phone (not secure), unless secure phone is used Mail (not secure) Courier (better) Open Network (ok if not being targeted) Verbal (generally not secure) Physical (secure, but not practical) PKI (secure) 22

23 Key Exchange Issues (cont.) RSA Asymmetric Crypto No Key moves across Two Math Related Keys One Encrypts One Decrypts (and visa-versa) Key Exchange Method: Network-math (secure) RSA Encryption of a Symmetric Key Symmetric Key moves across securely Key Exchange Method: Symmetric key encrypted by RSA key (secure) 23

24 Key Exchange Issues (cont.) DH Asymmetric Crypto Independently generate same Symmetric Key Key Exchange Method: No Key moves across Encrypts Decrypts No key exchange, key generated at each terminal (secure) Hashing Crypto Plain or Ciphertext Message Digest for Integrity, authentication Data, Valuepartofdata Data, Text Text Hash Hash Value Value Must move Symmetric Key across somehow Key Exchange Method for keyed hash (HMAC): Same as issues with Symmetric key 24

25 Key Exchange Issues (cont.) Synchronized Symmetric Crypto No actual Key moves across (3) Practical Key Change Methods: (A) Flag - PNs generate Keys at all terminals and flag for Key-Change Issues: Flag in data stream; key material moves across network -- Start-latency and interruption of data traffic for re-keying -- Need long-term Key (Setup Parameters) (B) Synchronous - PNs generate Keys at all terminals and synchronously do Key-Change (time or event activated) Issues: Data loss since clocks cannot be perfectly synchronized (at 10 Gbits data rate, 1 us time error = 10 Mbits of data loss) -- Need long-term Key (Setup Parameters) (C) Non-Precision Sync (what I call NPS ) - PNs generate Keys at all terminals and autonomously do Key-Change (best of the three) Issues: Need long-term Key (Setup Parameters) PN Pseudo Random Number Generator 25

26 Key Exchange Issues (cont.) (C) Non-Precision Sync Symmetric Crypto No Key moves across Basic Functionality: All terminal PNs autonomously generate 3 keys: (key for the present crypto period, the previous, and the next) Sending terminal uses present crypto period key Receiving terminal(s) decrypt with all 3 keys simultaneously Encrypted PN-generated packet header match determines the right key at the receiving terminals (can also use: AH, ESP, SN, etc., for ID) Terminal sync need only be better than key-change period Each terminal s computer clock is good enough for key sync, aided by a periodic NTP check (or other clock options) The Key Generator PNs of new terminals coming on line are autonomously updated via a crypto-midnight process AH Authentication Header; ESP Encapsulating Security Payload; SN Packet Serial No. 26

27 Non-Precision Sync (NPS) Functionality (1) Long- Term Key Setup Time/ Event Sync Long- Term Key Setup Time/ Event Sync Generation of Short- Term Symmetric Keys Prior Present Next Time Time Time PC Clock Generation of Short- Term Symmetric Keys Prior Present Next Time Time Time PC Clock Data In Encrypt Network Encrypt Data In Decryptors Decryptors Data Out Data Out (1) Patent No s. 6,590,981 (StealthKey TM ); 7,20,696; and 7,149,308 27

28 Non-Precision Sync Functionality (cont.) 8:00:00 8:00:15 8:00:30 8:00:45 A B C D Sender Clock Sender Key Gen Engine Network Data Encryptor Key B :00:15 8:00:00 8:00:15 8:00:30 8:00:45 A B C D Time Offset Expected between Sender and Receiver Clocks Receiver Clock Ahead Receiver Key Gen Engine Data Decryptor Key A Data Decryptor Key B 8:00:15 Data Decryptor Key C 8:00:00 8:00:30 Sender & Receiver s Key Period Match 28

29 Non-Precision Sync Functionality (cont.) PKG 8:00:00 8:00:15 8:00:30 8:00:45 A B C D Sender Clock Sender Key Gen Engine Network Data Encryptor Key B :00:15 8:00:00 8:00:15 8:00:30 8:00:45 B C D Time Offset Expected between Sender and Receiver Clocks Receiver Clock Ahead Receiver Key Gen Engine Data Decryptor Key B Data Decryptor Key C 8:00:30 Data Decryptor Key D 8:00:15 8:00:45 Receiver Clock switches to next Key Period Receiver uses Previous Key Period to Match Sender 29

30 Non-Precision Sync Functionality (cont.) PKG 8:00:00 8:00:15 8:00:30 8:00:45 A B C D Sender Clock Sender Key Gen Engine Network Data Encryptor Key C :00:30 8:00:00 8:00:15 8:00:30 8:00:45 B C D Time Offset Expected between Sender and Receiver Clocks Receiver Clock Ahead Receiver Key Gen Engine Data Decryptor Key B Data Decryptor Key C 8:00:30 Data Decryptor Key D 8:00:15 8:00:45 Sender Clock Switches to next increment Sender & Receiver s Key Period Match 30

31 Principles of Cryptographic Algorithms 31

32 Typical Crypto Algorithm Concept Crypto Cypto Key AES Plain Packets (Plaintext) Encrypted Packets (Ciphertext) 32

33 Typical Crypto Algorithm Process Plain Packets Encrypted Packets Key Permutation Rounds A key controls the encryption/decryption algorithm to transform the data into ciphertext and back to plaintext In a cryptosystem, plaintext is acted upon by a known algorithm (set of mathematical rules) to determine the transformation process to ciphertext 33

34 Most popular Crypto Modes ECB Electronic Codebook The algorithm encrypts the key-length blocks with the same key ECB has a security flaw plaintext-repeats always produce the same ciphertext block, therefore exploitable by analysis A fast crypto mode process, but not very secure CBC Cipher Block Chaining Ensures that plaintext-repeats produce different ciphertext blocks, although encrypted with the same key Algorithm input is XOR d with the preceding ciphertext t block The slowest crypto mode process, but probably the most secure 34

35 Crypto Modes (cont.) Counter Mode (CM) Uses sequence numbers as the input to the algorithm Instead of using the output of the encryption algorithm to fill the register, the input to the register is a counter After each block encryption, the counter increments by some constant, generally by 1 Counter does not have to be secure, can use any random- sequence generator The sequence of values is encrypted with the key, ECB-style The ECB pseudorandom key-stream output is XOR d with the plaintext to produce the ciphertext The fastest crypto mode process and probably the next best security to CBC 35

36 DES, 3DES, AES and SHA 36

37 Data Encryption Standard (DES) A Symmetric-Key Algorithm; 56-bit Key Block Cipher (OLD) DES block 64-bits (8-bit overhead for parity error detection) DES operates on 64-bit blocks of data Overview of DES Algorithm Initial permutation of the plaintext without a key Split permuted data into right and left 32-bit columns 16 identical rounds where data is combined with a key After 16 th round, combine the right and left columns again Do final permutation (the inverse of the initial permutation) High speed hardware implementation With a 0.18u chip and a 200 MHz clock x 64 bits = 12.8 Gbps (ideal), + crypto mode time and related latency DES in ECB mode will run near ideal pipe speed DES in CBC mode, ~ 1 to 2 Gbps possible 37

38 Data Encryption Standard (3DES) 3DES; a 3 x DES process (getting OLD); (2DES not secure) Although a 168-bit Key Block Cipher, is considered only 2x more secure than DES; effective 112-bit key Overview of 3DES Algorithm Basically runs like DES, except 48 rounds (3 x 16 rounds) Generally uses 2-Key mode Encrypt 1 st 16 rounds with 1 st key Decrypt 2 nd 16 rounds with 2 nd key Encrypt 3 rd 16 rounds with using the 1 st key again 3-Key m1ode as above but using 3 separate keys High speed hardware implementation With a 0.18u chip and a 200 MHz clock x 64 bits = 12.8 Gbps (ideal), + crypto mode time and related latency (3 x DES?) 3DES in ECB mode will run near ideal pipe speed 3DES in CBC mode, ~ 1 to 2 Gbps possible 38

39 Advanced Encryption Standard (AES) AES: aka Rijndael A Symmetric-Key algorithm; 128/192/256-bit Key BC Rounds are whole-byte operations, more efficient than DES NIST approved in 2001; expected to replace 3DES in time Overview of AES Algorithm AES operates on 128-bit blocks, independent of key length 10 Rounds if both block and key length are 128-bits 12 Rounds if either block or key length is 192-bits 14 Rounds if either block or key length is 256-bits 1 st step Add Round Key (XOR g a subkey with the block), 2 nd do the rounds, 3rd Mix Column (matrix multiplication) High speed hardware implementation With a 0.18u chip and a 200 MHz clock x 128 bits = 25.6 Gbps (ideal), + crypto mode time and related latency AES in Counter Mode, expect 25 Gbps pipe speed BC Block Cipher 39

40 Secure Hash Algorithm (SHA) (SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512) A 1-way algorithm that digests the message to produce a message digest or hash value, which represents the bits and sequence of bits of the message Extensively used for data integrity, authentication and to secure of the Digital Signature process Based on MIT Ron Rivest s MD4 and sister MD5 algorithms Overview of SHA-1 (SHA, Version 1) Algorithm Pad message to be multiples of 512-bit blocks Append 64-bits to the message, which represents the message length before padding Do the algorithm 4 rounds of 20 operations each SHA-1 limited to a message length of 264 bits SHA-1 provides a 160-bit digest (hash value) 40

41 Secure Hash Algorithm (cont.) Message Authentication Codes (MACs) Keyed Hash To create a MAC-SHA-1 hash a shared symmetric key along with hashing the message Attach the resultant digest to the message Do the same on the other end with the shared symmetric key Compare the digest to the digest attached to the message HMAC Keyed-keyed Hash Special hash h designed d by Hugo Krawczyk, Ran Canetti, and Mihir Bellare Outside Key Pad value (opad) and Inside Key Pad value (ipad) ipad =64element 64-element array (0 x 36) opad = 64-element array (0 x 5C) HMAC (Key, Message) = H(K XOR opad, H(K XOR ipad, M) IPsec uses HMAC exclusively IPsec Internet Protocol Security 41

42 SHA Process Sender A4DF1 Hash Algorithm 10057EAAFCBB 887AAEDD 27A5C Data Packet or File, Plaintext or ciphertext Hash Value (160-bits) Strips off Hash Value, hashes the data and compares its Hash Value to the appended one Receiver Append Hash Value EAAFCBB Network With HMAC Hash with a Key 27A5C Keyed Hash Value Strips off Keyed Hash Vl Value, uses Hash hkey previously transferred, hashes and compares values 42

43 IPsec and the Network 43

44 IPsec Internet Protocol security (IPsec) a framework of open standards for protecting communications over Internet Protocol (IP) networks through the use of cryptographic security services. IPsec supports network-level: Peer Authentication Data Confidentiality (Encryption) Data Transit Integrity Data Oi Origini Authentication ti ti & Replay Protection ti (Nonrepudiation) see earlier section, Chart 4 ff IPsec is supported by the Microsoft Windows Vista, Windows Server 2008, Windows Server 2003, Windows XP, and Windows 2000 operating systems and is integrated with the Active Directory service. IPsec policies can be assigned through Group Policy, which allows IPsec settings to be configured at the domain, site, or organizational unit level. l 44

45 IPsec Basics IPsec Internet Protocol Security Provides a defined, robust, and extensible way to secure IP traffic through symmetric, asymmetric, and hash functions cryptography IPsec tunnels and encrypts IP packets exchanged between gateways, routers, servers, and hosts For Storage Networks, data traffic converted to IP traffic between islands and within the fabric ISP Internet Subnet IPsec AH/ESP + IKE WAN LAN 45

46 IPsec Network Applications OSI Internet Application (Payload) Presentation Session Transport 4 3 Application Layer (Payload) Host to Host (Transport Layer) Encryption can be at any layer: The lower in the stack, the more secure, but more complex as to compatibility with the receiving end TCP Packet DATA OH+P Pad Key A B TRANSPORT MODE 3 Network 2 Internet- Working Layer IP ESP IPsec C D A B TCP DATA TUNNEL MODE IP ESP IP TCP DATA 2 1 Data Link Physical 1 Network I/O (Network Access Layer) NAL IP ESP IP TCP DATA OSI - Open Systems Interconnection (Reference Model ) ESP- Encapsulating Security Payload TCP- Transmission Control Protocol TCP Addresses A and B ; Routing Addresses C and D NAL 46

47 IPsec Basics (cont.) Data Protection Modes ESP DES-CBC Transform HMAC-MD5 HMAC-SHA Cryptographic Modes Layer 3 Psec OS SI Network A B IP C D IP or AH or both ESP ESP X Confidentiality IX X X Data Integrity X X Source Authentication X X Replay Protection A B IP Transport Mode DATA Tunnel Mode DATA ESP trlr ESP trlr IKE Internet Key Exchange PKI (DH Key Agreement) Security Associations Hash Selection Authentication Method etc. Data Traffic Modes Key Exchange Modes TCP Addresses A and B ; Routing Addresses C and D 47

48 Summary 48

49 Summary First, hard to take facts about crypto-functional network security: 1. The commercial industry has not embraced crypto-functional network security in a major way (excluding the military): a. A 10% premium for secure SW/HW implementations was thought to be sellable, but turned out not to be the case b. PKI (DCs) has been around for decades, but its use is far from universal 2. Low data rate ( , etc.) crypto-functional security is available for about $300/year, but how many of us actually use it? a. For MS Office 2007, click Outlook, Help, Security Options, Security, Get a Digital ID; this will bring you to a site for selection of a DC company: 3. High data rate crypto-functional security is usually hard to implement, requiring security professionals (inside company or contracted): a. For symmetric key infrastructures, issues will revolve around key exchange b. This requires a separate key manager/server architecture on the network c. With all well and done, the fact remains that >90% of security breeches come from within the company, carelessness or intentional breeches 49

50 Summary (cont.) Second, there is actually good news about network security: 1. For medium data rate IPsec functionality, the MS Windows Server 2003 (and new Rev s) has matured, providing transparent : a. Said to be at reasonable comparative cost b. Does not require a professional security staff c. Has eight network architecture scenarios d. Base document available at: l 2. Cisco (and others) equivalent IPsec servers available now 3. For pipe speed crypto-functional ti security, there is hope that t future crypto chips will find themselves on the PC motherboard, next to the up. These will be equipped with transparent key change systems; more functional IKE, StealthKey, or other 50

51 Backup charts 51

52 Things you don t want in the digital data stream for Security Reasons Don t want REPEATS of bit sequences (often called collisions) Repeats of ciphertext related to the ECB encryption mode or the encryption algorithm used Replaying of frames after reset of the ESP Sequence Number Repeats in the CBC encryption mode (reset of permutation sequences) Counter reset in the Counter Mode encryption mode Packet sequence number rollovers Don t want FLAGS followed by an event Flags or bit sequences related to a Key-Change Time ticks, time marks, or TOD related to key changes Initialization preambles Don t want Precision SYNCHRONIZATION elements in general 52

53 Need for 10 Gbps Replaying of frames after reset of ESP Sequence Number (SN) Collisions in CBC Mode Counter reset in Counter Mode (CM) Same key for the 2 32 or 2 64 set of frames: 32 bit SN: 2 32 frames 64 bit SN: 2 64 frames Re-keying: 32 bit SN, frames of 64 bytes: 220 seconds 32 bit SN, frames of 2112 bytes: 121 min 64 bit SN: Not relevant Same key for the 2 32 or 2 64 set of blocks: 3DES: 2 32 blocks AES-128: 2 64 blocks Re-keying: 3DES: 27.5 seconds AES-128: Not relevant Re-keying must be before counter reset! Re-keying: 3DES, AES-128, frames of 64 bytes: 220 seconds 3DES, AES-128, frames of 2112 bytes: 121 min 53

54 Exhaustive Key Search Key Size (bits) Time (1ųs/test) Time (1ųs/10 6 test) mins 2.15 msec days 550 msec years hours 64 ~500,000 years 107 days x years 5 x years For comparison, the lifetime of the universe (assuming it is closed) is estimated at years 54

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the

More information

Lecture 9 - Network Security TDTS41-2006 (ht1)

Lecture 9 - Network Security TDTS41-2006 (ht1) Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA Schuba@IDA.LiU.SE Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,

More information

Network Security Technology Network Management

Network Security Technology Network Management COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

IT Networks & Security CERT Luncheon Series: Cryptography

IT Networks & Security CERT Luncheon Series: Cryptography IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI

More information

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols Network Security Chapter 8 Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Communication Security Authentication Protocols Email Security Web Security

More information

APNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0

APNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0 APNIC elearning: IPSec Basics Contact: training@apnic.net esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations

More information

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

CS 356 Lecture 27 Internet Security Protocols. Spring 2013 CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

Chapter 10. Network Security

Chapter 10. Network Security Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce

More information

CCNA Security 1.1 Instructional Resource

CCNA Security 1.1 Instructional Resource CCNA Security 1.1 Instructional Resource Chapter 8 Implementing Virtual Private Networks 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe the purpose and types of VPNs and define where

More information

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead

More information

CS 758: Cryptography / Network Security

CS 758: Cryptography / Network Security CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: dstinson@uwaterloo.ca my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html

More information

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Module 8. Network Security. Version 2 CSE IIT, Kharagpur Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication

More information

Chapter 6 CDMA/802.11i

Chapter 6 CDMA/802.11i Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,

More information

Security vulnerabilities in the Internet and possible solutions

Security vulnerabilities in the Internet and possible solutions Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in

More information

Chapter 4 Virtual Private Networking

Chapter 4 Virtual Private Networking Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between

More information

Chapter 8. Network Security

Chapter 8. Network Security Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who

More information

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode 13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4

More information

Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards

Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the

More information

Network Security. Lecture 3

Network Security. Lecture 3 Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview

More information

Lecture 9: Application of Cryptography

Lecture 9: Application of Cryptography Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that

More information

INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang

INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture

More information

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP) Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic

More information

Network Security Part II: Standards

Network Security Part II: Standards Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview

More information

CSE/EE 461 Lecture 23

CSE/EE 461 Lecture 23 CSE/EE 461 Lecture 23 Network Security David Wetherall djw@cs.washington.edu Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data

More information

Application Note: Onsight Device VPN Configuration V1.1

Application Note: Onsight Device VPN Configuration V1.1 Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1

More information

EXAM questions for the course TTM4135 - Information Security May 2013. Part 1

EXAM questions for the course TTM4135 - Information Security May 2013. Part 1 EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch 1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,

More information

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview of CSS SSL. SSL Cryptography Overview CHAPTER CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers

More information

Chapter 8 Virtual Private Networking

Chapter 8 Virtual Private Networking Chapter 8 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FWG114P v2 Wireless Firewall/Print Server. VPN tunnels provide secure, encrypted

More information

Security in Computer Networks

Security in Computer Networks Security in Computer Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-10/

More information

Introduction to Security and PIX Firewall

Introduction to Security and PIX Firewall Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

Message Authentication Codes

Message Authentication Codes 2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,

More information

Internetwork Security

Internetwork Security Internetwork Security Why Network Security Layers? Fundamentals of Encryption Network Security Layer Overview PGP Security on Internet Layer IPSec IPv6-GCAs SSL/TLS Lower Layers 1 Prof. Dr. Thomas Schmidt

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities TÜBİTAK Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü Introduction to Network Security (Revisit an Historical 12 year old Presentation) Prof. Dr. Halûk Gümüşkaya Why Security? Three primary reasons

More information

IPsec Details 1 / 43. IPsec Details

IPsec Details 1 / 43. IPsec Details Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS

More information

IP Security. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49

IP Security. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49 IP Security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49 1 Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security

More information

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1 Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret

More information

How To Encrypt Data With Encryption

How To Encrypt Data With Encryption USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security

More information

Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson

Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson Chapter 8 Network Security Slides adapted from the book and Tomas Olovsson Roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity Security protocols and measures: Securing

More information

As enterprises conduct more and more

As enterprises conduct more and more Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside

More information

Securing IP Networks with Implementation of IPv6

Securing IP Networks with Implementation of IPv6 Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle

More information

Chapter 7 Transport-Level Security

Chapter 7 Transport-Level Security Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell

More information

CPS 590.5 Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang xwy@cs.duke.edu

CPS 590.5 Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang xwy@cs.duke.edu CPS 590.5 Computer Security Lecture 9: Introduction to Network Security Xiaowei Yang xwy@cs.duke.edu Previous lectures Worm Fast worm design Today Network security Cryptography building blocks Existing

More information

Standards and Products. Computer Security. Kerberos. Kerberos

Standards and Products. Computer Security. Kerberos. Kerberos 3 4 Standards and Products Computer Security Standards and Products Public Key Infrastructure (PKI) IPsec SSL/TLS Electronic Mail Security: PEM, S/MIME, and PGP March 24, 2004 2004, Bryan J. Higgs 1 2

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

VPN. VPN For BIPAC 741/743GE

VPN. VPN For BIPAC 741/743GE VPN For BIPAC 741/743GE August, 2003 1 The router supports VPN to establish secure, end-to-end private network connections over a public networking infrastructure. There are two types of VPN connections,

More information

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in

More information

Lukasz Pater CMMS Administrator and Developer

Lukasz Pater CMMS Administrator and Developer Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign

More information

SECURITY IN NETWORKS

SECURITY IN NETWORKS SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,

More information

Properties of Secure Network Communication

Properties of Secure Network Communication Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,

More information

What is network security?

What is network security? Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application

More information

Understanding the Cisco VPN Client

Understanding the Cisco VPN Client Understanding the Cisco VPN Client The Cisco VPN Client for Windows (referred to in this user guide as VPN Client) is a software program that runs on a Microsoft Windows -based PC. The VPN Client on a

More information

Computer System Management: Hosting Servers, Miscellaneous

Computer System Management: Hosting Servers, Miscellaneous Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation

More information

Client Server Registration Protocol

Client Server Registration Protocol Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are

More information

Real-Time Communication Security: SSL/TLS. Guevara Noubir noubir@ccs.neu.edu CSU610

Real-Time Communication Security: SSL/TLS. Guevara Noubir noubir@ccs.neu.edu CSU610 Real-Time Communication Security: SSL/TLS Guevara Noubir noubir@ccs.neu.edu CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS

More information

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999 Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks

More information

An Introduction to Cryptography as Applied to the Smart Grid

An Introduction to Cryptography as Applied to the Smart Grid An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric

More information

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012 Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret

More information

Secure Sockets Layer

Secure Sockets Layer SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated

More information

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues NCP Secure Entry Mac Client Service Release 2.05 Build 14711 December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this release:

More information

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures

More information

The Misuse of RC4 in Microsoft Word and Excel

The Misuse of RC4 in Microsoft Word and Excel The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore hongjun@i2r.a-star.edu.sg Abstract. In this report, we point out a serious security flaw in Microsoft

More information

Wireless security. Any station within range of the RF receives data Two security mechanism

Wireless security. Any station within range of the RF receives data Two security mechanism 802.11 Security Wireless security Any station within range of the RF receives data Two security mechanism A means to decide who or what can use a WLAN authentication A means to provide privacy for the

More information

7! Cryptographic Techniques! A Brief Introduction

7! Cryptographic Techniques! A Brief Introduction 7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures

More information

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication

More information

Savitribai Phule Pune University

Savitribai Phule Pune University Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter

More information

Authentication requirement Authentication function MAC Hash function Security of

Authentication requirement Authentication function MAC Hash function Security of UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy

More information

The BANDIT Products in Virtual Private Networks

The BANDIT Products in Virtual Private Networks encor! enetworks TM Version A.1, March 2010 2010 Encore Networks, Inc. All rights reserved. The BANDIT Products in Virtual Private Networks One of the principal features of the BANDIT products is their

More information

Content Teaching Academy at James Madison University

Content Teaching Academy at James Madison University Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

More information

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Network Security (2) CPSC 441 Department of Computer Science University of Calgary Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate

More information

How To Understand And Understand The Security Of A Key Infrastructure

How To Understand And Understand The Security Of A Key Infrastructure Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used

More information

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport

More information

Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved

Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved NCP Secure Client Juniper Edition Service Release: 9.30 Build 102 Date: February 2012 1. New Features and Enhancements The following describe the new features introduced in this release: Visual Feedback

More information

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference

More information

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec CSCI 454/554 Computer and Network Security Topic 8.1 IPsec Outline IPsec Objectives IPsec architecture & concepts IPsec authentication header IPsec encapsulating security payload 2 IPsec Objectives Why

More information

FortiOS Handbook IPsec VPN for FortiOS 5.0

FortiOS Handbook IPsec VPN for FortiOS 5.0 FortiOS Handbook IPsec VPN for FortiOS 5.0 IPsec VPN for FortiOS 5.0 26 August 2015 01-504-112804-20150826 Copyright 2015 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, and FortiGuard, are registered

More information

Cisco 3745. Cisco 3845 X X X X X X X X X X X X X X X X X X

Cisco 3745. Cisco 3845 X X X X X X X X X X X X X X X X X X Data Sheet Virtual Private Network (VPN) Advanced Integration Module (AIM) for the 1841 Integrated Services Router and 2800 and 3800 Series Integrated Services Routers The VPN Advanced Integration Module

More information

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355 VPN This chapter describes how to configure Virtual Private Networks (VPNs) that allow other sites and remote workers to access your network resources. It includes the following sections: About VPNs, page

More information

EDA385 Embedded Systems Design. Advanced Course

EDA385 Embedded Systems Design. Advanced Course EDA385 Embedded Systems Design. Advanced Course Encryption for Embedded Systems Supervised by Flavius Gruian Submitted by Ahmed Mohammed Youssef (aso10ayo) Mohammed Shaaban Ibraheem Ali (aso10mib) Orges

More information

Integrated Services Router with the "AIM-VPN/SSL" Module

Integrated Services Router with the AIM-VPN/SSL Module Virtual Private Network (VPN) Advanced Integration Module (AIM) for the 1841 Integrated Services Router and 2800 and 3800 Series Integrated Services Routers The VPN Advanced Integration Module (AIM) for

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

Cryptography & Digital Signatures

Cryptography & Digital Signatures Cryptography & Digital Signatures CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration Prof. Sloan s Slides, 2007, 2008 Robert H.

More information

Lecture 17 - Network Security

Lecture 17 - Network Security Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Idea Why donʼt we just integrate some of these neat

More information

VPN Modules for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

VPN Modules for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers Q&A VPN Modules for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers OVERVIEW Q. What is a VPN? A. A VPN, or virtual private network, delivers the benefits of private network security,

More information

Communication Security for Applications

Communication Security for Applications Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer

More information

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004 ZyWALL 5 Internet Security Appliance Quick Start Guide Version 3.62 (XD.0) May 2004 Introducing the ZyWALL The ZyWALL 5 is the ideal secure gateway for all data passing between the Internet and the LAN.

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,

More information