UNIT I. 5. Define cryptanalysis? It is a process of attempting to discover the key or plaintext or both.
|
|
|
- Jared Wright
- 10 years ago
- Views:
Transcription
1 Subject Name : Cryptography and Network Security Subject Code : IT1352 Prepared by : S.Maria Celestin Vigila UNIT I 1. Specify the four categories of security threads? ƒinterruption ƒinterception ƒmodification ƒfabrication 2. Explain active and passive attack with example? Passive attack: Monitoring the message during transmission. Eg: Interception Active attack: It involves the modification of data stream or creation of false data stream. E.g.: Fabrication, Modification, and Interruption 3. Define integrity and nonrepudiation? Integrity: Service that ensures that only authorized person able to modify the message. Nonrepudiation: This service helps to prove that the person who denies the transaction is true or false. 4. Differentiate symmetric and asymmetric encryption? Symmetric Asymmetric It is a form of cryptosystem in which It is a form of cryptosystem in which encryption and decryption performed using encryption and decryption the same key. Performed using two keys. Eg: DES, AES Eg: RSA, ECC 5. Define cryptanalysis? It is a process of attempting to discover the key or plaintext or both. 6. Compare stream cipher with block cipher with example. Stream cipher: Processes the input stream continuously and producing one element at a time. Example: caeser cipher. Block cipher: Processes the input one block of elements at a time producing an output block for each input block. Example: DES.
2 7. Define security mechanism It is process that is designed to detect prevent, recover from a security attack. Example: Encryption algorithm, Digital signature, Authentication protocols. 8. Differentiate unconditionally secured and computationally secured An Encryption algorithm is unconditionally secured means, the condition is if the cipher text generated by the encryption scheme doesn t contain enough information to determine corresponding plaintext. Encryption is computationally secured means, 1. The cost of breaking the cipher exceed the value of enough information. 2. Time required to break the cipher exceed the useful lifetime of information. 9. Define steganography Hiding the message into some cover media. It conceals the existence of a message. 10. Why network need security? When systems are connected through the network, attacks are possible during transmission time. 11. Define Encryption The process of converting from plaintext to cipher text. 12. Specify the components of encryption algorithm. 1. Plaintext 2. Encryption algorithm 3. secret key 4. ciphertext 5. Decryption algorithm 13. Define confidentiality and authentication Confidentiality: It means how to maintain the secrecy of message. It ensures that the information in a computer system and transmitted information are accessible only for reading by autherised person. Authentication: It helps to prove that the source entity only has involved the transaction. 14. Define cryptography. It is a science of writing Secret code using mathematical techniques. The many schemes used for enciphering constitute the area of study known as cryptography.
3 15. Compare Substitution and Transposition techniques. SUBSTITUTION TRANSPOSITION *A substitution techniques is one in which * It means,different kind of mapping is the letters of plaintext are replaced by other achieved by performing some sort of letter or by number or symbols. permutation on the plaintext letters. *Eg: Caeser cipher. *Eg: DES, AES. 16. Define Diffusion & confusion. Diffusion: It means each plaintext digits affect the values of many ciphertext digits which is equivalent to each ciphertext digit is affected by many plaintext digits. It can be achieved by performing permutation on the data. It is the relationship between the plaintext and ciphertext. Confusion: It can be achieved by substitution algorithm. It is the relationship between ciphertext and key. 17. What are the design parameters of Feistel cipher network? *Block size *Key size *Number of Rounds *Subkey generation algorithm *Round function *Fast software Encryption/Decryption *Ease of analysis 18. Define Product cipher. It means two or more basic cipher are combined and it produce the resultant cipher is called the product cipher. 19. Explain Avalanche effect. A desirable property of any encryption algorithm is that a small change in either the plaintext or the key produce a significant change in the ciphertext. In particular, a change in one bit of the plaintext or one bit of the key should produce a change in many
4 bits of the ciphertext. If the change is small, this might provider a way to reduce the size of the plaintext or key space to be searched. 20. Give the five modes of operation of Block cipher. 1. Electronic Codebook(ECB) 2. Cipher Block Chaining(CBC) 3. Cipher Feedback(CFB) 4. Output Feedback(OFB) 5. Counter(CTR) 21. State advantages of counter mode. *Hardware Efficiency *Software Efficiency *Preprocessing *Random Access * Provable Security *Simplicity. 22. Define Multiple Encryption. It is a technique in which the encryption is used multiple times. Eg: Double DES, Triple DES 23. Specify the design criteria of block cipher. Number of rounds Design of the function F Key scheduling 24. Define Reversible mapping. Each plain text is maps with the unique cipher text. This transformation is called reversible mapping. 25. Specify the basic task for defining a security service. A service that enhances the security of the data processing systems and the information transfer of an organization. The services are intended to counter security attack, and they make use of one or more security mechanism to provide the service. 26. What is the difference between link and end to end encryption? Link Encryption End to End Encryption 1. With link encryption, each vulnerable 1.With end to end encryption, the Communications link is equipped on encryption process is carried out at Both ends with an encryption device the two end systems
5 2. Message exposed in sending host 2.Message encrypted in sending and and in intermediate nodes intermediate nodes 3. Transperant to user 3.User applies encryption 4.Host maintains encryption facility 4.Users must determine algorithm 5. One facility for all users 5.Users selects encryption scheme 6. Can be done in hardware 6.Software implementations 7. Provides host authentication 7.Provides user authentication 8. Requires one key per(host-intermediate) 8.Requires one key per user pair Pair and (intermediate-intermediate)pair 27. What is traffic Padding? What is its purpose? Traffic padding produces ciphertext output continuously, even in the absence of the plain text. A continuous random data stream is generated. When plain text is available, it is encrypted and transmitted. When input plaintext is not present, random data are encrypted and transmitted. This makes it impossible to for an attacker to distinguish between true dataflow and padding and therefore impossible to deduce the amount of traffic. 28. List the evaluation criteria defined by NIST for AES? The evaluation criteria for AES is as follows: 1.Security 2. Cost 3.Algorithm and implementation characteristics 29. What is Triple Encryption? How many keys are used in triple encryption? Triple Encryption is a technique in which encryption algorithm is performed three times using three keys. UNIT II 30. Differentiate public key and conventional encryption? Conventional Encryption Public key Encryption 1. The same algorithm with the same 1.One algorithm is used for encryption Key is used for encryption and decryption and decryption with a pair of keys, one for encryption and another for decryption 2. The sender and receiver must share 2.The sender and receiver The algorithm and the key must each have one of the Matched pair of keys 3. The key must be secret 3.One of two keys must be kept Secret
6 4. It must be impossible or atleast impractial 4. It must be impossible or to decipher a message if no other information at least impractical to decipher a is available message if no other information is available 5. Knowledge of the algorithm plus samples 5. Knowledge of the algorithm of cipher text must insufficient to determine plus one of key plus samples of the key ciphertext must be insufficient to determine the other key. 31. What are the principle elements of a public key cryptosystem? The principle elements of a cryptosystem are: 1.plain text 2.Encryption algoritm 3.Public and private key 4.Cipher text 5.Decryption algorithm 32. What are roles of public and private key? The two keys used for public-key encryption are referred to as the public key and the private key. Invariably, the private key is kept secret and the public key is known publicly. Usually the public key is used for encryption purpose and the private key is used in the decryption side. 33. Specify the applications of the public key cryptosystem? The applications of the public-key cryptosystem can classified as follows 1. Encryption/Decryption: The sender encrypts a message with the recipient s public key. 2. Digital signature: The sender signs a message with its private key. Signing is achieved by a cryptographic algorithm applied to a message or to a small block of data that is a function of the message. 3. Key Exchange: Two sides cooperate to exchange a session key. Several different approaches are possible, involving the private key(s) of one or both parties. 34. What requirements must a public key cryptosystem to fulfill to a secured algorithm? The requirements of public-key cryptosystem are as follows: 1. It is computationally easy for a party B to generate a pair(public key KU b, Private key KR b ) 2. It is computationally easy for a sender A, knowing the public key and the message to be encrypted, M, to generate the corresponding ciphertext: C=E KUb (M) 3. It is computationally easy for the receiver B to decrypt the resulting ciphertext using the private key to recover the original message : M=D KRb (C)=D KRb [E KUb (M)] 4. It is computationally infeasible for an opponent, knowing the public key,ku b,to determine the private key,kr b.
7 5. It is computationally infeasible for an opponent, knowing the public key,ku b, and a ciphertext, C, to recover the original message,m. 6. The encryption and decryption functions can be applied in either order: M=E KUb [D KRb (M)]=D KUb [E KRb (M)] 35. What is a one way function? One way function is one that map the domain into a range such that every function value has a unique inverse with a condition that the calculation of the function is easy where as the calculations of the inverse is infeasible. 36. What is a trapdoor one way function? It is function which is easy to calculate in one direction and infeasible to calculate in other direction in the other direction unless certain additional information is known. With the additional information the inverse can be calculated in polynomial time. It can be summarized as: A trapdoor one way function is a family of invertible functions f k, such that Y= f k ( X) easy, if k and X are known X=f -1 k (Y) easy, if k and y are known X= f -1 k (Y) infeasible, if Y is known but k is not known 37. Define Euler s theorem and it s application? Euler s theorem states that for every a and n that are relatively prime: a PRGQ 38. Define Euler s totient function or phi function and their applications? The Euler s totient function states that, it should be clear for a prime number p, S S Describe in general terms an efficient procedure for picking a prime number? The procedure for picking a prime number is as follows: 1. Pick an odd integer n at random (eg., using a pseudorandom number generator). 2. Pick an integer a<n at random. 3. Perform the probabilistic primality test, such as Miller-Rabin. If n fails the test, reject the value n and go to step If n has passed a sufficient number of tests, accept n; otherwise, go to step Define Fermat Theorem? Fermat Theorem states the following: If p is prime and a is a positive integer not divisible by p, then A p-1 PRGS 41. List four general characteristics of schema for the distribution of the public key? The four general characteristics for the distribution of the public key are 1. Public announcement 2. Publicly available directory 3. Public-key authority 4. Public-key certificate
8 42. What is a public key certificate? The public key certificate is that used by participants to exchange keys without contacting a public key authority, in a way that is as reliable as if the keys were obtained directly from the public-key authority. Each certificate contains a public key and other information, is created by a certificate authority, and is given to a participant with the matching private key. 43. What are essential ingredient of the public key directory? The essential ingredient of the public key are as follows: 1. The authority maintains a directory with a {name, public key} entry for each participant 2. Each participant registers a public key with the directory authority. Registration would have to be in person or by some form of secure authenticated communication. 3. A participant may replace the existing key with a new one at a time,either because of the desire to replace a public key that has already been used for a large amount of data, or because the corresponding private key has been comprised in some way. 4. Periodically, the authority publishes the entire directory or updates to the directory. For example, a hard-copy version much like a telephone book could be published, or updates could be listed in a widely circulated newspaper. 5. Participants could also access the directory electronically. For this purpose, secure, authenticated communication from the authority to the participant is mandatory. 44. Find gcd (1970, 1066) using Euclid s algorithm? gcd (1970,1066) = gcd(1066,1970 mod 1066) = gcd(1066,904) = User A and B exchange the key using Diffie-Hellman algorithm. AVVXPH q=11 X A =2 X B =3. Find the value of Y A, Y B and k? Soln: X Y A= A mod q = 25 mod 11 = 3 X Y B B mod q = 125 mod 11 = 4 K = ( Y A ) X B mod q = 27 mod 11 = 5 K = ( Y B ) X A mod q = 16 mod 11 = What is the primitive root of a number? We can define a primitive root of a number p as one whose powers generate all the integers from 1 to p-1. That is p, if a is a primitive root of the prime number p then the numbers.
9 47. Determine the gcd (24140,16762) using Euclid s algorithm. Soln: We know, gcd(a, b) = gcd(b, a mod b) gcd(24140,16762) =gcd(16762,7378) gcd(7378,2006) =gcd(2006,1360) gcd(1360,646) =gcd(646,68) gcd(68,34) = 34 gcd(24140,16762) = Perform encryption and decryption using RSA Alg. for the following. P=7; q=11; e=17; M=8. Soln: n = pq n = 7*11=77 Q S-1) (q-1) =6*10 = 60 e =17 d =27 C = M e mod n C = 817 mod 77 = 57 M = C d mod n = 5727 mod 77 = What is an elliptic curve? The principle attraction of ECC compared to RSA, is that it appears to offer equal security for a far smaller key size, thereby reducing processing overhead. Unit III 50. What is message authentication? It is a procedure that verifies whether the received message comes from assigned source has not been altered. It uses message authentication codes, hash algorithms to authenticate the message. 51. Define the classes of message authentication function. Message encryption: The entire cipher text would be used for authentication. Message Authentication Code: It is a function of message and secret key produce a fixed length value. Hash function: Some function that map a message of any length to fixed length which serves as authentication. 52. What are the requirements for message authentication? The requirements for message authentication are 1. Disclosure:Release of message contents to any person or process not processing the appropriate cryptographic key
10 2. Traffic Analysis: Discovery of the pattern of traffic between parties. In a connection oriented application, the frequency and duration of connections could be determined. In either a connection oriented or connectionless environment, the number and length of messages between parties could be determined. 3. Masquerade: Insertion of messages into the network from a fraudulent source. This includes the creation of messages by an opponent that are purported to come from an authorized entity. Also included are fraudulent acknowledgements of message receipt or no receipt by someone other than the message recipient. 4. Content modification: Changes to the contents of a message, including insertion, deletion, transposition, and modification. 5. Sequence modification: Any modification to a sequence of messages between parties, including insertion, deletion, and modification. 6. Timing modification: Delay or replay of messages. In a connection oriented application, an entire session or sequence of messages could be a replay of some previous valid session, or individual messages in the sequence could be delayed or replayed. In connectionless application, an individual message could be delayed or replayed. 7. Source repudiation: Denial of transmission of message by source. 8. Destination repudiation: Denial of receipt of message by destination. 53. What you meant by hash function? Hash function accept a variable size message M as input and produces a fixed size hash code H(M) called as message digest as output. It is the variation on the message authentication code. 54. Differentiate MAC and Hash function? MAC: In Message Authentication Code, the secret key shared by sender and receiver. The MAC is appended to the message at the source at a time which the message is assumed or known to be correct. Hash Function: The hash value is appended to the message at the source at time when the message is assumed or known to be correct. The hash function itself not considered to be secret. 55. Any three hash algorithm. MD5 (Message Digest version 5) algorithm. SHA_1 (Secure Hash Algorithm). RIPEMD_160 algorithm. 56. What are the requirements of the hash function? H can be applied to a block of data of any size. H produces a fixed length output. H(x) is relatively easy to compute for any given x, making both hardware and software implementations practical. 57. What you meant by MAC? MAC is Message Authentication Code. It is a function of message and secret key which produce a fixed length value called as MAC. MAC = C k (M)
11 Where M = variable length message K = secret key shared by sender and receiver. C K (M) = fixed length authenticator. 58. Differentiate internal and external error control. Internal error control: In internal error control, an error detecting code also known as frame check sequence or checksum. External error control: In external error control, error detecting codes are appended after encryption. 59. What is the meet in the middle attack? This is the cryptanalytic attack that attempts to find the value in each of the range and domain of the composition of two functions such that the forward mapping of one through the first function is the same as the inverse image of the other through the second function-quite literally meeting in the middle of the composed function. 60. What is the role of compression function in hash function? The hash algorithm involves repeated use of a compression function f, that takes two inputs and produce a n-bit output. At the start of hashing the chaining variable has an initial value that is specified as part of the algorithm. The final value of the chaining variable is the hash value usually b>n; hence the term compression. 61. What is the difference between weak and strong collision resistance? Weak collision resistance Strong resistance collision For any given block x, it is computationally infeasible to fine y [ZLWK+\ +[ It is computationally infeasible to find any pair (x,y) such that H(x)=H(y) It is proportional to 2 n It is proportional to 2 n/2 62. Compare MD5, SHA1 and RIPEMD-160 algorithm. MD5 SHA-1 RIPEMD160 Digest length 128 bits 160 bits 160 bits Basic unit of processing 512 bits 512 bits 512 bits No of steps 64(4 rounds of 80 (4 rounds of 160 (5 paired rounds of 16) 16) 20) Maximum message size bits bits Primitive logical function Additive constants used Endianess Little Endian Big Endian Little Endian
12 63. Distinguish between direct and arbitrated digital signature? Direct digital signature Arbitrated Digital Signature The direct digital signature involves only The arbiter plays a sensitive and crucial the communicating parties. role in this digital signature. This may be formed by encrypting the Every signed message from a sender x to a entire message with the sender s private receiver y goes first to an arbiter A, who key. subjects the message and its signature to a number of tests to check its origin and content. 64. What are the properties a digital signature should have? ¾It must verify the author and the data and time of signature. ¾It must authenticate the contents at the time of signature. ¾It must be verifiable by third parties to resolve disputes. 65. What requirements should a digital signature scheme should satisfy? The signature must be bit pattern that depends on the message being signed. The signature must use some information unique to the sender, to prevent both forgery and denial. It must be relatively easy to produce the digital signature. It must be relatively easy to recognize and verify the digital signature. It must be computationally infeasible to forge a digital signature, either by constructing a new message for an existing digital signature or by constructing a fraudulent digital signature for a given message. It must be practical to retain a copy of the digital signature in storage. 66. Define Kerberos. Kerberos is an authentication service developed as part of project Athena at MIT. The problem that Kerberos address is, assume an open distributed environment in which users at work stations wish to access services on servers distributed throughout the network. 67. What is Kerberos? What are the uses? Kerberos is an authentication service developed as a part of project Athena at MIT.Kerberos provide a centralized authentication server whose functions is to authenticate servers. 68. What 4 requirements were defined by Kerberos? ƒsecure ƒreliable ƒtransparent ƒscalable
13 69. In the content of Kerberos, what is realm? A full service Kerberos environment consisting of a Kerberos server, a no. of clients, no.of application server requires the following: ƒthe Kerberos server must have user ID and hashed password of all participating users in its database. ƒthe Kerberos server must share a secret key with each server. Such an environment is referred to as Realm. 70. Assume the client C wants to communicate server S using Kerberos procedure. How can it be achieved? Dialogue between client C, server S and authentication server(as) are given below a) C AS: [IDc Pc IDs] b) AS C: Ticket c) C S: [IDc ADc IDs] Ticket = E Ks [IDc ADc IDs] Step 1: The user logon to workstation and request access to the server S. The client module C in the workstation request user password and sends message to AS that includes user ID(IDc), server ID(IDc) and its password. Step 2: Now the AS verify users password against its password database, if it is valid. AS sends the ticket to C that includes user ID(IDc), server ID(IDs) and the address of the client workstation (ADc) are encrypted with key which is shared by both AS and server(s). Step 3: Now the client use the ticket to server S, to send the message to S with IDc to access service. 71. What is the purpose of X.509 standard? X.509 defines framework for authentication services by the X.500 directory to its users.x.509 defines authentication protocols based on public key certificates.
14 Unit IV & Unit V 1.What are the services provided by PGP services Digital signature Message encryption Compression compatibility Segmentation 2. Explain the reasons for using PGP? a) It is available free worldwide in versions that run on a variety of platforms, including DOS/windows, UNIX, Macintosh and many more. b) It is based on algorithms that have survived extensive public review and are considered extremely secure. E.g.) RSA, DSS and Diffie-Hellman for public key encryption, CAST-128, IDEA, 3DES for conventional encryption, SHA-1for hash coding. c) It has a wide range of applicability from corporations that wish to select and enforce a standardized scheme for encrypting files and communication. d) It was not developed by nor is it controlled by any governmental or standards organization. 3. Why compatibility function in PGP needed? Electronic mail systems only permit the use of blocks consisting of ASCII text. To accommodate this restriction PGP provides the service converting the row 8- bit binary stream to a stream of printable ASCII characters. The scheme used for this purpose is Radix-64 conversion. 4. Name any cryptographic keys used in PGP? a) One-time session conventional keys. b) Public keys. c) Private keys. d) Pass phrase based conventional keys. 5. Define key Identifier? PGP assigns a key ID to each public key that is very high probability unique with a user ID. It is also required for the PGP digital signature. The key ID associated with each public key consists of its least significant 64bits. 6. List the limitations of SMTP/RFC 822? a) SMTP cannot transmit executable files or binary objects. b) It cannot transmit text data containing national language characters. c) SMTP servers may reject mail message over certain size. d) SMTP gateways cause problems while transmitting ASCII and EBCDIC. e) SMTP gateways to X.400 network cannot handle non textual data included in X.400 messages.
15 7. Draw the diagram for PGP message transmission reception?
16 8. What is the general format for PGP message? 9. Define S/MIME? Secure/Multipurpose Internet Mail Extension(S/MIME) is a security enhancement to the MIME Internet format standard, based on technology from RSA Data Security. 10. What are the elements of MIME? 9Five new message header fields are defined which may be included in an RFC 822 header. 9A number of content formats are defined. 9Transfer encodings are defined that enable the conversion of any content format into a form that is protected from alteration by the mail system. 11. What are the headers fields define in MIME? MIME version. Content type. Content transfer encoding. Content id. Content description. 12. What is MIME content type and explain? It is used to declare general type of data. Subtype define particular format for that type of the data. It has 7 content type & 15 subtypes. They are, 1. Text type Plain text. Enriched.
17 2. Multipart type Multipart/mixed. Multipart/parallel. Multipart/alternative. Multipart/digest. 3. Message type Message/RFC822. Message/partial. Message/external. 4. Image type JPEG. CIF. 5. Video type. 6. Audio type. 7. Application type Post script. Octet stream. 13. What are the key algorithms used in S/MIME? Digital signature standards. Diffi Hellman. RSA algorithm. 14. Give the steps for preparing envelope data MIME? Generate K s. Encrypt K s using recipient s public key. RSA algorithm used for encryption. Prepare the recipient info block. Encrypt the message using K s. 15. What you mean by Verisign certificate? Mostly used issue X.509 certificate with the product name Verisign digital id. Each digital id contains owner s public key, owner s name and serial number of the digital id. 16. What are the function areas of IP security? Authentication Confidentiality Key management. 17. Give the application of IP security? Provide secure communication across private & public LAN. Secure remote access over the Internet. Secure communication to other organization.
18 18. Give the benefits of IP security? Provide security when IP security implement in router or firewall. IP security is below the transport layer is transparent to the application. IP security transparent to end-user. IP security can provide security for individual user. 19. What are the protocols used to provide IP security? Authentication header (AH) protocol. Encapsulating Security Payload (ESP) protocol. 20. Specify the IP security services? Access control. Connectionless integrity. Data origin authentication Rejection of replayed packet. Confidentiality. Limited traffic for Confidentiality. 21. What do you mean by Security Association? Specify the parameters that identifies the Security Association? An association is a one-way relationship between a sender and receiver that affords security services to the traffic carried on. A key concept that appears in both the authentication and confidentiality mechanism for IP is the security association (SA). A security Association is uniquely identified by 3 parameters: Security Parameter Index (SPI). IP Destination Address. Security Protocol Identifier. 22. What does you mean by Reply Attack? A replay attack is one in which an attacker obtains a copy of an authenticated packet and later transmits it to the intended destination. Each time a packet is send the sequence number is incremented in the counter by the sender. 23. General format of IPsec ESP Format? Security Parameter Index(SPI) Sequence Number(SN) Payload Data (Variable) Padding(0-255 bytes) Authentication Data (variable)
19 24. Differentiate Transport and Tunnel mode in IPsec? Transport mode 1. Provide the protection for upper layer protocol between two hosts. 2. ESP in this mode encrypts and optionally authenticates IP Payload but not IP Header. 3. AH in this mode authenticate the IP Payload and selected portion of IP Header. Tunnel Mode 1. Provide the protection for entire IP Packet. 2. ESP in this mode encrypt authenticate the entire IP packet. 3. AH in this mode authenticate the entire IP Packet plus selected portion of outer IP Header. 25. What is Authentication Header? Give the format of the IPsec Authentication Header? It provides the authentication of IP Packet, so authentication is based on the use of MAC. Format of IPsec Authentication Header: First Header Payload Length Reserved Security Parameter Index(SPI) Sequence number(sn) Authentication Data(Variable) 26. Explain the format of ESP Transport Mode? Authenticated Encrypted Orig IPhdr ESP hdr Fig: IPV4 TCP DATA ESP Trir ESP auth Authenticated Encrypted Orig IP hdr Hop by hop,dest,routing,fragment ESP hdr dest Tcp Data ESP trir ESP auth Fig:IPV6
20 27. Define Transport Adjacency and Iterated Tunnel? Transport Adjacency: Apply authentication after encryption, two bundle transport mode Security Association o Inner SA (ESP_SA) o Outer SA(AH_SA) Iterated Tunnel: Apply authentication before encryption, 2 SA are combined, o Inner Sa-AH transport mode. o Outer Sa-ESP Tunnel mode. 28. Give features and weakness of Diffie Hellman? FEATURES: Secret keys created only when needed. Exchange requires no preexisting infrastructure. WEAKNESS: ƒprovide no information about identities. ƒit is subjected to man in middle attack. 29. Explain man in the middle attack? If A and B exchange message, means E intercept the message and receive the B s public key and B s userid, E sends its own message with its own public key and B s user ID based on the private key and Y. B compute the secret key and A compute k2 based on private key of A and Y. 30. List the steps involved in SSL record protocol? 1. SSL record protocol takes application data as input and fragments it. 2. Apply lossless Compression algorithm. 3. Compute MAC for compressed data. 4. MAC and compression message is encrypted using conventional alg. 31. Give SSL record format? Content type Major Version Minor Version Compressed length Plain Text(Optionally Compressed) MAC 0, 16 or 20 bytes. 32. What are the different between SSL version 3 and TLS? SSL TLS * In SSL the minor version is 0 and * In TLS, the major version is 3 and the the major version is 3 minor version is 1.
21 * SSL use HMAC alg., except that * TLS makes use of the same alg. the padding bytes concatenation. * SSL supports 12 various alert * TLS supports all of the alert codes codes. defined in SSL3 with the exception of no _ certificate. 33. What is mean by SET? What are the features of SET? Secure Electronic Transaction (SET) is an open encryption and security specification designed to protect credit card transaction on the internet. Features are: 1. Confidentiality of information 2. Integrity of data 3. Cardholder account authentication 4. Merchant authentication 34. What are the steps involved in SET Transaction? 1. The customer opens an account 2. The customer receives a certificate 3. Merchants have their own certificate 4. The customer places an order. 5. The merchant is verified. 6. The order and payment are sent. 7. The merchant requests payment authorization. 8. The merchant confirm the order. 9. The merchant provides the goods or services. 10. The merchant requests payment. 35. What is dual signature? What it is purpose? The purpose of the dual signature is to link two messages that intended for two different recipients. To avoid misplacement of orders. 36. List the 3 classes of intruder? Classes of Intruders 1) Masquerader 2) Misfeasor 3) Clandestine user
22 37. Define virus. Specify the types of viruses? A virus is a program that can infect other program by modifying them the modification includes a copy of the virus program, which can then go on to infect other program. Types: 1) Parasitic virus 2) Memory-resident virus 3) Boot sector virus 4) Stealth virus 5) Polymorphic virus 38. What is application level gateway? An application level gateway also called a proxy server; act as a relay of application-level traffic. The user contacts the gateway using a TCP/IP application, such as Telnet or FTP, and the gateway asks the user for the name of the remote host to be accessed. 39. List the design goals of firewalls? 1. All traffic from inside to outside, and vise versa, must pass through the firewall. 2. Only authorized traffic, as defined by the local security policy, will be allowed to pass. 3. The firewall itself is immune to penetration.
23 Part B Unit I 1. i) Explain Playfair cipher & Vernam cipher in detail. Playfair cipher i) Multiple letter encryption cipher ii) Example iii) Four Rules Vernam Cipher i) Encryption Ci = Pi Ki ii) Decryption Pi = Ci Ki iii) Example ii) Convert MEET ME using Hill cipher with the key matrix Convert the ciphertext back to plaintext. 2. Explain simplified DES with example. Structure of S-DES Functions Key Generation Encryption Block Diagram 3. Write short notes on i) Steganography Definition Historical Techniques Advanced Techniques Drawbacks ii) Block cipher modes of operation Electronic Code book mode Cipher block chaining mode Cipher feedback mode Output feedback mode 4. Explain classical Encryption techniques in detail. Substitution techniques o Caesar cipher o Playfair Cipher o Hill Cipher o Monoalphabetic Cipher o Polyalphabetic cipher Transposition Techniques
24 5. Write short notes on a. Security services Definition Confidentiality Authentication Integrity Non Repudiation Access Control Availability b. Feistel cipher structure Block diagram Explanation of Encryption and Decryption Process Design Parameters 6. Explain Data Encryption Standard (DES) in detail. Block diagram Details of Single Round Calculations of F(R, K) Key Generation DES Decryption 7. How AES is used for encryption/decryption? Discuss with example. AES Parameters Structure of AES AES Key Expansion 8. List the evaluation criteria defined by NIST for AES. Security Cost Algo. And Implementation characteristics Final-9 points Unit II 1. State and explain the principles of public key cryptography. Problems in CE Characterestics Elements 2. Explain Diffie Hellman key Exchange in detail with an example Algorithm Example
25 3. Explain the key management of public key encryption in detail Public Key announcement Publicly available directory Public key Certification Public Key Authority Simple Secret Key Distribution Secret Key Distribution with confidentiality and authentication Hybrid Scheme 4. Explain RSA algorithm in detail with an example Requirements Algorithm Example Computational Aspects Security of RSA 5. Briefly explain the idea behind Elliptic Curve Cryptosystem. EC over Real No and Zp ECC DH Key Exchange EC E/D Security of ECC Unit III 1. Explain the classification of authentication function in detail Introduction Message Encryption MAC Hash function 2. Describe MD5 algorithm in detail. Compare its performance with SHA bit block size produces 128 bit MD Processing steps Compression function Comparison
26 3. Describe SHA-1 algorithm in detail. Compare its performance with MD5 and RIPEMD-160 and discuss its advantages. 512 bit block size produces 160 bit MD Processing steps Compression function Comparison and advantages 4. Describe RIPEMD-160 algorithm in detail. Compare its performance with MD5 and SHA bit block size produces 160 bit MD Processing steps Compression function Comparison 5. Describe HMAC algorithm in detail. Algorithm Structure Security 6. Write and explain the Digital Signature Algorithm. Signature = (r,s) Verify v = r Algorithm Block diagram 7. Assume a client C wants to communicate with a server S using kerberos protocol. How can it be achieved? Introduction Simple Authentication Dialogue Secure Authentication Dialogue
27 Unit IV 1. Explain the operational description of PGP Authentication Confidentiality Compression Compatibility Segmentation 2. Write Short notes on S/MIME MIME Elements Functionality Algorithms MIME Messages Certificate Processing 3. Explain the architecture of IP Security Introduction IP Sec. Documents IP Sec. Services Security Association 4. Write short notes on authentication header and ESP Authentication header format Anti replay service Transport and tunnel mode ESP format ESP Encryption and Authentication Combined Security Association 5. Explain in detail the operation of Secure Socket Layer in detail. SSL concepts SSL Record protocol operation Logical connection between client and server 6. Explain Secure Electronic transaction with neat diagram. Introduction Services Requirements and features Participants Sequence of even
28 Dual signature Payment processing Unit V 1. Explain the technical details of firewall and describe any three types of firewall with neat diagram Pack filtering router Application level gateway Circuit level gateway 2. Write short notes on Intrusion Detection. Intrusion Techniques Statistical anomaly detection Rule based detection Distributed Intrusion Detection 3. Define virus. Explain in detail. A virus is a program that can infect other program by modifying them the modification includes a copy of the virus program, which can then go on to infect other program. Nature of viruses 4 phases Virus Structure Types of viruses Antivirus Approaches 4. Describe Trusted system in detail. Access control structure Reference Monitor concept 5. Explain in detail about password management. Password protection Loadind a new password Verifying a password Password selection strategies
29
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
NOORUL ISLAM COLLEGE OF ENGINEERING,KUMARACOIL. ME COMPUTER SCIENCE AND ENGG CS1629 -NETWORK SECURITY
NOORUL ISLAM COLLEGE OF ENGINEERING,KUMARACOIL. ME COMPUTER SCIENCE AND ENGG CS1629 -NETWORK SECURITY 1. What types of information might be derived from a traffic analysis attack? The following types of
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
NETWORK ADMINISTRATION AND SECURITY
NETWORK ADMINISTRATION AND SECURITY Unit I (NAS) (W- 10) Q. 1) What is Security Attack? Explain general categories of attack with examples. 7 Q. 2) List and define the five security services. 5 Q. 3) Define
VALLIAMMAI ENGINEERING COLLEGE
VALLIAMMAI ENGINEERING COLLEGE (A member of SRM Institution) SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year and Semester : I / II Section : 1 Subject Code : NE7202
CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email
CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia
NETWORK SECURITY Farooq Ashraf Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia O u t l i n e o f t h e P r e s e n t a t i o n What is Security
Network Security. Outline of the Tutorial
Network Security Dr. Indranil Sen Gupta Head, School of Information Technology Professor, Computer Science & Engg. Indian Institute of Technology Kharagpur 1 Outline of the Tutorial Security attacks and
Public Key Cryptography Overview
Ch.20 Public-Key Cryptography and Message Authentication I will talk about it later in this class Final: Wen (5/13) 1630-1830 HOLM 248» give you a sample exam» Mostly similar to homeworks» no electronic
AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014
Q.2a. Define Virus. What are the four phases of Viruses? In addition, list out the types of Viruses. A virus is a piece of software that can infect other programs by modifying them; the modification includes
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
Lecture 9 - Network Security TDTS41-2006 (ht1)
Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA [email protected] Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,
Network Security - Secure upper layer protocols - Background. Email Security. Question from last lecture: What s a birthday attack? Dr.
Network Security - Secure upper layer protocols - Dr. John Keeney 3BA33 Question from last lecture: What s a birthday attack? might think a m-bit hash is secure but by Birthday Paradox is not the chance
: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT
Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Cryptography and Network Security Chapter 15
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North
Chapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
Chapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
CRYPTOG NETWORK SECURITY
CRYPTOG NETWORK SECURITY PRINCIPLES AND PRACTICES FOURTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458 'jkfetmhki^^rij^jibwfcmf «MMr""'-^.;
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE SIXTH EDITION William Stallings International Edition contributions by Mohit P Tahiliani NITK Surathkal PEARSON Boston Columbus Indianapolis New
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key
Friends and Enemies Security Outline Encryption lgorithms Protocols Message Integrity Protocols Key Distribution Firewalls Figure 7.1 goes here ob, lice want to communicate securely Trudy, the intruder
IP Security. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49
IP Security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Network Security Essentials Chapter 7
Network Security Essentials Chapter 7 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
Cryptography and Security
Cunsheng DING Version 3 Lecture 17: Electronic Mail Security Outline of this Lecture 1. Email security issues. 2. Detailed introduction of PGP. Page 1 Version 3 About Electronic Mail 1. In virtually all
Message Authentication
Message Authentication message authentication is concerned with: protecting the integrity of a message validating identity of originator non-repudiation of origin (dispute resolution) will consider the
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Symmetric Key cryptosystem
SFWR C03: Computer Networks and Computer Security Mar 8-11 200 Lecturer: Kartik Krishnan Lectures 22-2 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement
SECURITY IN NETWORKS
SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Electronic Mail Security. Email Security. email is one of the most widely used and regarded network services currently message contents are not secure
Electronic Mail Security CSCI 454/554 Email Security email is one of the most widely used and regarded network services currently message contents are not secure may be inspected either in transit or by
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
7! Cryptographic Techniques! A Brief Introduction
7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures
Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities
TÜBİTAK Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü Introduction to Network Security (Revisit an Historical 12 year old Presentation) Prof. Dr. Halûk Gümüşkaya Why Security? Three primary reasons
Message authentication and. digital signatures
Message authentication and " Message authentication digital signatures verify that the message is from the right sender, and not modified (incl message sequence) " Digital signatures in addition, non!repudiation
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
What is network security?
Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application
CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec
CSCI 454/554 Computer and Network Security Topic 8.1 IPsec Outline IPsec Objectives IPsec architecture & concepts IPsec authentication header IPsec encapsulating security payload 2 IPsec Objectives Why
Compter Networks Chapter 9: Network Security
Goals of this chapter Compter Networks Chapter 9: Network Security Give a brief glimpse of security in communication networks Basic goals and mechanisms Holger Karl Slide set: Günter Schäfer, TU Ilmenau
ICTTEN8195B Evaluate and apply network security
ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated
How To Encrypt With A 64 Bit Block Cipher
The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
PGP from: Cryptography and Network Security
PGP from: Cryptography and Network Security Fifth Edition by William Stallings Lecture slides by Lawrie Brown (*) (*) adjusted by Fabrizio d'amore Electronic Mail Security Despite the refusal of VADM Poindexter
Cryptography and network security CNET4523
1. Name of Course 2. Course Code 3. Name(s) of academic staff 4. Rationale for the inclusion of the course/module in the programme Cryptography and network security CNET4523 Major The Great use of local
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond
Cryptography & Network Security
Cryptography & Network Security Lecture 1: Introduction & Overview 2002. 3. 27 [email protected] Common Terms(1) Cryptography: The study of mathematical techniques related to aspects of information security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
Message Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
Security in Computer Networks
Security in Computer Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-10/
ECE 428 Network Security
ECE 428 Network Security 1 Learning objectives Security requirements and tools Symmetric-key (secret key) cryptography Substitution, transposition, and product ciphers (DES) Public key cryptography: RSA
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 9: Authentication protocols, digital signatures Ion Petre Department of IT, Åbo Akademi University 1 Overview of
Lecture 10: Communications Security
INF3510 Information Security Lecture 10: Communications Security Audun Jøsang University of Oslo Spring 2015 Outline Network security concepts Communication security Perimeter security Protocol architecture
Network Security (2) CPSC 441 Department of Computer Science University of Calgary
Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
Chapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts
Outline INF3510 Information Security Lecture 10: Communications Security Network security concepts Communication security Perimeter security Protocol architecture and security services Example security
Chapter 11 Security Protocols. Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms
Chapter 11 Security Protocols Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms Chapter 11 Security Protocols Network Security Threats Network Security
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch February 20, 2005 1. Consider slide 12 in the handout for topic 2.2. Prove that the decryption process of a one-round Feistel cipher
Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols
Network Security Chapter 8 Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Communication Security Authentication Protocols Email Security Web Security
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
How To Protect Your Data From Attack
Security in Communication Networks Lehrstuhl für Informatik 4 RWTH Aachen Prof. Dr. Otto Spaniol Dr. rer. nat. Dirk Thißen Page 1 Organization Lehrstuhl für Informatik 4 Lecture Lecture takes place on
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson
Chapter 8 Network Security Slides adapted from the book and Tomas Olovsson Roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity Security protocols and measures: Securing
Securing IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
