Middleware and Distributed Systems. Security. Martin v. Löwis
|
|
|
- Kory Payne
- 10 years ago
- Views:
Transcription
1 Middleware and Distributed Systems Security Martin v. Löwis
2 Introduction Threat model: shared resources need to be protected against adversaries Security Policy: specification defining what operations are on the resources are acceptable Often declared through access control Security Mechanism: procedure/infrastructure to enforce a security policy Design process Cryptography: art of encoding information so that only a designated recipient can understand it; distinct from security Security Middleware and Distributed Systems 2
3 Cryptography based in military applications (esp. intelligence and counter-intelligence) recently also used for other parts of life (esp. industry) opening of cryptography caused better understanding of the concept, more uniform terminology (e.g. usage of common names Alice, Bob, Carol, Dave, Eve, Mallory, Sara Literature Schneier, Applied Cryptography Anderson, Security Engineering Security Middleware and Distributed Systems 3
4 Threats and Attacks Threats Leakage: acquisition of information by unauthorized recipients Tampering: unauthorized alteration of information Vandalism: inference with proper operation of a system without gain for the perpetrator Attacks depend on gaining access to a channel or a node Eavesdropping: obtaining coies of messages without authority Masquerading: sending or receiving messages using the identity of another participant Replaying: storing intercepted messages and sending them later Denial of service: flooding a channel or node so that access to others is denied Security Middleware and Distributed Systems 4
5 Design process for secure systems Assume for the worst interfaces are exposed to attackers networks are insecure algorithms are available to attackers attackers may have access to large resources Define policies Define list of threat Specify how each threat is prevented through mechanism built into the system ideally: formally proof properties employ auditing Security Middleware and Distributed Systems 5
6 Cryptography Only consider "advanced" techniques here (e.g. no substitution algorithms) Algorithm should have a secret key as its parameter (KA, KB) Encryption E(K, M), decryption D(K, M) Shared-key algorithms: KAB used both for encryption and decryption public/private key algorithms: each participant has a pair of keys Applications of cryptography: Secrecy and integrity of messages Authentication Digital Signatures Security Middleware and Distributed Systems 6
7 Secrecy and Integrity Secrecy: Alice sends Bob E(K, M); Bob applies D(K, E(K, M)) Problem: How can Alice and Bob exchange the key securely? (key exchange) Problem: How can Bob know that Alice just send the message, as Mallory might have captured a message and replayed it? (replay attack) Integrity: may just use encryption; if D yields a meaningful result, it is authentic better: use Message Authentity Codes MAC(M): Alice sends encrypted MAC along with the message Bob decrypts received MAC, computed MAC(M), and compares them Security Middleware and Distributed Systems 7
8 Authentication Needham, Schroeder (1978): Using Encryption for Authentication in Large Networks. Communications of the ACM, Vol. 21, pp Authentication against a central server: Sara has shared secrets with both Alice and Bob Alice sends a plain-text message to Sara requesting a ticket for authentication to Bob Sara generates a new random secret key KAB, and puts E(KB, KAB) into the ticket Sara sends to Alice: E(KA, ticket+kab) Alice decrypts the message, and extracts E(KB, ticket) and KAB Alice sends to Bob: ticket, E(KAB, M) Bob decrypts the ticket, verifies it really is from Sara, retrieves KAB, and decodes the message Security Middleware and Distributed Systems 8
9 Authentication (2) Needham/Schroeder algorithm uses concept of a challenge: Alice can only use the ticket for B if she really possesses KA sending her password to Sara is not necessary for authentication Problem with that algorithm: a central server is needed which shares a secret key with each user Problem later solved through public/private key cryptography Security Middleware and Distributed Systems 9
10 Digital Signatures Scenario 1: Bob wants to make sure the message really originates from Alice Can use MAC as discussed earlier MAC is sometimes also called message digest Scenario 2: Bob wants to prove to Carol that the message is from Alice Cannot use shared keys anymore, since Bob would need to reveal the key to Carol Solution 1: Alice provides KApub to Bob in advance, then sends M, E(KApriv, digest(m)); Bob and Carol both decrypt the digest and verify it Problem: How can Carol be sure about KApub? Solution 2: Digital Certificates Security Middleware and Distributed Systems 10
11 Digital Certificates and Digital Signatures Dave, an authority, publishes his public key KDpub Alice identifies herself somehow to Dave, and simultaneously provides KApub Dave returns to Alice C=E(KDpriv, KApub) Alice sends C, M, E(KApriv, digest(m)) to Bob Bob and Carol decrypt C with KDpub, obtain certified KApub, then decrypt the digest with KApub, and compare it with digest(m) Security Middleware and Distributed Systems 11
12 Access Control Protection domain: List of <resource, right> pairs given to a set of processes in a distributed system typically established by a principal authenticating to the system, then processes acting on behalf of the principal typically implemented through capabilities or access control lists variations: role-bases access control (principals act in roles, and gain access based on their roles) Security Middleware and Distributed Systems 12
13 Capabilities tokens that enumerate the operations that a process may perform similar to physical keys in the real world need to be unforgable in a distributed system client passes capability along with the request; server verifies it and performs the operation problem 1: key theft may try to revoke capability when it is reported stolen partial solution: include the holder in the capability problem 2: capability revocation need to communicate to servers to "exchange the locks" partial solution: add timeout (end of validity) to capability Security Middleware and Distributed Systems 13
14 Access Control Lists add a list of <principal, operation> pairs to each resource several variations, e.g. groups of principals, separate allow and deny entries,... problem: assumes that principals can be reliably authenticated Security Middleware and Distributed Systems 14
15 Credentials evidence provided by principal when requesting access to a resource certificates, passwords, physical tokens,... speaks-for relationship: possession of credentials allows a principal to speak for another one delegation: passing of credentials from one process to another, to allow the other process to speak for the principal typically limited by permitted operations and by time Security Middleware and Distributed Systems 15
16 Cryptographic Algorithms Cryptoanalysis: known ciphertext, known plaintext, chosen plaintext; differential analysis (similar input data), related key analysis (similar keys) algorithm considered broken if a better-than-brute-force attack is known Symmetric vs. asymmetric algorithms block ciphers: algorithms often operate on fixed-size blocks (e.g. 64 bits) threat: attacker might recognize patterns, perform known plaintext analysis cipher block chaining: cipherblock i is XOR'ed with plaintext block i+1 before encryption repeated plaintext data will not result in same cipertext anymore threat: first encrypted block in a communication just based on plaintext Security Middleware and Distributed Systems 16
17 Cryptographic Algorithms (2) Stream ciphers: encrypting blocks of data might be inappropriate if data need to be transmitted quickly after the get produced e.g. live AV data encryption must encrypt bit-per-bit solution: keystream generator produces a stream of key bits based on some initial state Quality of algorithm: diffusion and confusion (Shannon) confusion: make output look different from input (e.g. combining multiple input bits into one) diffusion: dissipate regular patterns in the input, to make output look "random" (Avalanche Effect) Security Middleware and Distributed Systems 17
18 Shared-key (symmetric) algorithms TEA (Tiny Encryption Algorithm): Wheeler and Needham 1994 mainly for educational usage 128 bit keys (4x32), 64 bit blocksize DES (Data Encryption Standard): U.S. National Bureau of Standards 1977 originally by IBM 56-bit key, 64 bit blocksize designed for efficient implementation in hardware IDEA (International Data Encryption Algorithm): Lai and Massey 1990 developed as successor to DES; 128-bit keys Security Middleware and Distributed Systems 18
19 Shared-key algorithms (2) RC4: Rivest 1992 variable-length keys up to 256 bytes allows for efficient implementation in software, used in AES (Advanced Encryption Standard): Daemen and Rijmen 2000 submitted to U.S. NIST under the name Rijndael AES: block length 128 bits, key lengths 128, 192, 256 usable for U.S. SECRET data (TOP SECRET requires keys >= 192 bits) Rijndael: block and key length multiple of 32, between 128 and 256 Security Middleware and Distributed Systems 19
20 TEA uses integer addition, XOR and shift for diffusion and confusion bit shuffling: P-boxes (permutation) non-linear functions: S-boxes (substitution) Feistel network: encryption and decryption are very similar (reverse key schedule) product cipher (output is product of several rounds) 32 rounds each round takes as input the two 32-bit parts of the text, and combines them with the 4 32-bit parts of the key and with each other delta added to obscure key Security Middleware and Distributed Systems 20
21 Source: Wikipedia Time Middleware and Distributed Systems 21 MvL & PT 2007
22 TEA: Encryption void encipher(unsigned long *const v,unsigned long *const w, const unsigned long *const k) { register unsigned long y=v[0],z=v[1],sum=0,delta=0x9e3779b9,!!! a=k[0],b=k[1],c=k[2],d=k[3],n=32; while(n-->0) { sum += delta; y += (z << 4)+a ^ z+sum ^ (z >> 5)+b; z += (y << 4)+c ^ y+sum ^ (y >> 5)+d; } } w[0]=y; w[1]=z; Security Middleware and Distributed Systems 22
23 TEA: Decryption void decipher(unsigned long *const v,unsigned long *const w, const unsigned long *const k) { register unsigned long y=v[0],z=v[1],sum=0xc6ef3720,!!!! delta=0x9e3779b9,a=k[0],b=k[1],!!!! c=k[2],d=k[3],n=32; /* sum = delta<<5, in general sum = delta * n */ while(n-->0) { z -= (y << 4)+c ^ y+sum ^ (y >> 5)+d; y -= (z << 4)+a ^ z+sum ^ (z >> 5)+b; sum -= delta; } } w[0]=y; w[1]=z; Security Middleware and Distributed Systems 23
24 TEA weaknesses key equivalence: symmetric usage of key causes certain 4-tuples of keys to be equivalent effective key size is only 126 related key attacks: similar keys lead to similar output need 2 23 chosen plaintexts for successful key discovery Security Middleware and Distributed Systems 24
25 AES general substitution-permutation network key schedule: generate round keys from encryption key, expanding it to block size each round has four steps: AddRoundKey: combine 4x4 bytes with round key SubBytes: substitute each byte with another one according to a specified table ShiftRows: shift each row of the table somewhat MixColumns: apply a linear transformation on each column Security Middleware and Distributed Systems 25
26 AES: AddRoundKey Source: Wikipedia Security Middleware and Distributed Systems 26
27 AES: SubBytes Security Middleware and Distributed Systems 27
28 AES: ShiftRows Security Middleware and Distributed Systems 28
29 AES: MixColumns Security Middleware and Distributed Systems 29
30 Public Key (asymmetric) Algorithms Key pair: Ke, Kd so that D(Kd, E(Ke, M)) == M Ke made known public; Kd kept secret Assumption: Derivation of Kd from Ke is computationally expensive; generation of a new pair Kd/Ke is not RSA (Rivest, Shamir, Adelman), 1978 arbitrary key sizes, must generate two large primes ElGamal: Taher Elgamal, 1984 need to compute a large prime and its generator Various algorithms based elliptic curves Security Middleware and Distributed Systems 30
31 RSA Choose two large primes P and Q, N = P Q, Z = (P-1) (Q-1) Publish N, keep Z secret Choose d so that it is relatively prime with Z (lcd(d, Z) = 1) Choose e so that e d 1 (mod Z) Compute through extended Euclidean algorithm E(e, M) = M e mod N Compute through repeated quadration D(d, M) = M d mod N Idea: M ed M (mod Z) Fermat-Euler-Theorem: M Z 1 (mod N) hence M ed M 1+kZ M 1 M Zk M 1 1 k M(mod N) Security Middleware and Distributed Systems 31
32 RSA Analysis Chosen plain-text attack: Encrypt all messages with the public key until the encrypted message is found needs block size large enough to make this attack infeasible Compute private key from public key: Needs to factor N=PQ feasibility depends on efficient factorization algorithm; none is known today Key generation: need to test primality of large numbers quickly probabilistic tests: determine whether P, Q are "probable primes" fast deterministic tests: cyclotomy test, elliptic curve primality test, AKS test N not a power of two - need padding to achieve bit-oriented block sizes introduce randomized padding to protect better against brute force attacks Security Middleware and Distributed Systems 32
33 AKS Primality Test Manindra Agrawal, Neeraj Kayal, Nitin Saxena, 2002: PRIMES is in P deterministic primality test, in time polynomial with the bit length of candidate History: Agrawal 1999: probabilistic primality test: N is prime, iff, for all a, Bhattarcharjee, Pandey, 2001 (Bachelor's thesis): study modulus of x r 1 Kayal, Saxena, 2002 (Bachelor's thesis): Assuming Riemann's thesis, prove assumption of Bhattarcharjee, Pandey that if r is a prime and not a factor of N, and then either N is a prime, or Security Middleware and Distributed Systems 33
34 AKS Primality Test (2) Lenstra/Pomerance optimization of original algorithm Find the smallest r so that Or(n) > ld 2 (n) Or(n): smallest k, so that n k = 1 (mod r) ld: binary logarithm for a = 1 to r: if gcd(a, n)!= 1: output composite for a = 1 to : if (x + a) n x n +a (mod x r 1,n): output prime Security Middleware and Distributed Systems 34
35 Secure Hashing fixed-length bit pattern that characterizes a message Digest/Hash function H(M) ideally: collision-free; M1 M2 H(M1) H(M2) practically: if hash is short than message, there will be collisions collisions should not appear in practice ideally: irreversible (one-way hash functions) Birthday paradox (birthday attack): for a random sample of 2 ln(2) N 1.2 N elements from a total of N elements, there is a 50% probability of duplicates Security Middleware and Distributed Systems 35
36 Secure Hashing (2) MD5 (Message Digest 5): Rivest 1992 arbitrary-sized input, 128 bit hash broken; vulnerable to suffix attack (if MD5(A)==MD5(B) then for all X, Y MD5(X+A+Y) == MD5(X+B+Y)) SHA-1 (US Secure Hash Algorithm 1): NIST 1993 based on MD4, 160 bit hash assumed broken: Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu report that fewer than 2 69 operations are necessary to produce collision SHA-2 (SHA-224, SHA-256, SHA-384, SHA-512): NIST 2002 different size of resulting hash Security Middleware and Distributed Systems 36
37 MD-5 Input message split into 512-bit chunks; potentially padded padding: last 64 bits specify size of the original message, preceded by zeros, preceded by a single 1-bit, preceded by the original message multiple blocks are fed to algorithm state: 4 words A = , B = 89 ab cd ef, C = fe dc ba 98, D = each 32-bit word is processed in four rounds 16 words per chunk -> 64 rounds Security Middleware and Distributed Systems 37
38 MD5 (2) 64 constant Ki, one per round (computed from sine values) 4 round functions: Security Middleware and Distributed Systems 38
39 MD5 (3) Security Middleware and Distributed Systems 39
40 Public Key Infrastructure (PKI) X.509: Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks, CCITT 1988 part of OSI Directory RFC 3280 (obsoletes 2459): Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile Certificate Authority (CA): issuer/signer of public keys removes need for independent verification of public keys, assuming CA is trusted CA policy: under what conditions are certificates issued? how is the private key of the CA protected against theft? what information about the subject will be included? Security Middleware and Distributed Systems 40
41 PKI (2) CA hierarchy: individual users don't obtain certificate from a single authority, but root CA certifies sub-ordinate CA certificate chain: sequence of certificates leading up to root signed information in certificate: subject: who is being certified (distinguished name, public key issuer: what CA issued the certificate (distinguished name, signature) period of validity additional attributes Security Middleware and Distributed Systems 41
42 X.509: Certificate Certificate ::= SEQUENCE { tbscertificate TBSCertificate, signaturealgorithm AlgorithmIdentifier, signaturevalue BIT STRING } Security Middleware and Distributed Systems 42
43 TBSCertificate TBSCertificate ::= SEQUENCE { version [0] EXPLICIT Version DEFAULT v1, -- today, always v3 serialnumber CertificateSerialNumber, signature AlgorithmIdentifier, issuer Name, validity Validity, subject Name, subjectpublickeyinfo SubjectPublicKeyInfo, issueruniqueid [1] IMPLICIT UniqueIdentifier OPTIONAL, subjectuniqueid [2] IMPLICIT UniqueIdentifier OPTIONAL, extensions [3] EXPLICIT Extensions OPTIONAL } Version ::= INTEGER { v1(0), v2(1), v3(2) } Security Middleware and Distributed Systems 43
44 Certificate fields CertificateSerialNumber ::= INTEGER Validity ::= SEQUENCE { notbefore Time, notafter Time } Time ::= CHOICE { utctime UTCTime, -- UNIVERSAL 23 generaltime GeneralizedTime } UniqueIdentifier ::= BIT STRING SubjectPublicKeyInfo ::= SEQUENCE { algorithm AlgorithmIdentifier, subjectpublickey BIT STRING } Extensions ::= SEQUENCE SIZE (1..MAX) OF Extension Security Middleware and Distributed Systems 44
45 Algorithms AlgorithmIdentifier ::= SEQUENCE { algorithm OBJECT IDENTIFIER, parameters ANY DEFINED BY algorithm OPTIONAL } Security Middleware and Distributed Systems 45
46 Names Name ::= CHOICE { RDNSequence } RDNSequence ::= SEQUENCE OF RelativeDistinguishedName RelativeDistinguishedName ::= SET OF AttributeTypeAndValue AttributeTypeAndValue ::= SEQUENCE { type AttributeType, value AttributeValue } AttributeType ::= OBJECT IDENTIFIER AttributeValue ::= ANY DEFINED BY AttributeType Security Middleware and Distributed Systems 46
47 Extensions Extension ::= SEQUENCE { extnid critical OBJECT IDENTIFIER, BOOLEAN DEFAULT FALSE, extnvalue OCTET STRING } Predefined extensions: id-ce OBJECT IDENTIFIER ::= { joint-iso-ccitt(2) ds(5) 29 } Security Middleware and Distributed Systems 47
48 OIDs for Algorithms md5withrsa des-ecb des-cbc DSA-SHA RSA-SHA sha1 rsaencryption md5withrsaencryption sha1withrsaencryption sha256withrsaencryption sha512withrsaencryption Elliptic-Curve Nyberg-Rueppel with SHA-1 signature Security Middleware and Distributed Systems 48
49 OIDs for Names CN SN serialnumber C L ST streetaddress O OU role userid address Security Middleware and Distributed Systems 49
50 OIDs for Extensions Subject Key Identifier Key Usage Subject Alternative Name Issuer Alternative Name Basic Constraints Extended Key Usage Netscape Base Url Netscape Revocation Url Netscape Comment Microsoft Certificate Type Security Middleware and Distributed Systems 50
51 Key Usage Extension id-ce-keyusage OBJECT IDENTIFIER ::= { id-ce 15 } KeyUsage ::= BIT STRING { digitalsignature (0), nonrepudiation (1), keyencipherment (2), dataencipherment (3), keyagreement (4), keycertsign (5), crlsign (6), encipheronly (7), decipheronly (8) } Security Middleware and Distributed Systems 51
52 Subject Alternative Name Extension GeneralNames ::= SEQUENCE SIZE (1..MAX) OF GeneralName GeneralName ::= CHOICE { othername [0] OtherName, rfc822name [1] IA5String, dnsname [2] IA5String, x400address [3] ORAddress, directoryname [4] Name, edipartyname [5] EDIPartyName, uniformresourceidentifier [6] IA5String, ipaddress [7] OCTET STRING, registeredid [8] OBJECT IDENTIFIER } OtherName ::= SEQUENCE { type-id OBJECT IDENTIFIER, value [0] EXPLICIT ANY DEFINED BY type-id } Security Middleware and Distributed Systems 52
53 Extended Key Usage Extension ExtKeyUsageSyntax ::= SEQUENCE SIZE (1..MAX) OF KeyPurposeId KeyPurposeId ::= OBJECT IDENTIFIER Server Authentication Client Authentication Code Signing Protection Time Stamping OCSP Signing Microsoft Encrypting File System Security Middleware and Distributed Systems 53
54 Transport Layer Security RFC 5246 (TLS version 1.2) goal: provide privacy and data integrity, interoperable, extensible, efficient two layers: record protocol, handshake protocol record protocol: private connection (DES, RC4,...) reliable transport (SHA, MD5,...) handshake protocol: allow client and server to authenticate to each other, using asymmetric algorithms one peer does not need to authenticate negotiate shared secret for communication Security Middleware and Distributed Systems 54
55 Kerberos Originally RFC 1510 (Kerberos v5), recently revised in RFC 4120 based on Needham/Schroeder algorithm developed for MIT Project Athena KDC: Key Distribution Center Realm: Scope of a KDC Principal: uniquely named client or server Server: principal which provides a resource to clients Ticket: record to authenticate a client to a server Security Middleware and Distributed Systems 55
56 Kerberos: Basic Operation Client requests TGT (Ticket Granting Ticket) from AS (Authentication service) KRB_AS_REQ and KRB_AS_REP Client requests ticket for specific service from TGS (Ticket-Granting Service) KRB_TGS_REQ and KRB_TGS_REP; ticket carries session key client caches all tickets in ticket cache Client communicates session key to service KRB_AP_REQ and KRB_AP_REP (only for mutual authentication) Messages include "authenticator": nonce values computed from system time and principal name, signed with session key time stamp prevents replay attacks; server needs replay cache for clock skew Client and server exchange KRB_PRIV and KRB_SAFE messages Security Middleware and Distributed Systems 56
57 Kerberos: Tickets Ticket ::= [APPLICATION 1] SEQUENCE { tkt-vno[0] INTEGER, -- 5 realm[1] Realm, sname[2] PrincipalName, enc-part[3] EncryptedData } Realm ::= GeneralString PrincipalName ::= SEQUENCE { name-type[0] INTEGER, name-string[1] SEQUENCE OF GeneralString } Security Middleware and Distributed Systems 57
58 Kerberos: Tickets (2) EncTicketPart ::= [APPLICATION 3] SEQUENCE { flags[0] TicketFlags, key[1] EncryptionKey, crealm[2] Realm, cname[3] PrincipalName, transited[4] TransitedEncoding, authtime[5] KerberosTime, starttime[6] KerberosTime OPTIONAL, endtime[7] KerberosTime, renew-till[8] KerberosTime OPTIONAL, caddr[9] HostAddresses OPTIONAL, authorization-data[10] AuthorizationData OPTIONAL } KerberosTime ::= GeneralizedTime -- Specifying UTC time zone (Z) Security Middleware and Distributed Systems 58
59 TicketFlags TicketFlags ::= BIT STRING { reserved(0), forwardable(1), forwarded(2), proxiable(3), proxy(4), may-postdate(5), postdated(6), invalid(7), renewable(8), initial(9), pre-authent(10), hw-authent(11) } Security Middleware and Distributed Systems 59
60 TicketFlags (2) initial: ticket originates from AS pre-authenticated: the client has authenticated itself to the KDC required in Active Directory; client needs to encrypt time stamp with password hash designed to prevent offline attacks against the shared secret HW-authenticated: the client has authenticated itself using a hardware token forwardable/forwarded: TGT can be moved to a different network proxiable/proxy: ticket allows the service to act on the principal's behalf renewable: ticket can be renewed until renew-till; KDC might check whether it was reported stolen may-postdate/postdated: ticket starts validity at a future point in time Security Middleware and Distributed Systems 60
61 Application Programming Interfaces and Layering GSSAPI (RFC 2743): Generic Security Service API Attempt to integrate multiple security mechanisms into single API Implies wire protocol for interoperability different mechanisms are not interoperable: Kerberos, NTLM, DCE, SPKM,... CryptoAPI and SSPI (Microsoft): single API for multiple mechanisms CSP: Cryptographic Service Provider offers various cryptographic functions SSPI authentication mechanisms: Schannel (TLS), Kerberos, Negotiate (SPNEGO), NTLM, DIGEST Security Middleware and Distributed Systems 61
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
public key version 0.2
version 0.2 Typeset in L A TEX from SGML source using the DocBuilder-0.9.8.4 Document System. Contents 1 User s Guide 1 1.1 Introduction.......................................... 1 1.1.1 Purpose........................................
Introduction to Computer Security
Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
7! Cryptographic Techniques! A Brief Introduction
7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
Properties of Secure Network Communication
Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Certification Authority. The X.509 standard, PKI and electronic documents. X.509 certificates. X.509 version 3. Critical extensions.
The X.509 standard, PKI and electronic uments Antonio Lioy < lioy @ polito.it > Politecnico di Torino Dipartimento di Automatica e Informatica Certification Authority (4) cert repository (cert, CRL) Certification
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0
DEFENSE INFORMATION SYSTEMS AGENCY JOINT INTEROPERABILITY TEST COMMAND FORT HUACHUCA, ARIZONA DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
Lecture 9 - Network Security TDTS41-2006 (ht1)
Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA [email protected] Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,
Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1
Chapter 4 Authentication Applications COSC 490 Network Security Annie Lu 1 OUTLINE Kerberos X.509 Authentication Service COSC 490 Network Security Annie Lu 2 Authentication Applications authentication
Chapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
4.2: Kerberos Kerberos V4 Kerberos V5. Chapter 5: Security Concepts for Networks. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Secure Applications Network Authentication Service: Kerberos 4.2:
Public Key Cryptography Overview
Ch.20 Public-Key Cryptography and Message Authentication I will talk about it later in this class Final: Wen (5/13) 1630-1830 HOLM 248» give you a sample exam» Mostly similar to homeworks» no electronic
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
Kerberos. Login via Password. Keys in Kerberos
Kerberos Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Secure Applications Network Authentication Service: Kerberos
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 9: Authentication protocols, digital signatures Ion Petre Department of IT, Åbo Akademi University 1 Overview of
Lecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
SECURITY IN NETWORKS
SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
Message authentication and. digital signatures
Message authentication and " Message authentication digital signatures verify that the message is from the right sender, and not modified (incl message sequence) " Digital signatures in addition, non!repudiation
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Security and Authentication Primer
Security and Authentication Primer Manfred Jantscher and Peter H. Cole Auto-ID Labs White Paper WP-HARDWARE-025 Mr. Manfred Jantscher Visiting Master Student, School of Electrical and Electronics Engineering,
10.2 World Wide Web Security S-HTTP (secure hypertext transfer protocol) SEA (security extension architecture)
Contents 1 / 55 10.1 Kerberos Kerberos V4 Kerberos V5 10.2 World Wide Web Security S-HTTP (secure hypertext transfer protocol) SEA (security extension architecture) Kerberos V4 / Contents 2 / 55 Kerberos
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard
Authentication Applications
Authentication Applications CSCI 454/554 Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures Kerberos a symmetric-key
How To Use Kerberos
KERBEROS 1 Kerberos Authentication Service Developed at MIT under Project Athena in mid 1980s Versions 1-3 were for internal use; versions 4 and 5 are being used externally Version 4 has a larger installed
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
Network Security (2) CPSC 441 Department of Computer Science University of Calgary
Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate
Certificates and network security
Certificates and network security Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014 Outline X.509 certificates and PKI Network security basics: threats and goals Secure socket layer
CIS433/533 - Computer and Network Security Cryptography
CIS433/533 - Computer and Network Security Cryptography Professor Kevin Butler Winter 2011 Computer and Information Science A historical moment Mary Queen of Scots is being held by Queen Elizabeth and
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
MTAT.07.017 Applied Cryptography
MTAT.07.017 Applied Cryptography Public Key Infrastructure (PKI) Public Key Certificates (X.509) University of Tartu Spring 2015 1 / 42 The hardest problem Key Management How to obtain the key of the other
Authentication Applications
Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures will consider Kerberos a private-key authentication service
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
lundi 1 octobre 2012 In a set of N elements, by picking at random N elements, we have with high probability a collision two elements are equal
Symmetric Crypto Pierre-Alain Fouque Birthday Paradox In a set of N elements, by picking at random N elements, we have with high probability a collision two elements are equal N=365, about 23 people are
What is network security?
Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application
Message Authentication
Message Authentication message authentication is concerned with: protecting the integrity of a message validating identity of originator non-repudiation of origin (dispute resolution) will consider the
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols
Network Security Chapter 8 Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Communication Security Authentication Protocols Email Security Web Security
: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT
Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Computer and Network Security. Outline
Computer and Network Security Lecture 10 Certificates and Revocation Outline Key Distribution Certification Authorities Certificate revocation 1 Key Distribution K A, K B E KA ( K AB, E KB (KAB) ) K A
Cryptography and Network Security Digital Signature
Cryptography and Network Security Digital Signature Xiang-Yang Li Message Authentication Digital Signature Authentication Authentication requirements Authentication functions Mechanisms MAC: message authentication
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
Chapter 16: Authentication in Distributed System
Chapter 16: Authentication in Distributed System Ajay Kshemkalyani and Mukesh Singhal Distributed Computing: Principles, Algorithms, and Systems Cambridge University Press A. Kshemkalyani and M. Singhal
SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK
SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION September 2010 (reviewed September 2014) ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK NETWORK SECURITY
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs Enes Pasalic University of Primorska Koper, 2014 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a
Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg
Outline CSc 466/566 Computer Security 8 : Cryptography Digital Signatures Version: 2012/02/27 16:07:05 Department of Computer Science University of Arizona [email protected] Copyright c 2012 Christian
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
How To Understand And Understand The History Of Cryptography
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professors Jaeger Lecture 5 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/
Public Key (asymmetric) Cryptography
Public-Key Cryptography UNIVERSITA DEGLI STUDI DI PARMA Dipartimento di Ingegneria dell Informazione Public Key (asymmetric) Cryptography Luca Veltri (mail.to: [email protected]) Course of Network Security,
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
Network Security. Omer Rana
Network Security Omer Rana CM0255 Material from: Cryptography Components Sender Receiver Plaintext Encryption Ciphertext Decryption Plaintext Encryption algorithm: Plaintext Ciphertext Cipher: encryption
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
CSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall [email protected] Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
Standards and Products. Computer Security. Kerberos. Kerberos
3 4 Standards and Products Computer Security Standards and Products Public Key Infrastructure (PKI) IPsec SSL/TLS Electronic Mail Security: PEM, S/MIME, and PGP March 24, 2004 2004, Bryan J. Higgs 1 2
Chapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
ARCHIVED PUBLICATION
ARCHIVED PUBLICATION The attached publication, FIPS Publication 186-3 (dated June 2009), was superseded on July 19, 2013 and is provided here only for historical purposes. For the most current revision
Application Layer (1)
Application Layer (1) Functionality: providing applications (e-mail, www, USENET etc) providing support protocols to allow the real applications to function properly security comprising a large number
ECE 428 Network Security
ECE 428 Network Security 1 Learning objectives Security requirements and tools Symmetric-key (secret key) cryptography Substitution, transposition, and product ciphers (DES) Public key cryptography: RSA
Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security
Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security Ch 7 - Security 1 Confidentiality and privacy: Protect
Certificate Policy for. SSL Client & S/MIME Certificates
Certificate Policy for SSL Client & S/MIME Certificates OID: 1.3.159.1.11.1 Copyright Actalis S.p.A. All rights reserved. Via dell Aprica 18 20158 Milano Tel +39-02-68825.1 Fax +39-02-68825.223 www.actalis.it
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Lukasz Pater CMMS Administrator and Developer
Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014
Q.2a. Define Virus. What are the four phases of Viruses? In addition, list out the types of Viruses. A virus is a piece of software that can infect other programs by modifying them; the modification includes
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Some solutions commonly used in order to guarantee a certain level of safety and security are:
1. SSL UNICAPT32 1.1 Introduction The following introduction contains large excerpts from the «TCP/IP Tutorial and Technical Overview IBM Redbook. Readers already familiar with SSL may directly go to section
Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.
CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin [email protected] Slide 09-1 Overview Key exchange Session vs. interchange
How To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Secret Key Cryptography (I) 1 Introductory Remarks Roadmap Feistel Cipher DES AES Introduction
Digital Signature Standard (DSS)
FIPS PUB 186-4 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Digital Signature Standard (DSS) CATEGORY: COMPUTER SECURITY SUBCATEGORY: CRYPTOGRAPHY Information Technology Laboratory National Institute
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
public_key Copyright 2008-2015 Ericsson AB, All Rights Reserved public_key 1.0.1 September 22, 2015
public_key Copyright 2008-2015 Ericsson AB, All Rights Reserved public_key 1.0.1 September 22, 2015 Copyright 2008-2015 Ericsson AB, All Rights Reserved Licensed under the Apache License, Version 2.0 (the
Introduction to Cryptography
Introduction to Cryptography Part 3: real world applications Jean-Sébastien Coron January 2007 Public-key encryption BOB ALICE Insecure M E C C D channel M Alice s public-key Alice s private-key Authentication
