Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
|
|
|
- Paul Nichols
- 10 years ago
- Views:
Transcription
1 Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead Known also as: Asymmetric Use two separate keys: a secrete key (private, not distributed, owned only by one party) and a public key (for all communication parties) See next slide Ingredients Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm 14/12/2009 Vasile Dadarlat - TARC 1
2 Public-key encryption & authentication 14/12/2009 Vasile Dadarlat - TARC 2
3 Public Key Encryption - Operation One key made public Used for encryption Other kept private Used for decryption Infeasible to determine decryption key, given encryption key and algorithm Either key can be used for encryption, the other for decryption Steps User generates pair of keys User places one key in public domain; he owns a collection of public keys To send a message to that user, encrypt using his public key User decrypts ciphertext using peer private key Changing own private key, need for updating correspondent public key 14/12/2009 Vasile Dadarlat - TARC 3
4 Digital Signature Public-key encryption used as authentication Sender encrypts message with its private key; obtain ciphertext as digital signature Receiver can decrypt, using sender s public key This authenticates sender, who is only person having the matching key Does not give privacy of data (confidentiality) Decrypt key is public Usually (for storing and speed purposes) the message is transmitted unencrypted, but is accompanied by an authenticator, obtained using a hash function depending on the message (if using a piece of the message, a message digest is obtained) Changing the message => change authenticator Authenticator encrypted with sender s private key, serving as digital signature Examples of message digest hash functions: SHA (Secure Hash Algorithm) MD5 (used on Internet, cheaper, high speed, less secure than SHA) 14/12/2009 Vasile Dadarlat - TARC 4
5 RSA (Rivest, Shamir, Adleman) Public-Key Encryption Algorithm Best public-key encryption algorithm Use of block cipher, where the plaintext and ciphertext lengths are integers from 0 to n-1, for a given n p, q primes, typically great values For calculated n = p*q, calculate Euler totient of n, named Φ(n), i.e. the number of positive integers less than n and relatively prime (coprime) to n Select a number e, relatively prime toφ(n) Number d is multiplicative inverse of e modulo Φ(n) : e*d = 1 mod Φ(n) See next slide 14/12/2009 Vasile Dadarlat - TARC 5
6 14/12/2009 Vasile Dadarlat - TARC 6
7 RSA Example See next slide 14/12/2009 Vasile Dadarlat - TARC 7
8 14/12/2009 Vasile Dadarlat - TARC 8
9 Authentication Protocols Authentication (Is this?) is not Authorization ( is allowed to do?) Authentication based on a shared secret key Is a Challenge-response type protocol: One party transmits a big random one-time number number used once (nonce) unique identification) to the other, who transforms it in a special way and returns the result For a bidirectional authentication: see figure K AB is the shared secret key A & B identifies parties R A & R B are nonces Protocol attacked by reflection attack, inserting a false session 14/12/2009 Vasile Dadarlat - TARC 9
10 Diffie-Hellman Key Exchange Algorithm used in IPSec Scope: establishing a shared secret key between two strangers, on an insecure net Use of two large prime numbers, n and g with (n-1)/2 also prime; numbers are public A picks and keeps secret a number x So B part with secret number y The common secret key K AB : g xy mod n 14/12/2009 Vasile Dadarlat - TARC 10
11 Example: Alice & Bob agree to use a prime number n=23 and base g=5. Alice chooses a secret integer x=6, then sends Bob A = g x mod n A = 5 6 mod 23 = 8. Bob chooses a secret integer y=15, then sends Alice : B = g y mod n B = 5 15 mod 23 = 19. Alice computes s = B x mod n 19 6 mod 23 = 2. Bob computes s = A y mod n 8 15 mod 23 = 2. Secret key: s = K AB 14/12/2009 Vasile Dadarlat - TARC 11
12 A modern model for network security implies the existence of a trusted third party See figure bellow Modern authentication algorithms based on KDC (Key Distribution Center) 14/12/2009 Vasile Dadarlat - TARC 12
13 Session Key Used for duration of one logical connection Destroyed at end of session Used for user data Permanent key Used for distribution of keys Key distribution center Determines which systems may communicate Provides one session key for that connection Security service module (SSM) Performs end to end encryption Obtains keys for host 14/12/2009 Vasile Dadarlat - TARC 13
14 Multiway challenge-response protocol (Needham-Schroeder) The Needham-Schroeder Symmetric Key Protocol is based on a symetric encription algorithm. It forms the basis for the Kerberos protocol. This protocol aims to establish a session key between two parties on a network, typically to protect further communication. KDC (denoted here as server S) gives to A a A-B session key K AB A uses nonce N A K AS is a symetric key known by A and S K BS is a symetric key known by B and S B will challenge A with nonce N B 14/12/2009 Vasile Dadarlat - TARC 14
15 The protocol can be specified as follows: Alice sends a message to the server identifying herself and Bob, telling the server she wants to communicate with Bob. The server generates K AB and sends back to Alice a copy encrypted under K BS for Alice to forward to Bob and also a copy for Alice. The nonce assures Alice that the message is fresh and that the server is replying to that particular message and the inclusion of Bob's name tells Alice who she is to share this key with. Alice forwards the key to Bob who can decrypt it with the key he shares with the server, thus authenticating the data. 14/12/2009 Vasile Dadarlat - TARC 15
16 Bob sends Alice a nonce encrypted under K AB to show that he has the key. Alice performs a simple operation on the nonce, re-encrypts it and sends it back verifying that she is still alive and that she holds the key 14/12/2009 Vasile Dadarlat - TARC 16
17 Authentication using Kerberos Real authentication protocol, based on Needham-Schroeder algorithm Used by Windows 2000 and other NOS; today use of Kerberos v5 Used in securing access to network resources (server access); A a user, B a server Implies work with extra resources provided by Kerberos: Authentication Server (AS) similar to KDC Ticket-Granting Server (TGS) issues proof of identity tickets 14/12/2009 Vasile Dadarlat - TARC 17
18 Kerberos overview 1. User logs on to workstation and requests service on host 2. AS verifies user s access right, creates a ticket-granting ticket and session key; results are encrypted using key derived from user s password and passed to user 3. Workstation, based on user s password, decrypts incoming AS message and sends ticket and authenticator (based on user s name, IP address and time) to TGS 4. TGS decrypts ticket and authenticator, checks request and creates ticket for accessing requested server 5. Workstation sends ticket and authenticator to server 6. Server verifies that ticket and authenticator match, then grants access to service; if mutual authentication is required, server returns an authenticator 14/12/2009 Vasile Dadarlat - TARC 18
19 Security Protocols in the Internet IP Level Security IPv4 and IPv6 Security IAB (Internet Architecture Board) defined & introduced IPSec specification: necessary security capabilities, over LANs, WANs and across the Internet. Use for: Secure branch office connectivity over Internet Secure remote access over Internet Extranet and intranet connectivity Enhanced electronic commerce security IPSec Scope Three main facilities: function Authentication header (AH) authentication function Encapsulated security payload (ESP) combined authentication/encryption 14/12/2009 Vasile Dadarlat - TARC 19 Key exchange function
20 Security Association (SA) One way relationship between sender and receiver, affording security services For two ways, two associations are required Three SA identification parameters Security parameter index local meaning IP destination address (SA destination endpoint) unicast for moment Security protocol identifier: use of AH or ESP SA implementation - Parameters Sequence number counter Sequence counter overflow Anti-reply windows AH information ESP information Lifetime of this association IPSec protocol mode Tunnel, transport or wildcard Path MTU 14/12/2009 Vasile Dadarlat - TARC 20
21 Transport and Tunnel Modes AH & ESP support two modes of use: Transport mode Protection for upper layer protocols Extends only to payload of an IP packet End to end between hosts Tunnel mode Protection for entire IP packet Entire packet (IP packet + security fields) treated as payload for outer IP packet No routers examine inner packet (traverses a tunnel between IP endpoints) Outer packet may have different source and destination address, due to security adds (carries firewall address) Tunnel mode may be implemented with firewall or IP router implementing IPSec software 14/12/2009 Vasile Dadarlat - TARC 21
22 Authentication Header Support for data integrity and authentication for IP packets A Security Association identified in Security Parameters Index field Use of Message Authentication Code (result of hash functions) stored in Authentication Data field Two IP endpoint parts must share a secret key Authentication calculated over immutable IP fields (during transit) or predictable in value at arrival; the rest are set to 0, for purposes of calculation and over IP payload IPSec Authentication Header 14/12/2009 Vasile Dadarlat - TARC 22
23 Encapsulating Security Payload Provides confidentiality services and some authentication Payload Data field is a transport level segment (transport mode) or IP packet (tunnel mode) 14/12/2009 Vasile Dadarlat - TARC 23
24 Scope of ESP Encryption & Authentication 14/12/2009 Vasile Dadarlat - TARC 24
25 Key Management for IPSec Determination & Distribution of secret keys: Manual Automatic Network administrator Use of ISAKMP/Oakley automated key management protocol Oakley key determination protocol: Diffie-Hellman key exchange algorithm with extra security Internet Security Association and Key Management Protocol gives specific protocol support (message types & formats, negotiation of security attributes) 14/12/2009 Vasile Dadarlat - TARC 25
26 Secure Sockets Layer (SSL) SSL general-purpose service Set of protocols that rely on TCP Two implementation options Part of underlying protocol suite Transparent to applications Embedded in specific packages e.g. Netscape and Microsoft Explorer and most Web servers SSL uses TCP to provide reliable end-to-end secure service SSL uses two layers of protocols Record Protocol, on top of TCP provides basic security services to various higher-layer protocols In particular, HTTP can operate on top of SSL Three higher-layer protocols, on top os SSL Record Protocol Handshake Protocol Change Cipher Spec Protocol Alert Protocol Used in management of SSL exchanges 14/12/2009 Vasile Dadarlat - TARC 26
27 SSL Record Protocol Confidentiality (Handshake Protocol defines shared secret key) Message Integrity (Handshake Protocol defines shared secret key; used to form message authentication code (MAC)) Each upper-layer message fragmented 2^14 bytes (16384 bytes) or less Compression optionally applied Compute message authentication code (MAC) Compressed message plus MAC encrypted using symmetric encryption 14/12/2009 Vasile Dadarlat - TARC 27
28 Alert Protocol Convey SSL-related alerts to peer entity Alert messages compressed and encrypted Two bytes First byte warning(1) or fatal(2) If fatal, SSL immediately terminates connection Other connections on session may continue No new connections on session Second byte indicates specific alert E.g. fatal alert is an incorrect MAC E.g. nonfatal alert is close_notify message Change Cipher Spec Protocol Uses Record Protocol Single message Updates cipher suite to be used on this connection 14/12/2009 Vasile Dadarlat - TARC 28
29 Handshake Protocol Authenticate Negotiate encryption and MAC algorithm and cryptographic keys Used before any application data sent 14/12/2009 Vasile Dadarlat - TARC 29
30 Transport Layer Security (TLS) Security protocol lying between an application (HTTP) and TCP levels TLS derived from SSL (Secure Sockets Layer developed for web-security) TLS composed from: Handshake protocol security negotiation, server authentication to the browser, exchange of client s secret key Data Exchange protocol data exchange between client & server, using accepted secret key 14/12/2009 Vasile Dadarlat - TARC 30
31 Application Layer Security Protocols Pretty Good Privacy (PGP) Used extensively for applications Advantage of using the best protocols for public key encryption (RSA, Diffie- Hellman), or symmetric encryption (IDEA, TDES); SHA for hash coding Used by any individual user, also by companies S/MIME (Secure/ Multipurpose Internet Mail Extension) Based on technology from RSA Emerging as standard for commercial & organizational use 14/12/2009 Vasile Dadarlat - TARC 31
32 Other Network Security Issues Firewalls Comms device (router, computer) installed between organization s internal network and rest of the Internet Normally used as a packet filter, based on info from network or transport levels headers: IP source/destination addresses, type of protocol (TCP/UDP) At Application level, use of Proxy Firewall For filtering, use of info from Application level Most common: HTTP proxy, acting between external clients and the corporation HTTP server Virtual Private Networks (VPN) Private: guarantees privacy inside organization Virtual: doesn t use real private WANs, is a public network physically Use of Internet for both private and public communications 14/12/2009 Vasile Dadarlat - TARC 32 Use of IPSec in the tunnel mode for authentication, privacy, integrity functions
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
Chapter 32 Internet Security
Chapter 32 Internet Security Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 32: Outline 32.1 NETWORK-LAYER SECURITY 32.2 TRANSPORT-LAYER SECURITY 32.3
The Secure Sockets Layer (SSL)
Due to the fact that nearly all businesses have websites (as well as government agencies and individuals) a large enthusiasm exists for setting up facilities on the Web for electronic commerce. Of course
3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security
Web Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
IP Security. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49
IP Security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
Chapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols
Network Security Chapter 8 Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Communication Security Authentication Protocols Email Security Web Security
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
Communication Systems SSL
Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security
Security: Focus of Control. Authentication
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part III-b Contents Part III-b Secure Applications and Security Protocols Practical Security Measures Internet Security IPSEC, IKE SSL/TLS Virtual Private Networks Firewall Kerberos SET Security Measures
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Standards and Products. Computer Security. Kerberos. Kerberos
3 4 Standards and Products Computer Security Standards and Products Public Key Infrastructure (PKI) IPsec SSL/TLS Electronic Mail Security: PEM, S/MIME, and PGP March 24, 2004 2004, Bryan J. Higgs 1 2
Cryptography and network security CNET4523
1. Name of Course 2. Course Code 3. Name(s) of academic staff 4. Rationale for the inclusion of the course/module in the programme Cryptography and network security CNET4523 Major The Great use of local
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture
OS Appl. CSC/ECE 574 Computer and Network Security Outline I. Overview II. The Record Protocol III. The Handshake and Other Protocols Topic 8.3 /TLS 1 2 Reminder: What Layer? Overview of 3 4 Protocols
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
Lukasz Pater CMMS Administrator and Developer
Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign
NETWORK ADMINISTRATION AND SECURITY
NETWORK ADMINISTRATION AND SECURITY Unit I (NAS) (W- 10) Q. 1) What is Security Attack? Explain general categories of attack with examples. 7 Q. 2) List and define the five security services. 5 Q. 3) Define
Protocol Security Where?
IPsec: AH and ESP 1 Protocol Security Where? Application layer: (+) easy access to user credentials, extend without waiting for OS vendor, understand data; (-) design again and again; e.g., PGP, ssh, Kerberos
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Chapter 5: Network Layer Security
Managing and Securing Computer Networks Guy Leduc Mainly based on Network Security - PRIVATE Communication in a PUBLIC World C. Kaufman, R. Pearlman, M. Speciner Pearson Education, 2002. (chapters 17 and
Secure Socket Layer. Security Threat Classifications
Secure Socket Layer 1 Security Threat Classifications One way to classify Web security threats in terms of the type of the threat: Passive threats Active threats Another way to classify Web security threats
Key Management (Distribution and Certification) (1)
Key Management (Distribution and Certification) (1) Remaining problem of the public key approach: How to ensure that the public key received is really the one of the sender? Illustration of the problem
ECE 428 Network Security
ECE 428 Network Security 1 Learning objectives Security requirements and tools Symmetric-key (secret key) cryptography Substitution, transposition, and product ciphers (DES) Public key cryptography: RSA
Chapter 11 Security Protocols. Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms
Chapter 11 Security Protocols Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms Chapter 11 Security Protocols Network Security Threats Network Security
Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1
Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1 How the Web Works - HTTP Hypertext transfer protocol (http). Clients request documents (or scripts) through URL. Server response with documents. Documents
WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Outline WEB Security & SET (Chapter 19 & Stalling Chapter 7) Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction (SET) Web Security Considerations
Lecture 9 - Network Security TDTS41-2006 (ht1)
Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA [email protected] Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,
: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT
Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference
What is network security?
Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application
Chapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
Network Security. Lecture 3
Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts
Outline INF3510 Information Security Lecture 10: Communications Security Network security concepts Communication security Perimeter security Protocol architecture and security services Example security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
CS 4803 Computer and Network Security
Network layers CS 4803 Computer and Network Security Application Transport Network Lower level Alexandra (Sasha) Boldyreva IPsec 1 2 Roughly Application layer: the communicating processes themselves and
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 9: Authentication protocols, digital signatures Ion Petre Department of IT, Åbo Akademi University 1 Overview of
VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls
Overview VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls Computer Net Lab/Praktikum Datenverarbeitung 2 1 VPN - Definition VPNs (Virtual Private Networks) allow secure data transmission
Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security
Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security Ch 7 - Security 1 Confidentiality and privacy: Protect
Security in Computer Networks
Security in Computer Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-10/
Internetwork Security
Internetwork Security Why Network Security Layers? Fundamentals of Encryption Network Security Layer Overview PGP Security on Internet Layer IPSec IPv6-GCAs SSL/TLS Lower Layers 1 Prof. Dr. Thomas Schmidt
Secure Sockets Layer
SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Lecture 10: Communications Security
INF3510 Information Security Lecture 10: Communications Security Audun Jøsang University of Oslo Spring 2015 Outline Network security concepts Communication security Perimeter security Protocol architecture
Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1 We have learned Symmetric encryption: DES, 3DES, AES,
Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec
Network Security #10 Parts modified from Computer Networking: A Top Down Approach Featuring the Internet, 2nd edition. Jim Kurose, Keith Ross, Addison-Wesley, 2002. 1 Overview Encryption Authentication
CSC 774 -- Network Security
CSC 774 -- Network Security Topic 6: Transport Layer Security Dr. Peng Ning CSC 774 Network Security 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally developed to secure http Version
CSC 474 Information Systems Security
CSC 474 Information Systems Security Topic 4.5 Transport Layer Security CSC 474 Dr. Peng Ning 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally developed to secure http Version
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol)
WEB Security: Secure Socket Layer Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP581 - L22 1 Outline of this Lecture Brief Information on SSL and TLS Secure Socket Layer (SSL) Transport Layer Security
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
T-79.159 Cryptography and Data Security
T-79.159 Cryptography and Data Security Lecture 11: Security systems using public keys 11.1 PGP Kaufman et al: Ch 17, 11.2 SSL/TLS 18, 19 11.3 IPSEC Stallings: Ch 16,17 1 Pretty Good Privacy Email encryption
Introduction to Security and PIX Firewall
Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network
Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson
Chapter 8 Network Security Slides adapted from the book and Tomas Olovsson Roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity Security protocols and measures: Securing
Network Security. Outline of the Tutorial
Network Security Dr. Indranil Sen Gupta Head, School of Information Technology Professor, Computer Science & Engg. Indian Institute of Technology Kharagpur 1 Outline of the Tutorial Security attacks and
Computer Networks - CS132/EECS148 - Spring 2013 --------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 5 Deadline : May 30th 9:30pm (hard and soft copies required) --------------------------------------------------------------------------
Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities
TÜBİTAK Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü Introduction to Network Security (Revisit an Historical 12 year old Presentation) Prof. Dr. Halûk Gümüşkaya Why Security? Three primary reasons
An Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
Overview. Protocols. VPN and Firewalls
Computer Network Lab 2015 Fachgebiet Technische h Informatik, Joachim Zumbrägel Overview VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls VPN-Definition VPNs (Virtual Private Networks)
Real-Time Communication Security: SSL/TLS. Guevara Noubir [email protected] CSU610
Real-Time Communication Security: SSL/TLS Guevara Noubir [email protected] CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS
Netzwerksicherheit: Anwendungen
Internet-Technologien (CS262) Netzwerksicherheit: Anwendungen 22. Mai 2015 Christian Tschudin & Thomas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 8 Security in Computer Networks
CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec
CSCI 454/554 Computer and Network Security Topic 8.1 IPsec Outline IPsec Objectives IPsec architecture & concepts IPsec authentication header IPsec encapsulating security payload 2 IPsec Objectives Why
Internet Security Architecture
accepted for publication in Computer Networks and ISDN Systems Journal Internet Security Architecture Refik Molva Institut Eurécom 2229, route des Crêtes F-06904 Sophia-Antipolis [email protected] Abstract
VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
VPN SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
Network Security - Secure upper layer protocols - Background. Email Security. Question from last lecture: What s a birthday attack? Dr.
Network Security - Secure upper layer protocols - Dr. John Keeney 3BA33 Question from last lecture: What s a birthday attack? might think a m-bit hash is secure but by Birthday Paradox is not the chance
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
ETSF10 Part 3 Lect 2
ETSF10 Part 3 Lect 2 DHCP, DNS, Security Jens A Andersson Electrical and Information Technology DHCP Dynamic Host Configuration Protocol bootp is predecessor Alternative: manual configuration IP address
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
Public Key Cryptography Overview
Ch.20 Public-Key Cryptography and Message Authentication I will talk about it later in this class Final: Wen (5/13) 1630-1830 HOLM 248» give you a sample exam» Mostly similar to homeworks» no electronic
Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities
SSL/TLS Today s Topics Server Certificates Client Certificates Certification Authorities Trust Registration Authorities VPN IPSec Client tunnels LAN-to-LAN tunnels Secure Sockets Layer Secure Sockets Layer
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Computer and Network Security
Computer and Network Security c Copyright 2000 R E Newman Computer & Information Sciences & Engineering University Of Florida Gainesville, Florida 32611-6120 nemo@ciseufledu Network Security Protocols
Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011
Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice
Security Protocols/Standards
Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards How do we actually communicate securely across a hostile network? Provide integrity, confidentiality, authenticity
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
