Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University



Similar documents
Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Information Security

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

CRYPTOGRAPHY IN NETWORK SECURITY

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Content Teaching Academy at James Madison University

CPSC 467b: Cryptography and Computer Security

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CSCE 465 Computer & Network Security

CSE/EE 461 Lecture 23

Lukasz Pater CMMS Administrator and Developer

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

An Introduction to Cryptography and Digital Signatures

The Mathematics of the RSA Public-Key Cryptosystem

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Chapter 7: Network security

Client Server Registration Protocol

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

COSC 472 Network Security

CS 758: Cryptography / Network Security

AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

Chapter 15: Security

Network Security. HIT Shimrit Tzur-David

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

ICOM 5018 Network Security and Cryptography

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Chap. 1: Introduction

An Introduction to Cryptography as Applied to the Smart Grid

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Introduction to Computer Security

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Public Key Cryptography Overview

SECURITY IN NETWORKS

Message authentication and. digital signatures

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

High Security Online Backup. A Cyphertite White Paper February, Cloud-Based Backup Storage Threat Models

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Advanced Authentication

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, BC. From Italy (?).

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

CPSC 467: Cryptography and Computer Security

Message Authentication Codes

Cryptography & Digital Signatures

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

Software Engineering 4C03 Research Project. An Overview of Secure Transmission on the World Wide Web. Sean MacDonald

Security Digital Certificate Manager

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Chapter 18: System Security

Security Digital Certificate Manager

How To Use A College Computer System Safely

Network Security Protocols

Principles of Network Security

Cryptography and Network Security Chapter 9

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

CS 161 Computer Security Spring 2010 Paxson/Wagner MT2

PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin.

Computer Security: Principles and Practice

Security in Android apps

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

A Novel Approach to combine Public-key encryption with Symmetric-key encryption

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Public Key (asymmetric) Cryptography

Chapter 23. Database Security. Security Issues. Database Security

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Cornerstones of Security

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Chapter 10. Network Security

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

TELE 301 Network Management. Lecture 18: Network Security

Network Security. Outline of the Tutorial

Savitribai Phule Pune University

FileCloud Security FAQ

Overview of Public-Key Cryptography

Application Layer (1)

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

What is network security?

7! Cryptographic Techniques! A Brief Introduction

Transcription:

Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University

Security Intro for Admins l Network administrators can break security into two parts: internal and external security l Internal security is acting to prevent and handle internal threats, that is threats from authorized users l External security is acting to prevent and handle threats from non-users

Internal Security Threats l Users may access data or services not intended for them and may take it out of protected areas or give it to unauthorized people, other users data or system or corporate data l Users may use services or systems for criminal or unauthorized activity l Users may impersonate other users l Users may compromise security by accident, such as by worm or virus

Internal Security Tasks l Managing user accounts l Managing access permissions by groups or by account type user, system (for access to specific functions), or root account (superuser) l Password policy management l File and directory permissions l Educating and handling user support for security understanding and compliance

External Security Threats l Front-door threats may occur when a non-user gains access to a password or cracks an access system (for example by brute force or by guessing) l Back-door threats occur from unpatched bugs in software and from intentional back doors in malicious software l Denial-of-service (DoS) attacks are typically used to eat up CPU time and network processes, thus making services unavailable

External Security Tasks l Examining access logs for suspicious access attempts or successes l Scanning incoming data from network or from other IO devices for known malicious software l Manage access from external sources and limit them to those that absolutely require outside access l Limit internal access to servers providing external services

Information Security Issues l Confidentiality sending data without letting others know any contents l Authentication establishing identity l Integrity and non-repudiation to be able to show that a message had a certain sender l Availability and Access keeping services available and accessible to the appropriate users 7

Confidentiality l Based on encryption and decryption l Secret algorithms or secret methods of transmission are not reliably secure l Instead, modern encryption depends on open (public) algorithms and secret (private) keys l Number theory offers a way to use both public keys and private keys together to allow open but confidential communication l Encryption and one-way functions are also the basis for other security issues, such as authentication, integrity, and non-repudiation 8

Basic Tools of Security l Modern security uses known algorithms l Extremely large pseudorandom numbers and prime numbers make finding passwords and keys by chance or by brute force very unlikely l Cryptographic hashing protects passwords and authenticates documents l Symmetric cryptography, such as block cryptography, is fast and strong l Asymmetric cryptography is slower but allows key exchange, public document signing, and authentication protocols 9

Symmetric Key Cryptography l Key is called symmetric-, secret-, private-, shared-, or single-key cryptography l The same key is used to encrypt and decrypt l A key in cryptography is generally a very large integer or set of integers and is used in a known (public) algorithm to encrypt and/or decrypt a message 38 72 3E BE 1E A2 5B 3A 66 D3 2C 39 6D 3A DB 6F A pseudo-randomly generated 128-bit key 10

Symmetric Key Cryptography Plaintext private key A Encrypted data private key A Plaintext Encryption algorithm Decryption algorithm l Sharing a key means more trust is needed and a system of key distribution is needed l Exchanging information with unknown agents would require a new key each time 11

Public-key Cryptography l In this method, a different key is used to encrypt and decrypt l The key for encryption can, therefore, be shared publically, even with untrusted agents l The numbers used are extremely large l The algorithms used are very well-known mathematically and thought to be secure, although this hasn t been shown conclusively l Brute force breaking even of 128 bit keys, for certain algorithms, is thought to be many decades away, if ever 12

Public Key Cryptography Plaintext public key A Encrypted data private key B Plaintext Encryption algorithm Decryption algorithm l The receiving agent shares the key with anyone who wants to transmit l The transmitting agent uses the public algorithm and public key to encrypt l Except by brute force, there is no known algorithm for using the public key to decrypt 13

Why Public Keys Work public key A (n, e) private (n, d) key B l The basic math is from over 200 years ago l Two prime numbers p and q are multiplied together to form p * q = n l Two other integers, d and e, are found such that d*e = 1 mod (p-1)*(q-1) l The public key (n, e) is used to encrypt a plaintext char M to C by C = M e (mod n) l The private key (n, d) is used to decrypt C to plaintext char M by M = C d (mod n) 14

Is a Public Key Secure? l The algorithm relies on the fact that, other than brute force, there is no known way to find the two primes p and q from p * q l The number of possible prime numbers for most keys would take the fastest computers, even working in parallel, billions of years to find the factors l However, no one has proven mathematically that there is no possible way to factor p * q l If the implementation or handling of keys is poor, no system is secure 15

Known Plaintext Attack l One way the public-key system can be attacked is by taking some plaintext that might occur in the text and running it through the public key algorithm l This method will not find the private key but can find bits of plaintext that have been encrypted l For this and other reasons, encryption is usually combined with other security methods, plus compression to make such attacks more difficult 16

Public Keys for Other Purposes l Public key algorithms can be used for authentication and non-repudiation as well l These systems require more complex protocols involving trusted agents and careful exchange of signatures which include encrypted checksum results l All of these depend on one-way functions, which, like factoring, are easy to compute one-way but considered difficult (or even impossible) to reverse 17

Ethical Issues Tensions between government and governed: l Privacy the right to keep personal information and activities secret or closed l Openness the right to knowledge and unrestricted access to information l Intellectual Property the right to exercise control over original concepts and content l Neutrality and control networks should treat all communication the same, regardless of content l Literacy enabling access through education in computer science and networking Those who sacrifice liberty for security deserve neither [and will lose both] Benjamin Franklin 18