Application Layer (1)



Similar documents
Application Layer (1)

Network Security. HIT Shimrit Tzur-David

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Properties of Secure Network Communication

IT Networks & Security CERT Luncheon Series: Cryptography

Chapter 10. Network Security

Chapter 8. Network Security

Cyber Security Workshop Encryption Reference Manual

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

SECURITY IN NETWORKS

Chapter 7: Network security

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

First Semester Examinations 2011/12 INTERNET PRINCIPLES

What is network security?

Lecture 9 - Network Security TDTS (ht1)

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

How To Understand And Understand The History Of Cryptography

Cryptography & Digital Signatures

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Cipher Techniques on Networks. Amit Konar Math and CS, UMSL

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Network Security Technology Network Management

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Introduction to Encryption

CRYPTOGRAPHY IN NETWORK SECURITY

Savitribai Phule Pune University

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Evaluation of the RC4 Algorithm for Data Encryption

Today. Network Security. Crypto as Munitions. Crypto as Munitions. History of Cryptography

Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2

CSE/EE 461 Lecture 23

NETWORK ADMINISTRATION AND SECURITY

CSE331: Introduction to Networks and Security. Lecture 20 Fall 2006

CS 758: Cryptography / Network Security

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

EXAM questions for the course TTM Information Security May Part 1

Symmetric Key cryptosystem

Secure Network Communication Based on Text-to-Image Encryption

Network Security. Omer Rana

Modeling and verification of security protocols

Cryptography & Network Security

7! Cryptographic Techniques! A Brief Introduction

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

Key Management (Distribution and Certification) (1)

Network Security. Outline of the Tutorial

How To Encrypt With A 64 Bit Block Cipher

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

Lecture 9: Application of Cryptography

An Introduction to Cryptography as Applied to the Smart Grid

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

ECE 428 Network Security

Cryptography and Security

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Chap 2. Basic Encryption and Decryption

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Cornerstones of Security

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin.

VALLIAMMAI ENGINEERING COLLEGE

Developing and Investigation of a New Technique Combining Message Authentication and Encryption

Chapter 17. Transport-Level Security

Client Server Registration Protocol

Page 1. Session Overview: Cryptography

Message Authentication Codes

Cryptography and Network Security Chapter 3

Principles of Network Security

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Security in Computer Networks

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Content Teaching Academy at James Madison University

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab

Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:

CSCE 465 Computer & Network Security

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

NEW HORIZON COLLEGE OF ENGINEERING, BANGALORE CLOUD COMPUTING ASSIGNMENT Explain any six benefits of Software as Service in Cloud computing?

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

CSCE 465 Computer & Network Security

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

Managing and Securing Computer Networks. Guy Leduc. Chapter 3: Securing applications. Chapter goals: security in practice:

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

Information Security

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

Cryptography and Network Security

Transcription:

Application Layer (1) Functionality: providing applications (e-mail, Web service, USENET, ftp etc) providing support protocols to allow the real applications to function properly (e.g. HTTP for Web appl.) security comprising a large number of concepts and protocols (PGP, SSL) DNS (Distributed Name Service) handling naming within the Internet network management (SNMP) Network security nowadays is regarded as one of the biggest problems for upcoming Internet applications Objective: providing secure Internet applications like secure e-mail system (PGP and extensions (S/MIME)) secure e-commerce - transactions (SSL and extensions (TLS)) 1

Network Security (1) Secure communication in general addresses four different topics: secrecy (Vertraulichkeit, Geheimhaltung): keeping information secret authentication (Authentifikation): determining whom you are talking to before revealing information nonrepudiation (Verbindlichkeit): ensuring trustworthiness between the communication partners integrity (Datenintegrität): ensuring the originality of received messages (not being modified) Solutions to all problem areas are mainly based on cryptographic (Greek: secret writing) principles Historically, until the second half of the 20th century, only 2 human areas have used and contributed to the art of cryptography: military diplomacy Today, economy is becoming the most important application area where cryptography is used. 2

Network Security (2) Representatives for sender, recipient, and intruder The encryption model (1): 3

Network Security (3) The encryption model (2): Cryptology denotes cryptography:= the art of devising ciphers and cryptanalysis:= the art of decoding (breaking) ciphers 4

Secrecy (1) Symmetric Key System: Keys of Alice and Bob are identical and secret Public Key System: Both, Alice and Bob have a pair of keys, one is public, the other is only known by its holder. 1. Symmetric Key Systems (old) Traditional encryption methods have been divided historically into two categories: substitution ciphers (preserve the order of the plaintext symbols but disguise them) transposition ciphers (reorders the plaintext symbols but do not disguise them) Ancient and simple substitution cipher: Caesar s cipher The ciphertext alphabet results from a shift of k letters in the plaintext alphabet (key:=k). Generalization of Caesar s chiffre: monoalphabetic substitution Each letter or group of letters is replaced by another letter or group of letters to disguise it Example for a monoalphabetic substitution plaintext: ciphertext: a b c d e f g h i j k l m n o p q r s t u v w x y z Q W E R T Y U I O P A S D F G H J K L Z X C V B N M 5

Secrecy (1a) Two main approaches of crypto analysts to break these type of ciphers exploiting statistical properties of natural languages (cipher text only attack) guessing a probable word or phrase (known plaintext attack) Example for the second approach: CTBMN BYCTC BTJDS QXBNS GSTJC BTSWX CTQTZ CQVUJ QJSGS TJQZZ MNQJS VLNSX VSZJU JDSTS JQUUS JUBXJ DSKSU JSNTK BGAQJ ZBGYQ TLCTZ BNYBN QJSW 6

Secrecy (2) Transposition ciphers Instead of disguising letters they are reordered Example for a columnar transposition 7

Secrecy (3) 2a) Symmetric Key Systems (modern) based on stream ciphers Typical example: One-time pads Method for devising an unbreakable cipher Algorithm: convert a plaintext of any length into a bit string, e.g. by using its ASCII representation choose a random bit string of equal length as the key compute the EXCLUSIVE OR of both strings, bit by bit, serving as resulting cipher text used only once Main disadvantage: the overhead for key management (communicating the key in a secure way to the communication partners once again for each new plaintext) is, in general, beyond any acceptable size ---> not applied in practice 8

Symmetric Key Systems (1) 2b) Symmetric Key Systems (modern) based on block ciphers Principle: Subdividing the plaintext in subsequent blocks of equal length (e.g. 64 or 128 bit) Idea: Concatenation of standard transposition (permutation) and substitution elements (boxes): Example for a P(ermutation)-box (01234567 ---> 36071245) The order of sequence has changed Example for a S(ubstitution)-box (3bit plaintext to 3bit ciphertext) By appropriate wiring of the P-box inside, any substitution can be accomplished. In this example: Numbers 0,1,2,3,4,5,6,7 each are replaced by the numbers 24506713 9

Example for a product cipher (concatenation) Symmetric Key Systems (2) Standard: DES plaintext is encrypted in blocks of 64 bits the algorithm has 19 steps the steps for decryption are done in the reverse order of those for encryption 10

Public Key Systems (1) 3. Public-Key Systems Basic problem behind: Is it possible that Alice and Bob can communicate by encrypted messages without having exchanged before a common secret key? Principal solution: Each party has a pair of keys, a public one (accessible to everybody) and a private one (only known by itself) The general model 11