ICOM 5018 Network Security and Cryptography



Similar documents
Information Security

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

IT Networks & Security CERT Luncheon Series: Cryptography

Client Server Registration Protocol

Cryptography & Digital Signatures

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Lecture 9 - Network Security TDTS (ht1)

COSC 472 Network Security

Network Security Protocols

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Network Security Essentials:

CRYPTOGRAPHY AND NETWORK SECURITY

CSE/EE 461 Lecture 23

NETWORK ADMINISTRATION AND SECURITY

Network Security. HIT Shimrit Tzur-David

Chapter 8. Network Security

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

MS-55096: Securing Data on Microsoft SQL Server 2012

ICTTEN8195B Evaluate and apply network security

Part 2 D(E(M, K),K ) E(M, K) E(M, K) Plaintext M. Plaintext M. Decrypt with private key. Encrypt with public key. Ciphertext

Network Security - ISA 656 Security

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Introduction to Encryption

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Application Security: Threats and Architecture

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Information Security Basic Concepts

VALLIAMMAI ENGINEERING COLLEGE

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

DRAFT Standard Statement Encryption

Securing Data on Microsoft SQL Server 2012

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

SECURITY IN NETWORKS

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

EXAM questions for the course TTM Information Security May Part 1

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Chapter 10. Network Security

How To Protect Your Data From Attack

Is your data safe out there? -A white Paper on Online Security

Chapter 17. Transport-Level Security

What is network security?

Chapter 18: System Security

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Chapter 1: Introduction

SENSE Security overview 2014

Chapter 7: Network security

Chapter 15: Security

SCP - Strategic Infrastructure Security

Chapter 7 Transport-Level Security

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Security: Focus of Control. Authentication

Using etoken for SSL Web Authentication. SSL V3.0 Overview

CISCO IOS NETWORK SECURITY (IINS)

CSCE 465 Computer & Network Security

Avaya TM G700 Media Gateway Security. White Paper

Authenticity of Public Keys

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

Cryptography and network security CNET4523

Avaya G700 Media Gateway Security - Issue 1.0

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Authentication Types. Password-based Authentication. Off-Line Password Guessing

CRYPTOG NETWORK SECURITY

SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK

Transport Level Security

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

CPSC 467: Cryptography and Computer Security

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Apache Milagro (incubating) An Introduction ApacheCon North America

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,

Content Teaching Academy at James Madison University

AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014

Fundamentals of Network Security - Theory and Practice-

Chap. 1: Introduction

Hash Functions. Integrity checks

How To Encrypt Data With Encryption

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

Cryptography & Network Security

A Comparative Study of Security Features in FreeBSD and OpenBSD

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

to hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many

Virtual Private Networks

Chapter 37. Secure Networks

Security in Distributed Systems. Network Security

Transcription:

ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic techniques. Cryptographic algorithms and protocols are introduced and their use in secure protocols such as secure shell (SSH) and secure mail (Pretty Good Privacy/PGP) are studied. Topics Conventional encryption, algorithms and techniques Public key cryptography and a little number theory Authentication and hash functions Digital signatures and authentication protocols Electronic mail, IP, and web security The cryptographic techniques used in intruders, viruses, and worms Firewalls Cryptanalysis methods and methods of exploiting protocol weaknesses Legal and social issues current legislation Instructor Thomas L. Noack (details at-amadeus.uprm.edu/~noack/crypto) Projects Many possibilities protocol weaknesses, interdisciplinary Prerequisites ICOM 5007 and INEL 4307 or permission of instructor

What crypto does Confidentiality Authentication Signature is this the only copy Content verification did someone modify When was this signed still valid Individual identification at a distance Key distribution with a key server Key agreement mutual agreement, no global server

Where you see it Commercial transactions Internet and electronic purchases Electronic fund transfers and the money laundromat Medical and other data Privacy of medical records But getting insurance benefits

Other privacy applications Data security and authentication Personnel and payroll records Individual files on a server Controlled database access you can see your info Intellectual property protection DVDs, Music, ebooks, movie content System login and passwords

The components of crypto Private key crypto Key must be kept secret Separate key for each group of users Public key crypto Knowing public key doesn t reveal private key Can be used for secrecy or authentication

More components Hash and message authentication Message digest long message, short authenticator Saves encryption effort One-way function only encrypted password is stored Key exchange You can agree on a key without having a trusted key distributor

Some basic principles Don t use secret or amateur algorithms The crypto community tries to break the published algorithms if they haven t, you can trust them a bit more Algorithm strength should depend only on key length alone known method, nearly unguessable key Again, don t invent your own read the literature and understand the problems and weaknesses

What we study - principles Conventional encryption, algorithms and techniques Public key cryptography and a little number theory Authentication and hash functions Digital signatures and authentication protocols

What we study - applications Electronic mail, IP, and web security The cryptographic techniques used in intruders, viruses, and worms Firewalls Cryptanalysis methods and methods of exploiting protocol weaknesses Legal and social issues current legislation

What are the difficult parts Studying the weakness of systems and protocols Historically, and now, little procedure weaknesses and subtle traps have changed history Understanding how attacks work Understanding how it fits together Complete systems include browsers and outside systems over which you don t have control crypto is global, just like the internet

The 4-rotor Enigma, with wiring pictures from Budiansky, Stephen, Battle of Wits Uses the polyalphabetic principle Repositioning the rotors gives a new alphabet The rotors are stepped at each character It was broken at least partly because of operator carelessness

The Bombe, used to break Enigma messages picture from Budiansky, Stephen, Battle of Wits Comments This is actually a copy of the machine conceived by Turing It still used a plugboard approach rather than a strictly electronic stored program Material captured from ships and submarines was also used This was a combination of known plaintext and brute force cryptanalysis It is not a Turing machine in the computer science sense