1 Introduction Network Security Cryptography
1 Introduction Network Security Cryptography
• Text Book
• Cryptography and Network Security -- Behrouz
A. Forouzan, Debdeep Mukhopadhyay 3rd 2015
MCGRAW HILL EDUCATION
• Reference Book
CRYPTOGRAPHY AND NETWORK SECURITY by
WILLIAM STALLINGS, PEARSON EDUCATION, 6th
Edition, (2014)
Course Assessment Model
• MARKS BREAK UP
• Attendance 5
• CA (Two best out of Three CA) 25
• CA consists of three test
• Mid Term Exam (MTE) 20
• End Term Exam (ETE) 50
• Total 100
The hitch…
The three BURNING questions in mind…
Integrity
Authentication
Nonrepudiation
Access Control
Availability
Symmetric Ciphers and Block Ciphers
Classification of Attacks
•Modification
•Masquerading
•Replay
•Denial of service
UNIT II : Number Theory and Finite Fields
UNIT III : DES AND AES
Public-Key Encryption and Key Management
UNIT IV : Message Authentication and
Hash Functions
What do we need to know?
UNIT V : Digital Signatures and Transport Level
Security
Transport Level Security
UNIT VI : Electronic Mail Security
What do we need to know?
Intruders
Firewalls
Types of firewall..
Next Class:
• RFC 2828:
“a processing or communication service provided by
a system to give a specific kind of protection to
system resources”
Security Services (X.800)
• Authentication - assurance that communicating
entity is the one claimed
– have both peer-entity & data origin authentication
• Access Control - prevention of the unauthorized use
of a resource
• Data Confidentiality –protection of data from
unauthorized disclosure
• Data Integrity - assurance that data received is as
sent by an authorized entity
• Non-Repudiation - protection against denial by one
of the parties in a communication
• Availability – resource accessible/usable
Security Mechanism
• feature designed to detect, prevent, or
recover from a security attack
• no single mechanism that will support all
services required
• however one particular element underlies
many of the security mechanisms in use:
– cryptographic techniques
• hence our focus on this topic
Security Mechanisms (X.800)
• specific security mechanisms:
– encipherment, digital signatures, access controls,
data integrity, authentication exchange, traffic
padding, routing control, notarization
• pervasive security mechanisms:
– trusted functionality, security labels, event
detection, security audit trails, security recovery
Model for Network Security
Model for Network Security
• using this model requires us to:
1. design a suitable algorithm for the security
transformation
2. generate the secret information (keys) used by
the algorithm
3. develop methods to distribute and share the
secret information
4. specify a protocol enabling the principals to use
the transformation and secret information for a
security service
Model for Network Access Security
Model for Network Access Security
• using this model requires us to:
1. select appropriate gatekeeper functions to
identify users
2. implement security controls to ensure only
authorised users access designated information
or resources
Standards
• NIST: National Institute of Standards and
Technology
– FIPS: Federal Information Processing Standards
– SP: Special Publications
• ISOC: Internet Society
– Home for IETF (Internet Engineering Task Force)
and IAB (Internet Architecture Board)
– RFCs: Requests for Comments
Summary
• topic roadmap & standards organizations
• security concepts:
– confidentiality, integrity, availability
• X.800 security architecture
• security attacks, services, mechanisms
• models for network (access) security
Chapter 1
Introduction
1.55
Chapter 1
Objectives
To define three security goals
To define security attacks that threaten security
goals
To define security services and how they are
related to the three security goals
To define security mechanisms to provide security
services
To introduce two techniques, cryptography and
steganography, to implement security mechanisms.
1.56
1-1 SECURITY GOALS
1.58
1.1.1 Confidentiality
1.59
1.1.2 Integrity
1.60
1.1.3 Availability
1.61
1-2 ATTACKS
1.63
1.2.1 Attacks Threatening Confidentiality
1.64
1.2.2 Attacks Threatening Integrity
1.65
1.2.3 Attacks Threatening Availability
1.66
1.2.4 Passive Versus Active Attacks
1.67
1-3 SERVICES AND MECHANISMS
1.69
1.3.2 Security Mechanism
1.70
1.3.3 Relation between Services and Mechanisms
1.71
1-4 TECHNIQUES
1.72
1.4.1 Cryptography
1.73
1.4.2 Steganography
1.74
1.4.2 Continued
1.75
1-5 THE REST OF THE BOOK
1.76