SlideShare a Scribd company logo
1 of 25
Network Security
Presented by
Mr. Abhijeet A. More
(Perfect Training Center)
Security and Cryptography
• Security: all issues which make secure
communication (information transmission, two
(multiple) party interaction) over insecure channels.
• Cryptography: the science and art of manipulating
messages to make them secure.
• Classical cryptographic techniques.
• Along with the development of communication
networks and their broad applications, network
security is becoming a more serious problem.
• Thus, call for modern cryptography.
Network threats and attacks
Passive:
Active:
Eavesdropping
Traffic analysis
Masquerading
Replay
Modification
Denial of service
Client Server
Attacker Server
Client Servermodify
Clientclient ServerMan-in-middle
Client Server
Security Requirements
• Privacy or confidentiality: The information should
be readable only by the intended receiver. i.e.,
protect the information from eavesdropping.
• Integrity: The receiver can confirm that a message
has not been altered during transmission, i.e.,
protect the information from tampering.
• Authentication: Any party (sender or receiver) can
verify that the other party is who he or she claims
to be, i.e., validate the identity of the other party.
• Nonrepudiation: The sender can not deny having
sent a given message. i.e., if a transaction (e.g., a
purchase) has occurred between two parties, the
nonrepudiation service can prove that for any
party, he/she really performed the transaction
him/herself, not by any other person.
Approaches to implementing security
Confidentiality: By encryption (and decryption)
Sender: encrypts the message using a key and sends the encrypted message.
Receiver: decrypts the encrypted message using the same key as the
sender’s key or a key derivable from the sender’s key.
Integrity:By checksum or hash value/message digest.
Sender: computes checksum/hash value/message digest from the message
and sends the message along with the checksum/hash value/message digest.
Receiver: re-computes checksum/hash value/message digest from received message
and compares with the transmitted checksum/hash value/message digest.
In some sense, it likes error-detection.
Problem: the attacker, after intercepting the message, modifies the message,
computes the checksum for modified message, and resends them.
Solution: keyed checksum/hash value/message digest.
message checksum Both are transmitted
message checksumkey
Message + checksum
are transmitted
Approaches to implementing security (cont.)
Authentication:Traditional user ID and password.
Modern cryptography based authentication.
--Digital signature.
Nonrepudiation: Undeniable signature, i.e.,
Digital signature + verification protocol + disavowal protocol
Security requirements and their implementation
Confidentiality: encryption (and decryption)
Integrity:checksum or hash value/message digest or MAC.
Authentication: user ID and password or Digital signature.
Nonrepudiation: Undeniable signature
Availability: Intrusion detection and defense
Authorization: Access control
Accountability: Log, record, trace, system administration
Q: how to defense Replay attack?Timestamps and/or sequence numbers.
Classification of cryptosystems
• Secret key systems vs. public key systems
• Classical vs. modern
– Classical: secret key systems
• Shift, Affine, Vigenere, Hill, Permutation
(transposition) cipher, Stream cipher
– Modern:
• Secret key systems
– DES, AES, PGM
• Public key systems
– RSA, ElGamal, Elliptic Curve
Shift cipher--example
• Suppose a plaintext word: cryptography
• Change each letter by shifting the letter
three position rightward
• The cipherword is: FUBSWRJUDSKB
Question: if given the above cipherword, how to get original word?
Change each letter by shifting the letter three position leftward.
This kind of cryptosystem is called “Caesar Cipher”
Secret cryptosystem--DES
• Data Encryption Standard (DES)
• First version in 1975, developed by IBM.
• A type of iterated cipher.
• Plaintext block: 64 bits, key: 56 bits, ciphertext block:64 bits.
• Steps:
– Initial permutation (IP)
– 16 rounds of transformations
– Inverse permutation (IP-1)
Key management and exchange
• Key is the essential part in any
cryptosystem, especially in secret key
systems.
• How to distribute/exchange key/keys
between two users/any pair of multiple
users.
• Therefore key management and key
exchange come into play.
• Also public key systems appeared.
Why public-key cryptography
1. The two communicants in secret key system require
the prior communication of key, using a secure
channel. it is very difficult to achieve in practice.
Unless the two communicants meet together, phone
call, post mail, email etc., are not secure.
2. Suppose there are n users and every pair of users want
to communicate. In secret-key system, it is necessary
that the total number of keys is n(n-1)/2. Very difficult
to management and quite insecure. However, in public-
key system, every user selects his/her own private key
and public key, and publicizes the public key but keep
the private key secret. Quite easy and very secure.
The main problem with public-key system is that it is very slow.
Public-key cryptosystem
• Secret-key cryptosystem:
– eK & dK: dK is the same as or derived
from eK.
– Called symmetric-key cryptosystem.
– Problem: how to distribute eK & dK to
Alice & Bob securely.
• Public-key cryptosystem:
– Computationally infeasible to compute
dK from eK.
– Called asymmetric-key cryptosystem.
– eK is made public, called public key
– But dK is kept secret, called private key.
Public-key system: how it works
• Everybody selects its own public key P
and private key S, and publicizes P.
• Therefore Alice has (Pa , Sa), and Bob
has (Pb , Sb).
• Everybody knows Pa, Pb, …
• Suppose Alice wants to send a
message to Bob.
– Alice encrypts the message with Bob’s
public key Pb and sends out.
– (only) Bob can decrypt the message
using his private key Sb. Nobody else
can.
Two party key management
• By public key cryptosystems:
– Alice selects a random value k as a key
– Alice encrypts the key k with Bob’s public key
and sends to Bob
– Bob decrypts the key using his private key
– Alice and Bob encrypt/decrypt messages using
secret key systems such as DES with the key k.
– This is a typical combination of secret and public
key systems.
• By Diffie-Hellman key agreement
– Based on Discrete Logarithm Problem
DLP (Discrete Logarithm Problem)
– Suppose p is an odd prime.
– Zp={0,1,…,p-1} is a finite field.
– Zp
* : the set of integers which are relatively prime to p.
• {a  Zp | gcd(a, p)=1}={1,…,p-1}
• it is a cyclic multiplicative group.
– g is a generator of Zp
* ,
• i.e. , Zp
* ={g 0 mod p, g 1mod p, …, g p-2 mod p}.
– DLP problem
• Given any a, compute b=g a (mod p) is easy.
• given any b, find an a such that b = g a (mod p) is difficult.
– Denoted as a = log g b. Omit: mod p for simplicity.
(Two-party) Diffie-Hellman (DH) key exchange
Suppose p and g are publicly known:
g a
g b
(a (b  g b mod p)
K=(gb) a=g ab K=(ga) b=g ab
Alice Bob
 g a mod p)
Anyone else can compute g a g b = g a+b but not g ab
cryptology
• Cryptology = cryptography + cryptanalysis.
– Cryptography: devise cryptosystems.
– Cryptanalysis: break cryptosystems.
Kerckhoff principle and attack levels
• Kerckhoff principle: the cryptosystem is publicly
known, but only the key is secret. Breaking a
cryptosystem (i.e., cryptanalysis) means figuring out
the key currently used.
• Attack levels:
– Ciphertext-only: the attacker possesses a string of
ciphertext, y.
– Known plaintext: the attacker possesses a string of
plaintext, x, and the corresponding ciphertext, y.
– Chosen plaintext: the attacker has obtained
temporary access to the encryption machinery.
Hence, he can choose a plaintext string, x, and
construct the corresponding ciphertext string, y.
– Chosen ciphertext: the attacker has obtained
temporary access to the decryption machinery.
Hence, he can choose a ciphertext string, y, and
construct the corresponding plaintext string, x.
Internet security protocols
• The Internet has implemented a
suite of security protocols combining
secret-key, public-key, digital
signature, message digest, etc.
– IPSec (IP security): i.e., IP layer /
network layer
– SSL (Secure Socket Layer) & TLS
(Transport Layer Security): transport
layer
– SSH (Secure Shell), SFTP, HTTPS, PGP
(Pretty Good Privacy): application layer
IPSec key agreement
Entity A Entity B
Crypto suites I support
Crypto suite I choose
ga mod p
gb mod p
gab mod p{“Alice”, proof I am Alice}
gab mod p{“Bob”, proof I am Bob}
SSL position
SSL functionality
• Server authentication (by public certificate)
• Client authentication (Optional)
• Data encryption (by secret key system)
• Integrity protection by (MAC)
SSL handshake
Client Server
I want to talk, ciphers I support, RC
Certificate (PS), cipher I choose, RS
{S}PS, {keyed hash of handshake MSG}
{keyed hash of handshake MSG}
Data protected by keys derived from K
K=f(S,RC,RS) K=f(S,RC,RS)
compute compute
There are total six keys, three keys (encryption key, IV, integrity key) in each direction.
Questions?
Those who have any Query Contact me on my
Whats App No : 9766677504(only message)
25

More Related Content

What's hot

Cryptography
CryptographyCryptography
Cryptographyfsl khan
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security Mathan Gopal
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key CryptosystemDevakumar Kp
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptographyRutvik Mehta
 
Final ss2-digital-signature-group5
Final ss2-digital-signature-group5Final ss2-digital-signature-group5
Final ss2-digital-signature-group5Phan Minh
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSAAmit Debnath
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its UsesMohsin Ali
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptographyanusachu .
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-finalTaymoor Nazmy
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701Amit Pathak
 
20 security
20 security20 security
20 securityabiy2004
 
Digital signature
Digital signatureDigital signature
Digital signatureSadhana28
 

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Public key cryptography and RSA
Public key cryptography and RSAPublic key cryptography and RSA
Public key cryptography and RSA
 
Final ss2-digital-signature-group5
Final ss2-digital-signature-group5Final ss2-digital-signature-group5
Final ss2-digital-signature-group5
 
Unit 1
Unit 1Unit 1
Unit 1
 
Authentication: keys, MAC
Authentication: keys, MACAuthentication: keys, MAC
Authentication: keys, MAC
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
 
CNS - Unit - 1 - Introduction
CNS - Unit - 1 - IntroductionCNS - Unit - 1 - Introduction
CNS - Unit - 1 - Introduction
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Pooguzhali
PooguzhaliPooguzhali
Pooguzhali
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
20 security
20 security20 security
20 security
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Cryptography
CryptographyCryptography
Cryptography
 

Viewers also liked

Data Network Security
Data Network SecurityData Network Security
Data Network SecurityAtif Rehmat
 
A Framework for Health Information Technology and Network Security
A Framework for Health Information Technology and Network Security A Framework for Health Information Technology and Network Security
A Framework for Health Information Technology and Network Security Jeff Horsager
 
Network security
Network securityNetwork security
Network securityAli Kamil
 
Infomration & network security
Infomration & network securityInfomration & network security
Infomration & network securityRajkumar Pawar
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network securityNEHA PATEL
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security RequirementsSteven Cahill
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)amanchaurasia
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authenticationEdgar Mwangangi
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 

Viewers also liked (20)

Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Basics of networking and routing
Basics of networking and routingBasics of networking and routing
Basics of networking and routing
 
Cyber security
Cyber securityCyber security
Cyber security
 
A Framework for Health Information Technology and Network Security
A Framework for Health Information Technology and Network Security A Framework for Health Information Technology and Network Security
A Framework for Health Information Technology and Network Security
 
Career option for BCA Student
Career option for BCA StudentCareer option for BCA Student
Career option for BCA Student
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Security
SecuritySecurity
Security
 
PACE-IT: Common Network Security Issues
PACE-IT: Common Network Security IssuesPACE-IT: Common Network Security Issues
PACE-IT: Common Network Security Issues
 
Infomration & network security
Infomration & network securityInfomration & network security
Infomration & network security
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network security
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security Requirements
 
Ch08
Ch08Ch08
Ch08
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
Cryptography
CryptographyCryptography
Cryptography
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authentication
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Network security
Network security Network security
Network security
 

Similar to Network security

Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxSamiDan3
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdfwondimagegndesta
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniquesMohitManna
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptxSurendraBasnet6
 
Types of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackTypes of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackMona Rajput
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesMurali Krishna
 
Symmetric ciphermodel
Symmetric ciphermodelSymmetric ciphermodel
Symmetric ciphermodelpriyapavi96
 
Cyptography and network security unit 3-1
Cyptography and network security unit 3-1Cyptography and network security unit 3-1
Cyptography and network security unit 3-1AsrithaKorupolu
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography Durgesh Malviya
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...IOSR Journals
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 

Similar to Network security (20)

network security
network securitynetwork security
network security
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
 
chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdf
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptx
 
Types of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackTypes of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic Attack
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modules
 
Symmetric ciphermodel
Symmetric ciphermodelSymmetric ciphermodel
Symmetric ciphermodel
 
Cyptography and network security unit 3-1
Cyptography and network security unit 3-1Cyptography and network security unit 3-1
Cyptography and network security unit 3-1
 
UNIT-IV.pptx
UNIT-IV.pptxUNIT-IV.pptx
UNIT-IV.pptx
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Cryptography
CryptographyCryptography
Cryptography
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 

Recently uploaded

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfrs7054576148
 

Recently uploaded (20)

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 

Network security

  • 1. Network Security Presented by Mr. Abhijeet A. More (Perfect Training Center)
  • 2. Security and Cryptography • Security: all issues which make secure communication (information transmission, two (multiple) party interaction) over insecure channels. • Cryptography: the science and art of manipulating messages to make them secure. • Classical cryptographic techniques. • Along with the development of communication networks and their broad applications, network security is becoming a more serious problem. • Thus, call for modern cryptography.
  • 3. Network threats and attacks Passive: Active: Eavesdropping Traffic analysis Masquerading Replay Modification Denial of service Client Server Attacker Server Client Servermodify Clientclient ServerMan-in-middle Client Server
  • 4. Security Requirements • Privacy or confidentiality: The information should be readable only by the intended receiver. i.e., protect the information from eavesdropping. • Integrity: The receiver can confirm that a message has not been altered during transmission, i.e., protect the information from tampering. • Authentication: Any party (sender or receiver) can verify that the other party is who he or she claims to be, i.e., validate the identity of the other party. • Nonrepudiation: The sender can not deny having sent a given message. i.e., if a transaction (e.g., a purchase) has occurred between two parties, the nonrepudiation service can prove that for any party, he/she really performed the transaction him/herself, not by any other person.
  • 5. Approaches to implementing security Confidentiality: By encryption (and decryption) Sender: encrypts the message using a key and sends the encrypted message. Receiver: decrypts the encrypted message using the same key as the sender’s key or a key derivable from the sender’s key. Integrity:By checksum or hash value/message digest. Sender: computes checksum/hash value/message digest from the message and sends the message along with the checksum/hash value/message digest. Receiver: re-computes checksum/hash value/message digest from received message and compares with the transmitted checksum/hash value/message digest. In some sense, it likes error-detection. Problem: the attacker, after intercepting the message, modifies the message, computes the checksum for modified message, and resends them. Solution: keyed checksum/hash value/message digest. message checksum Both are transmitted message checksumkey Message + checksum are transmitted
  • 6. Approaches to implementing security (cont.) Authentication:Traditional user ID and password. Modern cryptography based authentication. --Digital signature. Nonrepudiation: Undeniable signature, i.e., Digital signature + verification protocol + disavowal protocol
  • 7. Security requirements and their implementation Confidentiality: encryption (and decryption) Integrity:checksum or hash value/message digest or MAC. Authentication: user ID and password or Digital signature. Nonrepudiation: Undeniable signature Availability: Intrusion detection and defense Authorization: Access control Accountability: Log, record, trace, system administration Q: how to defense Replay attack?Timestamps and/or sequence numbers.
  • 8. Classification of cryptosystems • Secret key systems vs. public key systems • Classical vs. modern – Classical: secret key systems • Shift, Affine, Vigenere, Hill, Permutation (transposition) cipher, Stream cipher – Modern: • Secret key systems – DES, AES, PGM • Public key systems – RSA, ElGamal, Elliptic Curve
  • 9. Shift cipher--example • Suppose a plaintext word: cryptography • Change each letter by shifting the letter three position rightward • The cipherword is: FUBSWRJUDSKB Question: if given the above cipherword, how to get original word? Change each letter by shifting the letter three position leftward. This kind of cryptosystem is called “Caesar Cipher”
  • 10. Secret cryptosystem--DES • Data Encryption Standard (DES) • First version in 1975, developed by IBM. • A type of iterated cipher. • Plaintext block: 64 bits, key: 56 bits, ciphertext block:64 bits. • Steps: – Initial permutation (IP) – 16 rounds of transformations – Inverse permutation (IP-1)
  • 11. Key management and exchange • Key is the essential part in any cryptosystem, especially in secret key systems. • How to distribute/exchange key/keys between two users/any pair of multiple users. • Therefore key management and key exchange come into play. • Also public key systems appeared.
  • 12. Why public-key cryptography 1. The two communicants in secret key system require the prior communication of key, using a secure channel. it is very difficult to achieve in practice. Unless the two communicants meet together, phone call, post mail, email etc., are not secure. 2. Suppose there are n users and every pair of users want to communicate. In secret-key system, it is necessary that the total number of keys is n(n-1)/2. Very difficult to management and quite insecure. However, in public- key system, every user selects his/her own private key and public key, and publicizes the public key but keep the private key secret. Quite easy and very secure. The main problem with public-key system is that it is very slow.
  • 13. Public-key cryptosystem • Secret-key cryptosystem: – eK & dK: dK is the same as or derived from eK. – Called symmetric-key cryptosystem. – Problem: how to distribute eK & dK to Alice & Bob securely. • Public-key cryptosystem: – Computationally infeasible to compute dK from eK. – Called asymmetric-key cryptosystem. – eK is made public, called public key – But dK is kept secret, called private key.
  • 14. Public-key system: how it works • Everybody selects its own public key P and private key S, and publicizes P. • Therefore Alice has (Pa , Sa), and Bob has (Pb , Sb). • Everybody knows Pa, Pb, … • Suppose Alice wants to send a message to Bob. – Alice encrypts the message with Bob’s public key Pb and sends out. – (only) Bob can decrypt the message using his private key Sb. Nobody else can.
  • 15. Two party key management • By public key cryptosystems: – Alice selects a random value k as a key – Alice encrypts the key k with Bob’s public key and sends to Bob – Bob decrypts the key using his private key – Alice and Bob encrypt/decrypt messages using secret key systems such as DES with the key k. – This is a typical combination of secret and public key systems. • By Diffie-Hellman key agreement – Based on Discrete Logarithm Problem
  • 16. DLP (Discrete Logarithm Problem) – Suppose p is an odd prime. – Zp={0,1,…,p-1} is a finite field. – Zp * : the set of integers which are relatively prime to p. • {a  Zp | gcd(a, p)=1}={1,…,p-1} • it is a cyclic multiplicative group. – g is a generator of Zp * , • i.e. , Zp * ={g 0 mod p, g 1mod p, …, g p-2 mod p}. – DLP problem • Given any a, compute b=g a (mod p) is easy. • given any b, find an a such that b = g a (mod p) is difficult. – Denoted as a = log g b. Omit: mod p for simplicity.
  • 17. (Two-party) Diffie-Hellman (DH) key exchange Suppose p and g are publicly known: g a g b (a (b  g b mod p) K=(gb) a=g ab K=(ga) b=g ab Alice Bob  g a mod p) Anyone else can compute g a g b = g a+b but not g ab
  • 18. cryptology • Cryptology = cryptography + cryptanalysis. – Cryptography: devise cryptosystems. – Cryptanalysis: break cryptosystems.
  • 19. Kerckhoff principle and attack levels • Kerckhoff principle: the cryptosystem is publicly known, but only the key is secret. Breaking a cryptosystem (i.e., cryptanalysis) means figuring out the key currently used. • Attack levels: – Ciphertext-only: the attacker possesses a string of ciphertext, y. – Known plaintext: the attacker possesses a string of plaintext, x, and the corresponding ciphertext, y. – Chosen plaintext: the attacker has obtained temporary access to the encryption machinery. Hence, he can choose a plaintext string, x, and construct the corresponding ciphertext string, y. – Chosen ciphertext: the attacker has obtained temporary access to the decryption machinery. Hence, he can choose a ciphertext string, y, and construct the corresponding plaintext string, x.
  • 20. Internet security protocols • The Internet has implemented a suite of security protocols combining secret-key, public-key, digital signature, message digest, etc. – IPSec (IP security): i.e., IP layer / network layer – SSL (Secure Socket Layer) & TLS (Transport Layer Security): transport layer – SSH (Secure Shell), SFTP, HTTPS, PGP (Pretty Good Privacy): application layer
  • 21. IPSec key agreement Entity A Entity B Crypto suites I support Crypto suite I choose ga mod p gb mod p gab mod p{“Alice”, proof I am Alice} gab mod p{“Bob”, proof I am Bob}
  • 23. SSL functionality • Server authentication (by public certificate) • Client authentication (Optional) • Data encryption (by secret key system) • Integrity protection by (MAC)
  • 24. SSL handshake Client Server I want to talk, ciphers I support, RC Certificate (PS), cipher I choose, RS {S}PS, {keyed hash of handshake MSG} {keyed hash of handshake MSG} Data protected by keys derived from K K=f(S,RC,RS) K=f(S,RC,RS) compute compute There are total six keys, three keys (encryption key, IV, integrity key) in each direction.
  • 25. Questions? Those who have any Query Contact me on my Whats App No : 9766677504(only message) 25