Network Security
This outline provides an overview of network security and cryptography, including authentication protocols, wired and wireless networks, key management, security attacks, security services, and the basics of cryptography.
Network Security
E N D
Presentation Transcript
Network Security Celia Li Computer Science and Engineering York University
Outline • Overview of network security and Cryptography • Authentication protocols • Wired networks • Wireless local area networks • Key management
Overview of Network Security • Confidentiality • The concealment of information or resources • Integrity • Data cannot be modified without being detected • Authenticity • A node can ensure the identity of the peer node it is communicating with. • Availability • The ability to use the information or resource desired
Overview of Network Security Security Attacks • An attack is any action that violates security • Common attacks • Eavesdropping • Integrity attack • Authenticity attack • Deny of service
Overview of Network Security • Eavesdropping – Message Interception • Unauthorized access to information • Packet sniffers and wiretappers • Illicit coping of data and programs
Overview of Network Security • Integrity Attack – Tampering with Message • Stop the flow of the message • Delay and optionally modify the message • Release the message again
Overview of Network Security • Authenticity Attack – Fabrication • Unauthorized assumption of other’s identity • Generate and distribute objects under this identity
Overview of Network Security • Attack on Availability • Destroy on Availability • Corrupt packets in transit • Denial of Service (DoS) • Crashing the server • Overwhelm the server (use up its resource)
Security Services • Access control • Only authorized actions (e.g., membership enrollment, data transmission) can be performed. • Authentication • Assurance that an entity of concern or the origin of a communication is authentic – it’s what it claims to be or from • Encryption • Converting data into a form that cannot be easily understood by unauthorized people
Security Services (cont.) • Key management • Generation, distribution and replace of keys • Secure routing • A message is eventually delivered to all legitimate nodes within a reasonable amount of time • Despite corrupting, dropping or misrouting the message.
Overview of Cryptography • Why cryptography? • Used to hide information • Network information needs to be communicated through insecure channel • Stored information may be accessed without proper authorization • What cryptography can do? • Encryption algorithms: only the authorized party can understand the encrypted message • Digital signature: allow people to verify the authenticity of the message
Overview of Cryptography • Encryption Algorithms • Scrambling of message such that only intended receiver can unscramble them • Encrypting function- produces encrypted message • Decrypting function- extracts original message • Key - parameter that controls encryption/decryption
Overview of Cryptography • What is Key? • A piece of information that controls the operation of an encryption algorithm. • A key specifies the particular transformation of plaintext into ciphertext, or vice versa during decryption. • To prevent a key from being guessed, keys need to be generated truly randomly
Overview of Cryptography • Symmetric Encryption Process • Use the same key for both encryption and decryption • Example: DES, 3DES
Overview of Cryptography • Public Key Encryption Process • Use a pair of keys, public key and private key • finding out the private key is extremely difficult, even if the public key is known • Example: RSA, Elliptic Curve
Overview of Cryptography • Example
Overview of Cryptography • Symmetric & Public Key Encryption • Symmetric encryption is fast but not as safe as public key encryption. But because of its speed, it's commonly used for multimedia, e-commerce transactions. • Public key encryption is more complex--and more secure. More computation is required, so the process takes longer
Overview of Cryptography • Hash Function • A reproducible method of turning data into a small number that may serve as a digital "fingerprint" of the data (Message Digest) • If two hashes are different, then the two inputs are different in some way. • If a hash value is calculated for a piece of data, and then one bit of that data is changed, a hash function produces a completely different hash value. • Unidirectional (cannot calculate text from hash)
Overview of Cryptography • Hash Function • Two most-commonly used hash functions: MD5 and SHA-1
Overview of Cryptography • Hash Function for Date Integrity • If the two hashes do not match, the message was altered
Overview of Cryptography • Digital Signature • A number attached to a message, when other people receive the message, he can simply verify the attached number to confirm whether the message has been changed or not. • Gives a recipient reason to believe that the message was created by a known sender. • Commonly used for software distribution, financial transactions, and in other cases where it is important to provide authenticity and integrity.
Overview of Cryptography • Digital Signature Generating Process • Hash a document
Overview of Cryptography • Digital Signature Generating Process • Sign the message digest
Overview of Cryptography • Digital Signature Verifying Process
Overview of Cryptography • Digital Signature Verifying Process
Overview of Cryptography • Digital Signature Algorithms • The Digital Signature Algorithm (DSA) • The RSA digital signature algorithm • The Elliptic Curve Digital Signature Algorithm (ECDSA)
Our Focus • Authentication • Key management