1 / 16

Security in Network Communications

Security in Network Communications. Deepti Reddy Suphannee Sae Chai Sarah Summers. Presentation Overview. Motivation Communication Security Issues Secure Email. Motivation. Network Communications are a fact of every day life. Need to protect sensitive information.

Télécharger la présentation

Security in Network Communications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.


Presentation Transcript

  1. Security in Network Communications Deepti Reddy Suphannee Sae Chai Sarah Summers CS522 Computer Communications

  2. Presentation Overview • Motivation • Communication Security Issues • Secure Email CS522 Computer Communications

  3. Motivation • Network Communications are a fact of every day life. • Need to protect sensitive information. • Need to control access. CS522 Computer Communications

  4. Communication Security Issues • Confidentiality • Authentication • Integrity • Non-repudiation CS522 Computer Communications

  5. Email Security Protocols • PGP (Pretty Good Privacy) • PEM • S/MIME CS522 Computer Communications

  6. PGP (Pretty Good Privacy) • Hybrid Crypto System • Combines Features of Symmetric and Asymmetric Cryptography • Confidentiality • Authentication • Digital Signatures • Compression CS522 Computer Communications

  7. How PGP Works • Preprocessor invoked by user • Compresses plaintext using MD5 • Resulting Hash encrypted using RSA with sender’s private key • PGP concatenates encrypted hash and original message into single message and compresses it using a ZIP programme CS522 Computer Communications

  8. How PGP Works? • PGP generates a session key using the IDEA algorithm • Key generated from random key strokes and mouse movements • Session key encrypted using receiver’s public key • Encrypted session key and zipped message are concatenated and converted to base 64 CS522 Computer Communications

  9. PGP Encryption CS522 Computer Communications

  10. Future Work • Staying ahead of attackers by developing stronger algorithms and security techniques. • Modification of current protocols. • Creation of new protocols. CS522 Computer Communications

  11. Conclusions • Network Communications security is a broad and complex subject. • Cryptographic methods are the solution. • Security mechanisms will always be attacked and eventually broken. CS522 Computer Communications

  12. Questions ?Under Pain of Death! CS522 Computer Communications

  13. References [1] Communication Security – available techniques, AXIS Communications White Paper, http://www.axis.com/documentation/whitepaper/security.pdf [2] IDEA (International Data Encryption Algorithm) http://www.quadibloc.com/crypto/co040302.htm [3] International Data Encryption Algorithm – Technical Description, http://www.mediacrypt.com/_pdf/IDEA_Technical_Description_0105.pdf [4] How PGP Works, http://www.pgpi.org/doc/pgpintro CS522 Computer Communications

  14. IDEA ALGORITHM • International Data Encryption Algorithm • Block Cipher Algorithm • Operates on 64 bit plaintext and cipher text blocks • Utilizes 128 bit key CS522 Computer Communications

  15. How IDEA Works • Comprised of 8 identical encryption processes (rounds) followed by a final output transformation • Plaintext partitioned into four 16 bit sub-blocks • Three operations used to combine two 16-bit values to produce a 16-bit result -addition, XOR and multiplication CS522 Computer Communications

  16. How IDEA Works (conitnued) CS522 Computer Communications

More Related