Cpe5021 advanced network security reading in security
This presentation is the property of its rightful owner.
Sponsored Links
1 / 11

CPE5021 Advanced Network Security --- Reading in Security--- PowerPoint PPT Presentation


  • 171 Views
  • Uploaded on
  • Presentation posted in: General

CPE5021 Advanced Network Security --- Reading in Security---. Outline. Discuss important security issues in the future. Choose the right technology for security. Find the main focuses of security. Further research and reading in security. References.

Download Presentation

CPE5021 Advanced Network Security --- Reading in Security---

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Cpe5021 advanced network security reading in security

CPE5021Advanced Network Security--- Reading in Security---


Outline

Outline

  • Discuss important security issues in the future.

  • Choose the right technology for security.

  • Find the main focuses of security.

  • Further research and reading in security.

CPE5021 - Advanced Nework Security


References

References

  • An Introduction to Probabilistic Encryption by George J. Fuchsbauer – Osjecki Matematicki List 6(2006), 37-44

  • “Quantum Cryptosystem”: Practical Technologies, TAJIMA AKIO(Nec) NAMBU YOSHIHIRO(Nec)   Journal Title;OptronicsJournal Code:Y0019AISSN:0286-9659VOL.;NO.285;PAGE.110-114(2005)

  • Tutorial on Qunatum Cryptography - http://www.cs.dartmouth.edu/~jford/crypto.html

  • Group key systems and dynamic key generation : Theory and Applications ( please get the papers from Tony Yang, Ping Wu, Osama Dandash or Harry Ngo by looking up their webpages at Monash)

    • Phu Dung Le & Yi (Tony) Yang

    • Phu Dung Le & Ping Wu

    • Phu Dung Le & Osama Dandash

    • Phu Dung Le & Harry Ngo

CPE5021 - Advanced Nework Security


Future security

Future Security

  • Should IT community focus on improving the security of the Internet?

    • Can we make the Internet more secure? If YES, then

      • Is it O.K with everyone?

      • Is implementation feasible?

  • What will be the trend of cryptography?

    • Quantum crypto?

    • Dynamic key crypto system?

    • One-time pad crypto system?

    • Probabilistic cryptosystem?

    • Different approaches to Public Key System?

  • Should certificates be uniformly used for authentication of all services?

  • How will we deal with wireless malicious code?

  • What authentication model will be used?

CPE5021 - Advanced Nework Security


Security developments

Security developments

  • Intelligent IDS

  • Wireless anti-malicious code system

  • Wireless information sharing

  • Wireless database management system and security

  • Group authentication

    • Authentication of services

    • Authentication of users of different groups

CPE5021 - Advanced Nework Security


Trend of cryptosystems probabilistic encryption

Trend of cryptosystems: Probabilistic encryption

  • Encrypt a plaintext P using a key K & an encryption algorithm EC = E(K,P)

  • Decrypt a ciphertext C using the same key K and the matching decryption algorithm DP = D(K,C)

  • Note: P = D(K,C) = D(K, E(K,P))

CPE5021 - Advanced Nework Security


Can we create a probabilistic crypto system

Can we create a probabilistic crypto system?

  • Fist time: C1 = E(K,P)

  • Second time: C2 = E(K,P)

  • Nth time: Cn = E(K,P)

  • C1, C2, … Cn are all different

    (An Introduction to Probabilistic Encryption by George J. Fuchsbauer – Osjecki Matematicki List 6(2006), 37-44)

CPE5021 - Advanced Nework Security


Quantum cryptosystems

Quantum cryptosystems

  • With quantum physics we can make a system that we can detect taping, so do we still need a crypto system?

  • Will quantum cryptosystems replace other cryptosystems?

  • Are quantum cryptosystems 100% secure?

  • Can we use quantum cryptosystems for authentication?

CPE5021 - Advanced Nework Security


Dynamic key systems

Dynamic key systems

  • Problem with static key systems and the demand for dynamic key systems

    • Wireless services

    • Increase in computer power and attacking techniques

  • Is it possible to generate a different key each time we use? If yes, then

    • Can we use this technique for storing information?

CPE5021 - Advanced Nework Security


Group key cryptosystems

Group key cryptosystems

  • Information and services are building up.

  • Many applications have group information sharing in nature.

    • Medical systems

    • Military systems

    • Banking systems

    • Record tracking systems

CPE5021 - Advanced Nework Security


Main focuses of security

Main focuses of security

  • Wireless authentication and information sharing.

    • Users and services authentication.

  • Wireless anti-malicious code systems.

  • New attacks embedded in multimedia-data.

  • Information and black mailing.

  • Intelligent IDS systems with learning capacity.

CPE5021 - Advanced Nework Security


  • Login