cpe5021 advanced network security reading in security
Download
Skip this Video
Download Presentation
CPE5021 Advanced Network Security --- Reading in Security---

Loading in 2 Seconds...

play fullscreen
1 / 11

CPE5021 Advanced Network Security --- Reading in Security--- - PowerPoint PPT Presentation


  • 220 Views
  • Uploaded on

CPE5021 Advanced Network Security --- Reading in Security---. Outline. Discuss important security issues in the future. Choose the right technology for security. Find the main focuses of security. Further research and reading in security. References.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' CPE5021 Advanced Network Security --- Reading in Security---' - monita


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
outline
Outline
  • Discuss important security issues in the future.
  • Choose the right technology for security.
  • Find the main focuses of security.
  • Further research and reading in security.

CPE5021 - Advanced Nework Security

references
References
  • An Introduction to Probabilistic Encryption by George J. Fuchsbauer – Osjecki Matematicki List 6(2006), 37-44
  • “Quantum Cryptosystem”: Practical Technologies, TAJIMA AKIO(Nec) NAMBU YOSHIHIRO(Nec)   Journal Title;OptronicsJournal Code:Y0019AISSN:0286-9659VOL.;NO.285;PAGE.110-114(2005)
  • Tutorial on Qunatum Cryptography - http://www.cs.dartmouth.edu/~jford/crypto.html
  • Group key systems and dynamic key generation : Theory and Applications ( please get the papers from Tony Yang, Ping Wu, Osama Dandash or Harry Ngo by looking up their webpages at Monash)
    • Phu Dung Le & Yi (Tony) Yang
    • Phu Dung Le & Ping Wu
    • Phu Dung Le & Osama Dandash
    • Phu Dung Le & Harry Ngo

CPE5021 - Advanced Nework Security

future security
Future Security
  • Should IT community focus on improving the security of the Internet?
    • Can we make the Internet more secure? If YES, then
      • Is it O.K with everyone?
      • Is implementation feasible?
  • What will be the trend of cryptography?
    • Quantum crypto?
    • Dynamic key crypto system?
    • One-time pad crypto system?
    • Probabilistic cryptosystem?
    • Different approaches to Public Key System?
  • Should certificates be uniformly used for authentication of all services?
  • How will we deal with wireless malicious code?
  • What authentication model will be used?

CPE5021 - Advanced Nework Security

security developments
Security developments
  • Intelligent IDS
  • Wireless anti-malicious code system
  • Wireless information sharing
  • Wireless database management system and security
  • Group authentication
    • Authentication of services
    • Authentication of users of different groups

CPE5021 - Advanced Nework Security

trend of cryptosystems probabilistic encryption
Trend of cryptosystems: Probabilistic encryption
  • Encrypt a plaintext P using a key K & an encryption algorithm E C = E(K,P)
  • Decrypt a ciphertext C using the same key K and the matching decryption algorithm D P = D(K,C)
  • Note: P = D(K,C) = D(K, E(K,P))

CPE5021 - Advanced Nework Security

can we create a probabilistic crypto system
Can we create a probabilistic crypto system?
  • Fist time: C1 = E(K,P)
  • Second time: C2 = E(K,P)
  • Nth time: Cn = E(K,P)
  • C1, C2, … Cn are all different

(An Introduction to Probabilistic Encryption by George J. Fuchsbauer – Osjecki Matematicki List 6(2006), 37-44)

CPE5021 - Advanced Nework Security

quantum cryptosystems
Quantum cryptosystems
  • With quantum physics we can make a system that we can detect taping, so do we still need a crypto system?
  • Will quantum cryptosystems replace other cryptosystems?
  • Are quantum cryptosystems 100% secure?
  • Can we use quantum cryptosystems for authentication?

CPE5021 - Advanced Nework Security

dynamic key systems
Dynamic key systems
  • Problem with static key systems and the demand for dynamic key systems
    • Wireless services
    • Increase in computer power and attacking techniques
  • Is it possible to generate a different key each time we use? If yes, then
    • Can we use this technique for storing information?

CPE5021 - Advanced Nework Security

group key cryptosystems
Group key cryptosystems
  • Information and services are building up.
  • Many applications have group information sharing in nature.
    • Medical systems
    • Military systems
    • Banking systems
    • Record tracking systems

CPE5021 - Advanced Nework Security

main focuses of security
Main focuses of security
  • Wireless authentication and information sharing.
    • Users and services authentication.
  • Wireless anti-malicious code systems.
  • New attacks embedded in multimedia-data.
  • Information and black mailing.
  • Intelligent IDS systems with learning capacity.

CPE5021 - Advanced Nework Security

ad