Cpe5021 advanced network security reading in security
Download
1 / 11

CPE5021 Advanced Network Security --- Reading in Security--- - PowerPoint PPT Presentation


  • 212 Views
  • Uploaded on

CPE5021 Advanced Network Security --- Reading in Security---. Outline. Discuss important security issues in the future. Choose the right technology for security. Find the main focuses of security. Further research and reading in security. References.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' CPE5021 Advanced Network Security --- Reading in Security---' - monita


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Cpe5021 advanced network security reading in security

CPE5021Advanced Network Security--- Reading in Security---


Outline
Outline

  • Discuss important security issues in the future.

  • Choose the right technology for security.

  • Find the main focuses of security.

  • Further research and reading in security.

CPE5021 - Advanced Nework Security


References
References

  • An Introduction to Probabilistic Encryption by George J. Fuchsbauer – Osjecki Matematicki List 6(2006), 37-44

  • “Quantum Cryptosystem”: Practical Technologies, TAJIMA AKIO(Nec) NAMBU YOSHIHIRO(Nec)   Journal Title;OptronicsJournal Code:Y0019AISSN:0286-9659VOL.;NO.285;PAGE.110-114(2005)

  • Tutorial on Qunatum Cryptography - http://www.cs.dartmouth.edu/~jford/crypto.html

  • Group key systems and dynamic key generation : Theory and Applications ( please get the papers from Tony Yang, Ping Wu, Osama Dandash or Harry Ngo by looking up their webpages at Monash)

    • Phu Dung Le & Yi (Tony) Yang

    • Phu Dung Le & Ping Wu

    • Phu Dung Le & Osama Dandash

    • Phu Dung Le & Harry Ngo

CPE5021 - Advanced Nework Security


Future security
Future Security

  • Should IT community focus on improving the security of the Internet?

    • Can we make the Internet more secure? If YES, then

      • Is it O.K with everyone?

      • Is implementation feasible?

  • What will be the trend of cryptography?

    • Quantum crypto?

    • Dynamic key crypto system?

    • One-time pad crypto system?

    • Probabilistic cryptosystem?

    • Different approaches to Public Key System?

  • Should certificates be uniformly used for authentication of all services?

  • How will we deal with wireless malicious code?

  • What authentication model will be used?

CPE5021 - Advanced Nework Security


Security developments
Security developments

  • Intelligent IDS

  • Wireless anti-malicious code system

  • Wireless information sharing

  • Wireless database management system and security

  • Group authentication

    • Authentication of services

    • Authentication of users of different groups

CPE5021 - Advanced Nework Security


Trend of cryptosystems probabilistic encryption
Trend of cryptosystems: Probabilistic encryption

  • Encrypt a plaintext P using a key K & an encryption algorithm E C = E(K,P)

  • Decrypt a ciphertext C using the same key K and the matching decryption algorithm D P = D(K,C)

  • Note: P = D(K,C) = D(K, E(K,P))

CPE5021 - Advanced Nework Security


Can we create a probabilistic crypto system
Can we create a probabilistic crypto system?

  • Fist time: C1 = E(K,P)

  • Second time: C2 = E(K,P)

  • Nth time: Cn = E(K,P)

  • C1, C2, … Cn are all different

    (An Introduction to Probabilistic Encryption by George J. Fuchsbauer – Osjecki Matematicki List 6(2006), 37-44)

CPE5021 - Advanced Nework Security


Quantum cryptosystems
Quantum cryptosystems

  • With quantum physics we can make a system that we can detect taping, so do we still need a crypto system?

  • Will quantum cryptosystems replace other cryptosystems?

  • Are quantum cryptosystems 100% secure?

  • Can we use quantum cryptosystems for authentication?

CPE5021 - Advanced Nework Security


Dynamic key systems
Dynamic key systems

  • Problem with static key systems and the demand for dynamic key systems

    • Wireless services

    • Increase in computer power and attacking techniques

  • Is it possible to generate a different key each time we use? If yes, then

    • Can we use this technique for storing information?

CPE5021 - Advanced Nework Security


Group key cryptosystems
Group key cryptosystems

  • Information and services are building up.

  • Many applications have group information sharing in nature.

    • Medical systems

    • Military systems

    • Banking systems

    • Record tracking systems

CPE5021 - Advanced Nework Security


Main focuses of security
Main focuses of security

  • Wireless authentication and information sharing.

    • Users and services authentication.

  • Wireless anti-malicious code systems.

  • New attacks embedded in multimedia-data.

  • Information and black mailing.

  • Intelligent IDS systems with learning capacity.

CPE5021 - Advanced Nework Security


ad