1 / 17

Network Security

Network Security. Hwajung Lee. What is Computer Networks?. A collection of autonomous computers interconnected by a single technology Interconnected via: Copper wire Fiber optics Microwaves Infrared Communication satellites, etc. Backbone Network.

ady
Download Presentation

Network Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Network Security Hwajung Lee

  2. What is Computer Networks? • A collection of autonomous computers interconnected by a single technology • Interconnected via: • Copper wire • Fiber optics • Microwaves • Infrared • Communication satellites, etc.

  3. Backbone Network Next Generation NetworksWireless, Optical, Satellite Networks

  4. All All All Optical Optical Optical Networks Networks Networks All Optical Networks Regeneration /Adaptation O-E-O SONET Terminal IP Router

  5. AON Security Characteristics • Extremely high data rate • Short and infrequent attacks or failures can result in loss of large amounts of data. • 1.6 Terabits per second is equivalent to 320 million • Pages/sec of information • If eavesdropping attack lasts only 1 second, 320 million page of classified information could be compromised. • 1.6 Terabits per second is 25 million simultaneous • telephone conversation. • If a link failure lasts only 1 second, 25 million simultaneous telephone conversation could be disrupted.

  6. Any Security Solutions? • Confidentiality • Integrity  Cryptography (PKI, Digital Signature…) • Availability

  7. Friends and enemies: Alice, Bob, Trudy • well-known in network security world • Bob, Alice (lovers!) want to communicate “securely” • Trudy, the “intruder” may intercept, delete, add messages Figure 7.1 goes here

  8. K K A B The language of cryptography plaintext plaintext symmetric key crypto: sender, receiver keys identical public-key crypto: encrypt key public, decrypt key secret ciphertext Figure 7.3 goes here

  9. Symmetric key cryptography substitution cipher: substituting one thing for another • monoalphabetic cipher: substitute one letter for another plaintext: abcdefghijklmnopqrstuvwxyz ciphertext: mnbvcxzasdfghjklpoiuytrewq E.g.: Plaintext: bob. i love you. alice ciphertext: nkn. s gktc wky. mgsbc • Q: How hard to break this simple cipher?: • brute force (how hard?) • other?

  10. Symmetric key crypto: DES DES: Data Encryption Standard • US encryption standard [NIST 1993] • 56-bit symmetric key, 64 bit plaintext input • How secure is DES? • DES Challenge: 56-bit-key-encrypted phrase (“Strong cryptography makes the world a safer place”) decrypted (brute force) in 4 months • no known “backdoor” decryption approach • making DES more secure • use three keys sequentially (3-DES) on each datum • use cipher-block chaining

  11. DES operation Symmetric key crypto: DES initial permutation 16 identical “rounds” of function application, each using different 48 bits of key final permutation

  12. Public Key Cryptography symmetric key crypto • requires sender, receiver know shared secret key • Q: how to agree on key in first place (particularly if never “met”)? public key cryptography • radically different approach [Diffie-Hellman76, RSA78] • sender, receiver do not share secret key • encryption key public (known to all) • decryption key private (known only to receiver)

  13. Public key cryptography Figure 7.7 goes here

  14. d (e (m)) = m B B 1 2 Public key encryption algorithms Two inter-related requirements: need d ( ) and e ( ) such that . . B B need public and private keys for d ( ) and e ( ) . . B B RSA: Rivest, Shamir, Adelson algorithm

  15. RSA: Choosing keys 1. Choose two large prime numbers p, q. (e.g., 1024 bits each) 2. Compute n = pq, z = (p-1)(q-1) 3. Choose e (with e<n) that has no common factors with z. (e, z are “relatively prime”). 4. Choose d such that ed-1 is exactly divisible by z. (in other words: ed mod z = 1 ). 5.Public key is (n,e).Private key is (n,d).

  16. 1. To encrypt bit pattern, m, compute d e m = c mod n c = m mod n e (i.e., remainder when m is divided by n) Magic happens! d e m = (m mod n) mod n RSA: Encryption, decryption 0. Given (n,e) and (n,d) as computed above 2. To decrypt received bit pattern, c, compute d (i.e., remainder when c is divided by n)

  17. d e c = m mod n m = c mod n d c RSA example: Bob chooses p=5, q=7. Then n=35, z=24. e=5 (so e, z relatively prime). d=29 (so ed-1 exactly divisible by z). e m m letter encrypt: l 17 248832 12 c letter decrypt: 17 12 l 481968572106750915091411825223072000

More Related