1 / 12

Security Protocol

GROUP 8. Security Protocol. Usman Ali Suneel Parvaiz Atif Ahmed.

fisseha
Download Presentation

Security Protocol

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. GROUP 8 Security Protocol Usman Ali SuneelParvaiz Atif Ahmed

  2. “In information technology, a protocol (from the Greek word Protocollon, which was a leaf of paper pasted to a manuscript volume, describing its contents) is the special set of rules that end points in a telecommunication connection use when they communicate”.[1] PROTOCOL

  3. Limit data disclosure to intended set • Monitor communications to catch terrorists • Keep data from being corrupted • Destroy computers with pirated content • Track down bad guys • Communicate anonymously SECURITY

  4. A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods. There are so many security protocols grouped on the basis of algorithm they use to conceal information from unauthorized access. SECURITY PROTOCOL

  5. ARBITRATED PROTOCOL- A third party arbitrates the protocol to ensure no party is cheated. • ADJUDICATED- A third party is called in only if a clash during the execution of the protocol arises. • SELF ENFORCING- No arbitrator is used and the protocol itself ensures fairness. SECURITY PROTOCOL TYPES

  6. The biggest problem in Symmetric Encryptionis that of key management. For communication to take place in an encrypted mode, each party must have the same encryption/decryption key. • COMSET • Conference Key Distribution • Diffie-Hellman • Encrypted Key Exchange (EKE) • Shamir's Three Pass Protocol KEY EXCHANGE SYSTEM

  7. In Public Key Cipher Algorithm we had two types of keys • Public Key • Private Key • ElGamel • LUC • Knapsack • Pohlig-Hellman • Rabin • RSA - Public key algorithm for digital signatures PUBLIC KEY CIPHER ALGORITHMS

  8. This is exactly the same as the above two. These algorithms encrypt data in blocks. Each block is of a specific number of bits. • 3-Way • Blowfish • DES • IDEA • CRAB BLOCK CRYPTOGRAPHIC ALGORITHMS

  9. Authentication • MAC • One Way Hash Function • Identification Schemes • Combined Authentication & Key Exchange Other Security Protocol Groups

  10. http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212839,00.htmlhttp://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212839,00.html • http://en.wikipedia.org/wiki/Protocol_%28computing%29 • http://www.comptechdoc.org/independent/security/guide/secprotocols.html • http://www.afn.org/~afn21533/keyexchg.htm REFERENCES

More Related