Enhancing Network Communications Security
160 likes | 184 Views
Learn about communication security issues, secure email protocols like PGP, and the IDEA encryption algorithm for robust protection. Future work includes developing stronger algorithms to combat attackers.
Enhancing Network Communications Security
E N D
Presentation Transcript
Security in Network Communications Deepti Reddy Suphannee Sae Chai Sarah Summers CS522 Computer Communications
Presentation Overview • Motivation • Communication Security Issues • Secure Email CS522 Computer Communications
Motivation • Network Communications are a fact of every day life. • Need to protect sensitive information. • Need to control access. CS522 Computer Communications
Communication Security Issues • Confidentiality • Authentication • Integrity • Non-repudiation CS522 Computer Communications
Email Security Protocols • PGP (Pretty Good Privacy) • PEM • S/MIME CS522 Computer Communications
PGP (Pretty Good Privacy) • Hybrid Crypto System • Combines Features of Symmetric and Asymmetric Cryptography • Confidentiality • Authentication • Digital Signatures • Compression CS522 Computer Communications
How PGP Works • Preprocessor invoked by user • Compresses plaintext using MD5 • Resulting Hash encrypted using RSA with sender’s private key • PGP concatenates encrypted hash and original message into single message and compresses it using a ZIP programme CS522 Computer Communications
How PGP Works? • PGP generates a session key using the IDEA algorithm • Key generated from random key strokes and mouse movements • Session key encrypted using receiver’s public key • Encrypted session key and zipped message are concatenated and converted to base 64 CS522 Computer Communications
PGP Encryption CS522 Computer Communications
Future Work • Staying ahead of attackers by developing stronger algorithms and security techniques. • Modification of current protocols. • Creation of new protocols. CS522 Computer Communications
Conclusions • Network Communications security is a broad and complex subject. • Cryptographic methods are the solution. • Security mechanisms will always be attacked and eventually broken. CS522 Computer Communications
Questions ?Under Pain of Death! CS522 Computer Communications
References [1] Communication Security – available techniques, AXIS Communications White Paper, http://www.axis.com/documentation/whitepaper/security.pdf [2] IDEA (International Data Encryption Algorithm) http://www.quadibloc.com/crypto/co040302.htm [3] International Data Encryption Algorithm – Technical Description, http://www.mediacrypt.com/_pdf/IDEA_Technical_Description_0105.pdf [4] How PGP Works, http://www.pgpi.org/doc/pgpintro CS522 Computer Communications
IDEA ALGORITHM • International Data Encryption Algorithm • Block Cipher Algorithm • Operates on 64 bit plaintext and cipher text blocks • Utilizes 128 bit key CS522 Computer Communications
How IDEA Works • Comprised of 8 identical encryption processes (rounds) followed by a final output transformation • Plaintext partitioned into four 16 bit sub-blocks • Three operations used to combine two 16-bit values to produce a 16-bit result -addition, XOR and multiplication CS522 Computer Communications
How IDEA Works (conitnued) CS522 Computer Communications