Network Security & Cryptography

Preview:

DESCRIPTION

It explores the idea of Network Security & Cryptography in the field of Information Technology.

Citation preview

1

Cryptography: An Innovative Technique for Information

Security

HIMANSHU GUPTA, FACULTY MEMBER, AMITY UNIVERSITY

2

Security Attacks

3

Security Attacks

Informationsource

Informationdestination

Normal Flow

4

Security Attacks

Informationsource

Informationdestination

Interruption

• Attack on availability

5

Security Attacks

Informationsource

Informationdestination

Interception

• Attack on confidentiality

6

Security Attacks

Informationsource

Informationdestination

Modification

• Attack on integrity

7

Security Attacks

Informationsource

Informationdestination

Fabrication

• Attack on authenticity

8

Classify Security Attacks

passive attacks - eavesdropping on, or monitoring of, transmissions to:

obtain message contents, ormonitor traffic flows

active attacks – modification of data stream to:

masquerade of one entity as some otherreplay previous messagesmodify messages in transitdenial of service

9

Security Attacks

Release of message contents

Trafficanalysis

• eavesdropping, monitoring transmissions

Passive threats

10

Passive Attacks

11

Security Attacks

Masquerade Denial ofservice

• some modification of the data stream

Active threats

Replay Modification of message contents

12

Active Attacks

13

Security Services

Confidentiality – protection from passive attacks

Authentication – you are who you say you are

Integrity – received as sent, no modifications, insertions, shuffling or replays

14

Security Services

Nonrepudiation – can’t deny a message was sent or received

Access Control – ability to limit and control access to host systems and apps

Availability – attacks affecting loss or reduction on availability

15

Network Security Model

16

Cryptography

Cryptography -- from the Greek for “secret writing” -- is the mathematical “scrambling” of data so that only someone with the necessary key can “unscramble” it.

Cryptography allows secure transmission of private information over insecure channels (for example packet-switched networks).

Cryptography also allows secure storage of sensitive data on any computer.

17

The language of cryptography

symmetric key crypto: sender, receiver keys identicalpublic-key crypto: encryption key public, decryption

key secret (private)

plaintext plaintextciphertext

KA

encryptionalgorithm

decryption algorithm

KB

18

Public-Private key Cryptography

19

Secret/Symmetric-key Cryptography

20

Secure Communication over Insecure Medium

21

RSA Encryption Algorithm

For example. make p = 7and q = 13

We then calculate N = 7∗13 = 91 and (p−1)(q−1) = 72

We next select ke relatively prime to 72 and< 72, yielding 5

Finally,we calculate kd such that ke*kd mod 72 = 1, yielding 29

We how have our keys

Public key, ke, N = 5, 91

Private key, kd , N = 29, 91

Encrypting the message 69 with the public key results in the cyphertext 62

Cyphertext can be decoded with the private key

Public key can be distributed in cleartext to anyone who wants to communicate with holder of public key

22

Encryption and Decryption using RSA Asymmetric Cryptography

23

What is a Firewall?

a choke point of control and monitoring interconnects networks with differing trustimposes restrictions on network services

only authorized traffic is allowed

auditing and controlling accesscan implement alarms for abnormal behavior

is itself immune to penetrationprovides perimeter defence

24

Firewall: Technical Concept

25

Firewall ConfigurationsFirewall Configurations

26

Thank You!!!!

27

Have A Nice Week!!!