Upload
dr-himanshu-gupta
View
564
Download
5
Tags:
Embed Size (px)
DESCRIPTION
It explores the idea of Network Security & Cryptography in the field of Information Technology.
Citation preview
1
Cryptography: An Innovative Technique for Information
Security
HIMANSHU GUPTA, FACULTY MEMBER, AMITY UNIVERSITY
2
Security Attacks
3
Security Attacks
Informationsource
Informationdestination
Normal Flow
4
Security Attacks
Informationsource
Informationdestination
Interruption
• Attack on availability
5
Security Attacks
Informationsource
Informationdestination
Interception
• Attack on confidentiality
6
Security Attacks
Informationsource
Informationdestination
Modification
• Attack on integrity
7
Security Attacks
Informationsource
Informationdestination
Fabrication
• Attack on authenticity
8
Classify Security Attacks
passive attacks - eavesdropping on, or monitoring of, transmissions to:
obtain message contents, ormonitor traffic flows
active attacks – modification of data stream to:
masquerade of one entity as some otherreplay previous messagesmodify messages in transitdenial of service
9
Security Attacks
Release of message contents
Trafficanalysis
• eavesdropping, monitoring transmissions
Passive threats
10
Passive Attacks
11
Security Attacks
Masquerade Denial ofservice
• some modification of the data stream
Active threats
Replay Modification of message contents
12
Active Attacks
13
Security Services
Confidentiality – protection from passive attacks
Authentication – you are who you say you are
Integrity – received as sent, no modifications, insertions, shuffling or replays
14
Security Services
Nonrepudiation – can’t deny a message was sent or received
Access Control – ability to limit and control access to host systems and apps
Availability – attacks affecting loss or reduction on availability
15
Network Security Model
16
Cryptography
Cryptography -- from the Greek for “secret writing” -- is the mathematical “scrambling” of data so that only someone with the necessary key can “unscramble” it.
Cryptography allows secure transmission of private information over insecure channels (for example packet-switched networks).
Cryptography also allows secure storage of sensitive data on any computer.
17
The language of cryptography
symmetric key crypto: sender, receiver keys identicalpublic-key crypto: encryption key public, decryption
key secret (private)
plaintext plaintextciphertext
KA
encryptionalgorithm
decryption algorithm
KB
18
Public-Private key Cryptography
19
Secret/Symmetric-key Cryptography
20
Secure Communication over Insecure Medium
21
RSA Encryption Algorithm
For example. make p = 7and q = 13
We then calculate N = 7∗13 = 91 and (p−1)(q−1) = 72
We next select ke relatively prime to 72 and< 72, yielding 5
Finally,we calculate kd such that ke*kd mod 72 = 1, yielding 29
We how have our keys
Public key, ke, N = 5, 91
Private key, kd , N = 29, 91
Encrypting the message 69 with the public key results in the cyphertext 62
Cyphertext can be decoded with the private key
Public key can be distributed in cleartext to anyone who wants to communicate with holder of public key
22
Encryption and Decryption using RSA Asymmetric Cryptography
23
What is a Firewall?
a choke point of control and monitoring interconnects networks with differing trustimposes restrictions on network services
only authorized traffic is allowed
auditing and controlling accesscan implement alarms for abnormal behavior
is itself immune to penetrationprovides perimeter defence
24
Firewall: Technical Concept
25
Firewall ConfigurationsFirewall Configurations
26
Thank You!!!!
27
Have A Nice Week!!!