27
1 Cryptography: An Innovative Technique for Information Security HIMANSHU GUPTA, FACULTY MEMBER, AMITY UNIVERSITY

Network Security & Cryptography

Embed Size (px)

DESCRIPTION

It explores the idea of Network Security & Cryptography in the field of Information Technology.

Citation preview

Page 1: Network Security & Cryptography

1

Cryptography: An Innovative Technique for Information

Security

HIMANSHU GUPTA, FACULTY MEMBER, AMITY UNIVERSITY

Page 2: Network Security & Cryptography

2

Security Attacks

Page 3: Network Security & Cryptography

3

Security Attacks

Informationsource

Informationdestination

Normal Flow

Page 4: Network Security & Cryptography

4

Security Attacks

Informationsource

Informationdestination

Interruption

• Attack on availability

Page 5: Network Security & Cryptography

5

Security Attacks

Informationsource

Informationdestination

Interception

• Attack on confidentiality

Page 6: Network Security & Cryptography

6

Security Attacks

Informationsource

Informationdestination

Modification

• Attack on integrity

Page 7: Network Security & Cryptography

7

Security Attacks

Informationsource

Informationdestination

Fabrication

• Attack on authenticity

Page 8: Network Security & Cryptography

8

Classify Security Attacks

passive attacks - eavesdropping on, or monitoring of, transmissions to:

obtain message contents, ormonitor traffic flows

active attacks – modification of data stream to:

masquerade of one entity as some otherreplay previous messagesmodify messages in transitdenial of service

Page 9: Network Security & Cryptography

9

Security Attacks

Release of message contents

Trafficanalysis

• eavesdropping, monitoring transmissions

Passive threats

Page 10: Network Security & Cryptography

10

Passive Attacks

Page 11: Network Security & Cryptography

11

Security Attacks

Masquerade Denial ofservice

• some modification of the data stream

Active threats

Replay Modification of message contents

Page 12: Network Security & Cryptography

12

Active Attacks

Page 13: Network Security & Cryptography

13

Security Services

Confidentiality – protection from passive attacks

Authentication – you are who you say you are

Integrity – received as sent, no modifications, insertions, shuffling or replays

Page 14: Network Security & Cryptography

14

Security Services

Nonrepudiation – can’t deny a message was sent or received

Access Control – ability to limit and control access to host systems and apps

Availability – attacks affecting loss or reduction on availability

Page 15: Network Security & Cryptography

15

Network Security Model

Page 16: Network Security & Cryptography

16

Cryptography

Cryptography -- from the Greek for “secret writing” -- is the mathematical “scrambling” of data so that only someone with the necessary key can “unscramble” it.

Cryptography allows secure transmission of private information over insecure channels (for example packet-switched networks).

Cryptography also allows secure storage of sensitive data on any computer.

Page 17: Network Security & Cryptography

17

The language of cryptography

symmetric key crypto: sender, receiver keys identicalpublic-key crypto: encryption key public, decryption

key secret (private)

plaintext plaintextciphertext

KA

encryptionalgorithm

decryption algorithm

KB

Page 18: Network Security & Cryptography

18

Public-Private key Cryptography

Page 19: Network Security & Cryptography

19

Secret/Symmetric-key Cryptography

Page 20: Network Security & Cryptography

20

Secure Communication over Insecure Medium

Page 21: Network Security & Cryptography

21

RSA Encryption Algorithm

For example. make p = 7and q = 13

We then calculate N = 7∗13 = 91 and (p−1)(q−1) = 72

We next select ke relatively prime to 72 and< 72, yielding 5

Finally,we calculate kd such that ke*kd mod 72 = 1, yielding 29

We how have our keys

Public key, ke, N = 5, 91

Private key, kd , N = 29, 91

Encrypting the message 69 with the public key results in the cyphertext 62

Cyphertext can be decoded with the private key

Public key can be distributed in cleartext to anyone who wants to communicate with holder of public key

Page 22: Network Security & Cryptography

22

Encryption and Decryption using RSA Asymmetric Cryptography

Page 23: Network Security & Cryptography

23

What is a Firewall?

a choke point of control and monitoring interconnects networks with differing trustimposes restrictions on network services

only authorized traffic is allowed

auditing and controlling accesscan implement alarms for abnormal behavior

is itself immune to penetrationprovides perimeter defence

Page 24: Network Security & Cryptography

24

Firewall: Technical Concept

Page 25: Network Security & Cryptography

25

Firewall ConfigurationsFirewall Configurations

Page 26: Network Security & Cryptography

26

Thank You!!!!

Page 27: Network Security & Cryptography

27

Have A Nice Week!!!