1 Introductory
1 Introductory
and Cryptography
Dr. Ala Altaweel
University of Sharjah
1
Course Description
2
Basic Course Information and Students’ Assessment:
• Instructor:
• Dr. Ala Altaweel
• Office Hours: TBA @ M5 222
• Email: [email protected]
• Make an appointment if necessary
• Textbook:
- William Stallings, “Cryptography and Network Security: Principles and Practices”, Prentice-Hall, 2017.
- Security in Computing 5th Edition, by Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies
2015.
3
Networking Review: roadmap
Lecture goal: Overview/roadmap:
• Get “feel,” “big picture,” • What is the Internet? What is a
“Refresh” protocol?
• more depth, already • Network edge: hosts, access network,
covered during computer physical media
network course! • Network core: packet/circuit switching,
internet structure
• Protocol layers, service models
4
The Internet: a “nuts and bolts” view
Billions of connected mobile network
computing devices:
national or global ISP
hosts = end systems
running network apps at
Internet’s “edge”
Networks enterprise
collection of devices, routers, links: network
managed by an organization
5
“Fun” Internet-connected devices
Tweet-a-watt:
monitor energy use
bikes
Gaming devices
Others?
Internet phones Fitbit
6
The Internet: a “nuts and bolts” view
mobile network
4G
• Internet: “network of networks” national or global ISP
• Interconnected ISPs
protocols are everywhere Skype
IP
Streaming
video
• control sending, receiving of
messages local or
regional
• e.g., HTTP (Web), streaming video, ISP
Skype, TCP, IP, WiFi, 4G, Ethernet home network content
provider
HTTP network
Internet standards datacenter
network
Ethernet
• RFC: Request for Comments
TCP
• IETF: Internet Engineering Task enterprise
Force network
WiFi
7
The Internet: a “services” view
sending/receiving apps to
network
8
What’s a protocol?
Rules for:
Protocols define the format, order of
… specific messages sent
messages sent and received
… specific actions taken among network entities, and
when message received,
or other events actions taken on message
transmission, receipt
9
What’s a protocol?
Hi TCP connection
request
Hi TCP connection
response
Got the
time?
GET http://sharjah.ac.ae/en/Pages/default.aspx
2:00
<file>
time
10
Networking Review: roadmap
• What is the Internet?
• What is a protocol?
• Network edge: hosts, access
network, physical media
• Network core: packet/circuit
switching, internet structure
11
A closer look at Internet structure
mobile network
enterprise
network
12
A closer look at Internet structure
mobile network
links
enterprise
network
13
A closer look at Internet structure
mobile network
interconnected routers
network of networks
enterprise
network
14
Access networks and physical media
Q: How to connect end systems to mobile network
enterprise
network
15
Access networks: home networks
Wireless and wired
devices
to/from headend or
central office
often combined
in single box
16
Access networks: enterprise networks
Enterprise link to
ISP (Internet)
institutional router
Ethernet institutional mail,
switch web servers
17
Access networks: data center networks
mobile network
high-bandwidth links (10s to 100s national or global ISP
Gbps) connect hundreds to thousands
of servers together, and to Internet
local or
regional
ISP
home network content
provider
network datacenter
network
18
Host: sends packets of data
host sending function:
takes application message
breaks into smaller chunks, two packets,
known as packets, of length L bits L bits each
19
Links: physical media
bit: propagates between Twisted pair (TP)
transmitter/receiver pairs
two insulated copper wires
physical link: what lies • Category 5: 100 Mbps, 1 Gbps Ethernet
between transmitter & • Category 6: 10Gbps Ethernet
receiver
guided media:
• signals propagate in solid
media: copper, fiber, coax
unguided media:
• signals propagate freely,
e.g., radio
20
Links: physical media
Coaxial cable: Fiber optic cable:
two concentric copper conductors glass fiber carrying light pulses, each
pulse a bit
bidirectional
high-speed operation:
broadband: • high-speed point-to-point
• multiple frequency channels on cable transmission (10’s-100’s Gbps)
• 100’s Mbps per channel low error rate:
• repeaters spaced far apart
• immune to electromagnetic noise
21
Networking Review: roadmap
• What is the Internet?
• What is a protocol?
• Network edge: hosts, access
network, physical media
• Network core: packet/circuit
switching, internet structure
• Protocol layers, service models
22
The network core
• mesh of interconnected routers mobile network
national or global ISP
• packet-switching: hosts break
application-layer messages into
packets
• network forwards packets from one local or
router to the next, across links on regional
ISP
enterprise
network
23
Two key network-core functions
24
routing
25
forwarding
forwarding
26
Packet-switching: store-and-forward
L bits
per packet
3 2 1
source destination
R bps R bps
27
Packet-switching: queueing
R = 100 Mb/s
A C
D
B R = 1.5 Mb/s
E
queue of packets
waiting for transmission
over output link
28
Alternative to packet switching: circuit switching
end-end resources allocated to,
reserved for “call” between source
and destination
• in diagram, each link has four circuits.
• call gets 2nd circuit in top link and 1st
circuit in right link.
• dedicated resources: no sharing
• circuit-like (guaranteed) performance
• circuit segment idle if not used by call (no
sharing)
commonly used in traditional telephone networks
29
Networking Review: roadmap
• What is the Internet?
• What is a protocol?
• Network edge: hosts, access
network, physical media
• Network core: packet/circuit
switching, internet structure
• Protocol layers, service models
30
Protocol “layers” and reference models
Networks are complex, Question: is there any
with many “pieces”: hope of organizing
hosts structure of network?
routers and/or our discussion
links of various media of networks?
applications
protocols
hardware, software
31
Example: organization of air travel
end-to-end transfer of person plus baggage
ticket (purchase) ticket (complain)
baggage (check) baggage (claim)
gates (load) gates (unload)
runway takeoff runway landing
airplane routing airplane routing
airplane routing
32
Example: organization of air travel
33
Why layering?
Approach to designing/discussing complex systems:
explicit structure allows identification,
relationship of system’s pieces
• layered reference model for discussion
modularization eases maintenance,
updating of system
• change in layer's service implementation:
transparent to rest of system
• e.g., change in gate procedure doesn’t
affect rest of system
34
Layered Internet protocol stack
application: supporting network applications
• HTTP, IMAP, SMTP, DNS
application
application
transport: process-process data transfer
• TCP, UDP transport
transport
network: routing of datagrams from source to
destination network
• IP, routing protocols
link
link: data transfer between neighboring
network elements (i.e., 1-hop) physical
• Ethernet, 802.11 (WiFi), PPP
physical: bits “on the wire”
35
Services, Layering and Encapsulation
M
application Application exchanges messages to application
implement some application service
transport using services Ht of
M transport layer
transport
Transport-layer protocol transfers M
(e.g., reliably) from one process to
network another, using services of network layer network
transport-layer protocol encapsulates
link application-layer message, M, with link
transport layer-layer header Ht to
create a transport-layer segment
physical • Ht used by transport layer protocol physical
to implement its service
source destination
36
Services, Layering and Encapsulation
M
application application
Ht M
transport transport
Transport-layer protocol transfers M
(e.g., reliably) from one process to
network another, using Hservices
n Ht M of network layer network
Network-layer protocol transfers
transport-layer segment [Ht | M] from
link one host to another, using link layer link
services
physical physical
network-layer protocol encapsulates
transport-layer segment [Ht | M] with
source network layer-layer header Hn to destination
create a network-layer datagram
• Hn used by network layer protocol to
implement its service
37
Services, Layering and Encapsulation
M
application application
Ht M
transport transport
network Hn Ht M network
Network-layer protocol transfers
transport-layer segment [Ht | M] from
link Hl Hn Ht M
one host to another, using link layer link
Link-layer protocol transfers datagram
services
physical [Hn| [Ht |M] from host to neighboring physical
host, using physical-layer services
link-layer protocol encapsulates
source network datagram [Hn| [Ht |M], with link- destination
layer header Hl to create a link-layer
frame
38
Services, Layering and Encapsulation
M
application M application
message
Ht M
transport Ht M transport
segment
network Hn Ht M Hn Ht M network
datagram
link Hl Hn Ht M Hl Hn Ht M
link
frame
physical physical
source destination
39
message
source
application
Encapsulation: an
end-end view
M
segment Ht M transport
datagram Hn Ht M network
frame Hl Hn Ht M link
physical
link
physical
switch
destination Hn Ht M network
M application Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
40
Chapter 1
Overview
42
Security: overview
Lecture goals:
understand principles of network security:
• cryptography and its many uses beyond “confidentiality”
• authentication
• message integrity
security in practice:
• firewalls and intrusion detection systems
• security in application, transport, network, link layers
43
Computer Security
44
What is network security?
confidentiality: only sender, intended receiver should “understand”
message contents
• sender encrypts message
• receiver decrypts message
authentication: sender, receiver want to confirm identity of each
other
message integrity: sender, receiver want to ensure message not
altered (in transit, or afterwards) without detection
access and availability: services must be accessible and available to
users
46
Friends and enemies: Alice, Bob, Trudy
well-known in network security world
Bob, Alice (friends!) want to communicate “securely”
Trudy (intruder) may intercept, delete, add messages
secure secure
data data
sender receiver
Trudy
47
Friends and enemies: Alice, Bob, Trudy
Who might Bob and Alice be?
… well, real-life Bobs and Alices!
Web browser/server for electronic transactions (e.g., on-line purchases)
on-line banking client/server
DNS servers
BGP routers exchanging routing table updates
other examples?
48
There are bad guys (and girls) out there!
Q: What can a “bad guy” do?
A: A lot!
• eavesdrop: intercept messages
• actively insert messages into connection
• impersonation: can fake (spoof) source address in packet (or any
field in packet)
• hijacking: “take over” ongoing connection by removing sender or
receiver, inserting himself in place
• denial of service: prevent service from being used by others (e.g.,
by overloading resources)
49
most of the protocols are mixed of first two, asymmetric used to share the keys, then symmetric
• Used to conceal small blocks of data, such as encryption keys and hash
function values, which are used in digital signatures
Authentication protocols
50
Authentication
Impersonate
Integrity
Availability
One way authentication or (data origin): like home wifi that require a password
Peer: like two factor authentication
: mutual authentication
Secret key