Introduction Architecture
Introduction Architecture
Network Security
Chapter 1
Cryptographic algorithms and
protocols
Symmetric encryption: Used to conceal
the contents of blocks or streams of data
of any size, including messages, files,
encryption keys, and passwords.
RFC 2828:
“a processing or communication service
provided by a system to give a specific kind of
protection to system resources”
Security Services (X.800)
Authentication - assurance that the
communicating entity is the one claimed
Access Control - prevention of the
unauthorized use of a resource
Data Confidentiality –protection of data from
unauthorized disclosure
Data Integrity - assurance that data received is
as sent by an authorized entity
Non-Repudiation - protection against denial by
one of the parties in a communication
Security Mechanism
feature designed to detect, prevent, or
recover from a security attack
no single mechanism that will support all
services required
however one particular element underlies
many of the security mechanisms in use:
● cryptographic techniques
hence our focus on this topic
Security Mechanisms (X.800)
specific security mechanisms:
● encipherment, digital signatures, access
controls, data integrity, authentication
exchange, traffic padding, routing control,
notarization
pervasive security mechanisms:
● trusted functionality, security labels, event
detection, security audit trails, security
recovery
Model for Network Security
Model for Network Security
using this model requires us to:
1. design a suitable algorithm for the security
transformation
2. generate the secret information (keys) used
by the algorithm
3. develop methods to distribute and share the
secret information
4. specify a protocol enabling the principals to
use the transformation and secret
information for a security service
Model for Network Access
Security
Model for Network Access
Security
using this model requires us to:
1. select appropriate gatekeeper functions to
identify users
2. implement security controls to ensure only
authorised users access designated
information or resources
trusted computer systems may be useful
to help implement this model
Summary
have considered:
● definitions for:
• computer, network, internet security
X.800 standard
security attacks, services, mechanisms
models for network (access) security