Lec 1
Lec 1
Applied Cryptography
17022522
-Introduction to Network Security-
Lecture slides by
Dr. Eman Daraghmi
Associate Professor
PTUK
vTechniques
2
Part I: Network Security Definition
3
Background
§ Computer use requires automated tools to protect files and other stored
information. “computer security”
4
????
Computer Security vs. Network Security
5
Definitions
6
Security Goals
7
Security Goals
8
Security Goals
9
Security Goals
10
Part II: Security Attacks, Services and
Mechanisms
11
OSI Security Architecture
12
Security Attack
13
Security Attack
14
Security Attack
15
Security Attack
16
Security Attack
1.21
Passive Attack
vPassive attacks are in the nature of eavesdropping on, or monitoring of,
transmissions. The goal of the opponent is to obtain information that is being
transmitted. A passive attack attempts to learn or make use of information from
the system but does not affect system resources
vPassive attacks are very difficult to detect because they do not involve any
alteration of the data.
vTypically, the message traffic is sent and received in an apparently normal fashion
and neither the sender nor receiver is aware that a third party has read the
messages or observed the traffic pattern.
22
Active Attacks
23
Security Services
24
Security Services
üNonrepudiation, Origin Proof that the message was sent by the specified party.
üNonrepudiation, Destination Proof that the message was received by the
specified party.
26
Security Services
5- Access Control - The prevention of unauthorized use of a resource (i.e., this service
controls who can have access to a resource, under what conditions access can occur, and
what those accessing the resource are allowed to do).
27
Security Mechanisms
28
Security Mechanisms (X.800)
vEncipherment
üThe use of mathematical algorithms to transform data into a form that is not
readily intelligible. The transformation and subsequent recovery of the data
depend on an algorithm and zero or more encryption keys.
vDigital Signature
üData appended to, or a cryptographic transformation of, a data unit that
allows a recipient of the data unit to prove the source and integrity of the
data unit and protect against forgery (e.g., by the recipient).
29
Security Mechanisms (X.800)
vAccess Control
üA variety of mechanisms that enforce access rights to resources.
vData Integrity
üA variety of mechanisms used to assure the integrity of a data unit or stream
of data units.
vAuthentication Exchange
üA mechanism intended to ensure the identity of an entity by means of
information exchange.
30
Security Mechanisms (X.800)
vTraffic Padding
üThe insertion of bits into gaps in a data stream to frustrate traffic analysis
attempts.
vRouting Control
üEnables selection of particular physically secure routes for certain data and
allows routing changes, especially when a breach of security is suspected.
vNotarization
üThe use of a trusted third party to assure certain properties of a data exchange.
31
Relation between Services and Mechanisms
32
Model for Network Security
35
Part IV: Other Techniques
1.36
Cryptography & Steganography
37