0% found this document useful (0 votes)
29 views3 pages

Network Security

The document discusses network security and describes five services provided: message confidentiality, message integrity, message authentication, message nonrepudiation, and entity authentication. It then explains how confidentiality can be provided with symmetric-key cryptography and asymmetric-key cryptography.

Uploaded by

hassan IQ
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views3 pages

Network Security

The document discusses network security and describes five services provided: message confidentiality, message integrity, message authentication, message nonrepudiation, and entity authentication. It then explains how confidentiality can be provided with symmetric-key cryptography and asymmetric-key cryptography.

Uploaded by

hassan IQ
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Network Technology Fourth Year

Network Security
Network security can provide five services. Four of these services are related to the
message exchanged using the network. The fifth service provides entity
authentication or identification.

1-Message Confidentiality
The message must be encrypted at the sender site and decrypted at the receiver site.
This can be done using either symmetric-key cryptography or asymmetric-key
cryptography.

2-Message Integrity
Message integrity means that the data must arrive at the receiver exactly as they
were sent. There must be no changes during the transmission. As more and more
monetary exchanges occur over the Internet, integrity is crucial. For example, it
would be disastrous if a request for transferring $100 changed to a request for
$10,000 or $100,000. The integrity of the message must be preserved in a secure
communication.

3-Message Authentication
Message authentication is a service beyond message integrity. In message
authentication the receiver needs to be sure of the sender's identity and that an
imposter has not sent the message.
81
Network Technology Fourth Year

4-Message Nonrepudiation
Message nonrepudiation means that a sender must not be able to deny sending a
message that he or she, in fact, did send. The burden of proof falls on the receiver.
For example, when a customer sends a message to transfer money from one
account to another, the bank must have proof that the customer actually requested
this transaction.

5-Entity Authentication
In entity authentication (or user identification) the entity or user is verified prior to
access to the system resources (files, for example).

Confidentiality with Symmetric-Key Cryptography

To provide confidentiality with symmetric-key cryptography, a sender and a


receiver need to share a secret key. A session key is one that is used only for the
duration of one session. The session key itself is exchanged using asymmetric key
cryptography as we will see later. A session symmetric key for sending confidential
messages from Alice to Bob and vice versa.

82
Network Technology Fourth Year

Confidentiality with Asymmetric-Key Cryptography


Here, there is no key sharing; there is a public announcement. Bob creates two
keys: one private and one public. He keeps the private key for decryption; he
publicly announces the public key to the world. The public key is used only for
encryption; the private key is used only for decryption. The public key locks the
message; the private key unlocks it. For a two-way communication between Alice
and Bob, two pairs of keys are needed. When Alice sends a message to Bob, she
uses Bob's pair; when Bob sends a message to Alice, he uses Alice's pair as:

83

You might also like