CS Lec4
CS Lec4
COMPUTER
SECURITY
Securing communications
Lecture 4
4th stage – (2021-2022)
Dr. Moceheb Lazam Shuwandy
1
COMPUTER SECURITY AND
COMMUNICATIONS
• Securing communications
• Three steps:
▪ Secrecy = prevent understanding of
intercepted communication
▪ Authentication = establish identity of sender
▪ Integrity = establish that communication has
not been changed
2
SECURING COMMUNICATIONS
3
COMMUNICATIONS SECURITY
ISSUES
Internet
Consumer Merchant
(Bob) (Alice)
Impostor
(Darth)
4
ENCRYPTION- TRADITIONAL
CRYPTOGRAPHY
5
CEASAR’S CIPHER: ENCRYPTION
BY SUBSTITUTION
• Substitute for each letter (block of bits)
IBM
HAL
6
PUBLIC-KEY CRYPTOGRAPHY
7
PUBLIC KEY CRYPTOGRAPHY..CON.
8
PUBLIC KEY CRYPTOGRAPHY
WORKS IF…
9
ENCRYPTION IS NOT
ENOUGH: SPOOFS
10
NEEDED: MESSAGE
AUTHENTICATION
11
DIGITAL SIGNATURES
12
PUBLIC KEY MANAGEMENT
13
A CENTRAL KEY DISTRIBUTOR
• Alice asks the distributor for Bob's public key
14
PUBLIC KEY INFRASTRUCTURE
(PKI)
• Certificate Authorities are Trusted Third Parties charged with the
responsibility to generate trusted certificates for requesting
individuals organizations
– Certificates contain the requestors public key and are
digitally signed by the CA
– Before a certificate is issued, CA must verify the identity of the
requestor
15
CERTIFICATES
17
PKI INDUSTRY
• Revenue from
– products (PKI servers for intranets and extranets)
– services (certificate services for individuals and organizations)
18
SUMMARY – PERSONAL
COMMUNICATIONS
4,5
19
APPLICATIONS: ECOMMERCE
SECURITY
• Requirements
– sender and receiver must authenticate each other before
sending any “real” data
– all “real” data must flow encrypted through the network
– no intercepted communication can be used to an
intruder’s advantage
20
SSL / TLS
21
SSL / TLS…CON.
Customer Merchant
Random session key generated by customer
and encrypted with merchant’s public key
23
24