ece509 cyber security : concept, theory, and practice cryptography spring 2014

16
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014

Upload: jonas-newman

Post on 30-Dec-2015

217 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014

ECE509 Cyber Security :

Concept, Theory, and Practice

CryptographySpring 2014

Page 2: ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014

Attack Types

• Passive attack: observe communications and/or data

• Active attack: modify communications and/or data

Page 3: ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014

What are the security services in the OSI model?

Page 4: ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014

Security Services in OSI Model

• Physical Layer:

• Data-Link Layer:

• Network Layer:

• Transport Layer:

• Session Layer:

• Presentation Layer:

• Application Layer:

Page 5: ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014

Security Services in OSI Model

• Confidentiality • Integrity

• Authentication

• Access Control

• Non-repudiation

Page 6: ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014

Security Mechanisms to provide the needed security services

• Checksums/hash algorithms: Authorization and Integrity

• Encryption: Confidentiality, Integrity, Authentication

• Digital signatures: Integrity, Authentication, Non-repudiation

Page 7: ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014

Secure Sockets Layer (SSL)

• Mechanisms:– Hashing

• SHA: Secure Hash Algorithm• MD5: Message-Digest algorithm

– Encryptions• DES: Data Encryption Standard• RSA: Ron Rivest, Adi Shamir, and Leonard

Adleman– Signatures

• DSA: Digital Signature Algorithm • RSA: Ron Rivest, Adi Shamir, and Leonard

Adleman

Page 8: ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014

Hash Function

Data Channel

Hashing

MessageHash

Data

Page 9: ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014

MAC (Message Authentication Code)

Data Channel

MAC

Data

ChannelMessage

MAC

Page 10: ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014

Traditional Encryption(Symmetric Encryption)

Common Key

Insecure ChannelData Data

Page 11: ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014

Key Agreement

Key Agreement

Insecure ChannelData Data

Page 12: ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014

Public Key Encryption

Insecure ChannelData Data

Page 13: ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014

Digital Signature

Data

Channel

Hashing

MessageHash

Data

Encrypt Signature Channel Signature

Page 14: ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014

Digital Signature

Data

Signature

Hashing

Decrypt

Compare Message Hash

Page 15: ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014

Message/Data Encryption

Data Data

EncryptedSession

Key

EncryptedSession

KeyChannel

Channel