Professional Documents
Culture Documents
Cryptography & Network Security
Cryptography & Network Security
Security
Dakota State University
Distance Education Grant
Dr. Bill Figg
Bill Figg
Introduction
The art of war teaches us to rely not on the
likelihood of the enemy's not coming, but on
our own readiness to receive him; not on
the chance of his not attacking, but rather
on the fact that we have made our position
unassailable.
The Art of War, Sun Tzu
Bill Figg
Security Services
Bill Figg
Bill Figg
Bill Figg
Types of Attacks
Bill Figg
Classical Encryption
Techniques
Many savages at the present day regard their
names as vital parts of themselves, and
therefore take great pains to conceal their
real names, lest these should give to evildisposed persons a handle by which to
injure their owners. The Golden Bough,
Sir James George Frazer
Bill Figg
Symmetric Encryption
Bill Figg
10
Cryptography
can be characterized by:
block / stream
Bill Figg
11
ciphertext only
known plaintext
chosen plaintext
chosen ciphertext
chosen text
Bill Figg
12
Caesar Cipher
13
14
Bill Figg
15
1.
2.
3.
4.
Bill Figg
16
Polyalphabetic Ciphers
Bill Figg
17
One-Time Pad
Bill Figg
18
Transposition Ciphers
19
Bill Figg
20
Steganography
an alternative to encryption
hides existence of message
has drawbacks
Bill Figg
21
Bill Figg
22
Bill Figg
23
24
Differential Cryptanalysis
25
Linear Cryptanalysis
26
27
initial criteria:
security effort to practically cryptanalyse
cost computational
algorithm & implementation characteristics
final criteria
general security
software & hardware implementation ease
implementation attacks
flexibility (in en/decrypt, keying, other factors)
Bill Figg
28
designed to be:
Bill Figg
29
AES Decryption
Bill Figg
30
Bill Figg
31
C = EK3[DK2[EK1[P]]]
32
end-to-end encryption
Bill Figg
33
Placement of Encryption
34
Key Distribution
35
Key Distribution
36
Bill Figg
37
Bill Figg
38
Random Numbers
Bill Figg
39
Private-Key Cryptography
Bill Figg
40
Public-Key Cryptography
Bill Figg
41
Public-Key Cryptography
public-key/two-key/asymmetric cryptography
involves the use of two keys:
is asymmetric because
Bill Figg
42
Public-Key Cryptography
Bill Figg
43
Public-Key Characteristics
Bill Figg
44
Key Management
45
Public-Key Certificates
46
47
Hash Functions
48
Bill Figg
49
Bill Figg
50
51
Authentication Protocols
52
Bill Figg
53
54
Web Security
integrity
confidentiality
denial of service
authentication
Bill Figg
55
56
Bill Figg
57
What is a Firewall?
58
Bill Figg
59
simplest of components
foundation of any firewall system
examine each IP packet (no context) and permit or
deny according to rules
hence restrict access to services (ports)
possible default policies
Bill Figg
60
Firewall Configurations
Bill Figg
61
62
Summary
Bill Figg
63