This document provides an overview of network security principles including cryptography, authentication, message integrity, and key distribution. It begins with an introduction to network security concepts and then outlines the topics that will be covered, which include principles of cryptography, authentication, integrity, key distribution, access control using firewalls, common attacks, and security at different layers. Examples are provided to illustrate authentication protocols and their vulnerabilities. Digital signatures and message digests are introduced as techniques for authentication and integrity. Symmetric and public key encryption algorithms like DES, AES, RSA are briefly described. The need for trusted intermediaries like key distribution centers and certification authorities is also noted.
The document discusses various topics related to network security including encryption, authentication, and protocols. It provides an overview of symmetric and public key cryptography, algorithms like DES and RSA, digital signatures, protocols like SSL and IPsec, and applications like PGP. Common security threats like packet sniffing, IP spoofing, and denial of service attacks are also summarized.
The document provides an overview of cryptography concepts including secrecy ciphers, secret key cryptography, public key cryptography, digital signatures, and their applications to internet security. It discusses how early ciphers like Caesar cipher could be broken through frequency analysis but were made more secure through techniques like modular exponentiation. It introduces key concepts like Diffie-Hellman key exchange that allow parties to establish a shared secret key over insecure channels and digital signatures to authenticate messages and identities. It also discusses how certification authorities help validate public keys on the internet.
The document discusses several topics in cryptography including classical ciphers, public key cryptography, Diffie-Hellman key exchange, RSA encryption, and cryptographic checksums. Public key cryptography uses two keys - a private key known only to the individual and a public key available to anyone. Diffie-Hellman allows two parties to establish a shared secret key over an insecure channel. RSA relies on the difficulty of factoring large prime numbers to encrypt/decrypt messages using public/private key pairs. Cryptographic checksums like HMAC provide integrity by making it infeasible to alter encrypted data without detection.
Public-key cryptography uses two different but mathematically related keys for encryption and decryption. This allows one key to be public for encryption while keeping the other key secret for decryption. The Diffie-Hellman key exchange protocol allows two parties to establish a shared secret key over an insecure channel without any preexisting secret information. The RSA cryptosystem is an example of a public-key cryptosystem based on the difficulty of factoring large prime numbers."
Public-key cryptography uses two keys, a public key that can be shared widely, and a private key that is kept secret. It allows for both encryption and digital signatures. The most widely used public-key cryptosystem is RSA, which relies on the difficulty of factoring large prime numbers. Diffie-Hellman key exchange allows two parties to securely exchange a secret key over an insecure channel without any prior secrets.
Asymmetric key cryptography uses two keys - a public key that can be shared publicly and a private key that is kept secret. This allows two parties who have never shared secrets before, like Alice and Bob, to communicate securely by encrypting messages with each other's public keys. Common asymmetric algorithms discussed are RSA, which uses prime number factorization, and ECC, which is based on elliptic curve discrete logarithms. A public key infrastructure (PKI) with certificate authorities (CAs) is required to authenticate users and manage public keys.
The document discusses various topics related to network security including encryption, authentication, and protocols. It provides an overview of symmetric and public key cryptography, algorithms like DES and RSA, digital signatures, protocols like SSL and IPsec, and applications like PGP. Common security threats like packet sniffing, IP spoofing, and denial of service attacks are also summarized.
The document provides an overview of cryptography concepts including secrecy ciphers, secret key cryptography, public key cryptography, digital signatures, and their applications to internet security. It discusses how early ciphers like Caesar cipher could be broken through frequency analysis but were made more secure through techniques like modular exponentiation. It introduces key concepts like Diffie-Hellman key exchange that allow parties to establish a shared secret key over insecure channels and digital signatures to authenticate messages and identities. It also discusses how certification authorities help validate public keys on the internet.
The document discusses several topics in cryptography including classical ciphers, public key cryptography, Diffie-Hellman key exchange, RSA encryption, and cryptographic checksums. Public key cryptography uses two keys - a private key known only to the individual and a public key available to anyone. Diffie-Hellman allows two parties to establish a shared secret key over an insecure channel. RSA relies on the difficulty of factoring large prime numbers to encrypt/decrypt messages using public/private key pairs. Cryptographic checksums like HMAC provide integrity by making it infeasible to alter encrypted data without detection.
Public-key cryptography uses two different but mathematically related keys for encryption and decryption. This allows one key to be public for encryption while keeping the other key secret for decryption. The Diffie-Hellman key exchange protocol allows two parties to establish a shared secret key over an insecure channel without any preexisting secret information. The RSA cryptosystem is an example of a public-key cryptosystem based on the difficulty of factoring large prime numbers."
Public-key cryptography uses two keys, a public key that can be shared widely, and a private key that is kept secret. It allows for both encryption and digital signatures. The most widely used public-key cryptosystem is RSA, which relies on the difficulty of factoring large prime numbers. Diffie-Hellman key exchange allows two parties to securely exchange a secret key over an insecure channel without any prior secrets.
Asymmetric key cryptography uses two keys - a public key that can be shared publicly and a private key that is kept secret. This allows two parties who have never shared secrets before, like Alice and Bob, to communicate securely by encrypting messages with each other's public keys. Common asymmetric algorithms discussed are RSA, which uses prime number factorization, and ECC, which is based on elliptic curve discrete logarithms. A public key infrastructure (PKI) with certificate authorities (CAs) is required to authenticate users and manage public keys.
The document discusses public key cryptography and the RSA algorithm. It begins by explaining the basics of public key cryptography, including the use of public and private key pairs. It then goes into more detail about RSA, describing how it works by selecting prime numbers and using modular exponentiation and Fermat's theorem to encrypt and decrypt messages securely. An example of RSA encryption and decryption is provided to illustrate the process.
Bob and Alice want to securely communicate messages between each other over an insecure channel. Cryptography allows them to encrypt messages using public key encryption so that only the intended recipient can decrypt it. The document discusses the basics of public key cryptography including how it works, the RSA algorithm, key generation process, and approaches to attacking public key cryptography like brute force attacks or mathematical attacks like integer factorization to derive the private key.
1) There are two main types of cryptography - symmetric and asymmetric. Symmetric cryptography uses the same key for encryption and decryption while asymmetric uses different public and private keys.
2) Symmetric cryptography has issues with key distribution but is faster, while asymmetric is slower but solves the key distribution problem.
3) Hybrid cryptosystems combine the two approaches by using asymmetric encryption to securely distribute a symmetric key for encrypting messages.
Public key cryptography uses two keys, a public key that can encrypt messages and a private key that decrypts messages. It has six components: plain text, encryption algorithm, public and private keys, ciphertext, and decryption algorithm. Some key characteristics are that it is computationally infeasible to determine the private key from the public key alone, and encryption/decryption is easy when the relevant key is known. The requirements of public key cryptography are that it is easy to generate a public-private key pair, easy to encrypt with the public key, easy for the recipient to decrypt with the private key, and infeasible to determine the private key from the public key or recover the plaintext from the ciphertext and public key alone
The document discusses public key cryptography, digital certificates, and Transport Layer Security (TLS). It provides an overview of symmetric and asymmetric key cryptography, algorithms like RSA and ElGamal, the use of digital signatures and certificates, and how TLS uses public key encryption to securely transmit data over the internet, such as for email.
The presentation include:
-Diffie hellman key exchange algorithm
-Primitive roots
-Discrete logarithm and discrete logarithm problem
-Attacks on diffie hellman and their possible solution
-Key distribution center
Cryptography techniques allow for message confidentiality, authentication, and integrity. Symmetric key cryptography uses a shared secret key where the sender and receiver both know the key. Public key cryptography uses key pairs where one key is public and one is private. RSA is an example of an asymmetric encryption algorithm that uses a public/private key pair based on the difficulty of factoring large numbers. Message integrity is ensured through techniques like digital signatures that authenticate the source and content of messages.
This presentation is based on the paper :
"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems" by R.L. Rivest, A. Shamir, and L. Adleman
This document provides an overview of the RSA algorithm for public-key cryptography. It explains that RSA uses a public key and private key pair, with the public key used for encryption and the private key used for decryption. The security of RSA relies on the difficulty of factoring large prime numbers. It then provides details on how the RSA algorithm works, including choosing two large prime numbers to generate keys, encrypting and decrypting messages, and an example calculation. Potential attacks on RSA like brute force key searching and timing analysis are also summarized.
Public key algorithms like RSA and ElGamal allow for secure encryption without a shared private key. RSA uses a public and private key pair generated from large prime numbers such that a message encrypted with the public key can only be decrypted by the corresponding private key. It is widely used due to its security being based on the difficulty of factoring large numbers, though it is less efficient than symmetric algorithms due to involving modular exponentiation. ElGamal also uses a public/private key approach and its security relies on the discrete logarithm problem.
This document summarizes several public key cryptosystems including the Knapsack cryptosystem, RSA cryptosystem, ElGamal cryptosystem, and elliptic curve cryptography applied to ElGamal. For each cryptosystem, it describes the key generation process, encryption, and decryption algorithms. It also discusses security aspects such as the hard computational problems that the cryptosystems rely on like integer factorization and discrete logarithms. Finally, it provides code examples for implementing some of the cryptosystems in C.
We will discuss the following: RSA Key generation , RSA Encryption , RSA Decryption , A Real World Example, RSA Security.
https://www.youtube.com/watch?v=x7QWJ13dgGs&list=PLKYmvyjH53q13_6aS4VwgXU0Nb_4sjwuf&index=7
Cs8792 cns - Public key cryptosystem (Unit III)ArthyR3
This document provides an overview of public key cryptography and asymmetric key ciphers. It begins with the underlying mathematics including primes, primality testing, factorization, Euler's totient function, Fermat's theorem, and exponentiation. It then discusses asymmetric key ciphers like RSA and Diffie-Hellman key exchange. RSA is described in more detail, including how public and private key pairs are generated using large prime numbers and exponentiation modulo a composite integer. Security relies on the difficulty of factoring large numbers.
RSA is a widely used public-key cryptosystem. It works by generating a public and private key pair. The public key is used for encryption and digital signatures while the private key is used for decryption and signature verification. Key generation involves finding two prime numbers p and q, computing the modulus n as their product, and using these values to calculate the public and private exponents e and d respectively.
This document provides a summary of public key encryption and digital signatures. It begins by reviewing symmetric cryptography and its limitations in key distribution. It then introduces public key encryption, where each party has a public and private key pair. The document outlines the RSA algorithm and how it uses large prime number factorization problems to encrypt and decrypt messages. It also discusses how digital signatures can provide authentication, integrity, and non-repudiation for electronic messages and contracts using public key techniques like RSA.
The document provides an overview of RSA and Diffie-Hellman algorithms. It defines key terms in cryptography like plain text, cipher text, and key. It then describes how RSA works by choosing prime numbers, computing keys, and encrypting/decrypting messages. Diffie-Hellman allows two parties to establish a shared secret key over an insecure channel by agreeing on a modulus and base, and exchanging values while keeping their secret integers private.
Digital Signature Recognition using RSA AlgorithmVinayak Raja
The document provides an overview of the RSA public key encryption algorithm. It discusses how RSA uses a public key and private key pair, with the public key used to encrypt messages and the private key used to decrypt them. The security of RSA relies on the difficulty of factoring the product of two large prime numbers. The document outlines the RSA algorithm steps of key generation, encryption, and decryption. It also discusses RSA applications, standardization, speed, weaknesses, and history.
Public key cryptography uses two keys: a public key to encrypt messages and a private key to decrypt them. The RSA algorithm is based on the difficulty of factoring large prime numbers. It works by having users generate a public/private key pair and publishing their public key. To encrypt a message, the sender uses the recipient's public key. Only the recipient can decrypt with their private key. The security of RSA relies on the computational difficulty of factoring the modulus used to generate the keys.
This document discusses network security concepts including encryption, authentication, and threats. It introduces common network security scenarios involving friends (Alice and Bob) communicating securely while an intruder (Trudy) may intercept or alter messages. Examples of real systems that require security are also given such as web browsers, online banking, and network routers. Common network attacks are then outlined like eavesdropping, spoofing, and denial of service attacks. The document proceeds to explain approaches to network security including symmetric and public key encryption methods. Specific encryption algorithms are described like DES and RSA public key encryption.
The document discusses public key cryptography and the RSA algorithm. It begins by explaining the basics of public key cryptography, including the use of public and private key pairs. It then goes into more detail about RSA, describing how it works by selecting prime numbers and using modular exponentiation and Fermat's theorem to encrypt and decrypt messages securely. An example of RSA encryption and decryption is provided to illustrate the process.
Bob and Alice want to securely communicate messages between each other over an insecure channel. Cryptography allows them to encrypt messages using public key encryption so that only the intended recipient can decrypt it. The document discusses the basics of public key cryptography including how it works, the RSA algorithm, key generation process, and approaches to attacking public key cryptography like brute force attacks or mathematical attacks like integer factorization to derive the private key.
1) There are two main types of cryptography - symmetric and asymmetric. Symmetric cryptography uses the same key for encryption and decryption while asymmetric uses different public and private keys.
2) Symmetric cryptography has issues with key distribution but is faster, while asymmetric is slower but solves the key distribution problem.
3) Hybrid cryptosystems combine the two approaches by using asymmetric encryption to securely distribute a symmetric key for encrypting messages.
Public key cryptography uses two keys, a public key that can encrypt messages and a private key that decrypts messages. It has six components: plain text, encryption algorithm, public and private keys, ciphertext, and decryption algorithm. Some key characteristics are that it is computationally infeasible to determine the private key from the public key alone, and encryption/decryption is easy when the relevant key is known. The requirements of public key cryptography are that it is easy to generate a public-private key pair, easy to encrypt with the public key, easy for the recipient to decrypt with the private key, and infeasible to determine the private key from the public key or recover the plaintext from the ciphertext and public key alone
The document discusses public key cryptography, digital certificates, and Transport Layer Security (TLS). It provides an overview of symmetric and asymmetric key cryptography, algorithms like RSA and ElGamal, the use of digital signatures and certificates, and how TLS uses public key encryption to securely transmit data over the internet, such as for email.
The presentation include:
-Diffie hellman key exchange algorithm
-Primitive roots
-Discrete logarithm and discrete logarithm problem
-Attacks on diffie hellman and their possible solution
-Key distribution center
Cryptography techniques allow for message confidentiality, authentication, and integrity. Symmetric key cryptography uses a shared secret key where the sender and receiver both know the key. Public key cryptography uses key pairs where one key is public and one is private. RSA is an example of an asymmetric encryption algorithm that uses a public/private key pair based on the difficulty of factoring large numbers. Message integrity is ensured through techniques like digital signatures that authenticate the source and content of messages.
This presentation is based on the paper :
"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems" by R.L. Rivest, A. Shamir, and L. Adleman
This document provides an overview of the RSA algorithm for public-key cryptography. It explains that RSA uses a public key and private key pair, with the public key used for encryption and the private key used for decryption. The security of RSA relies on the difficulty of factoring large prime numbers. It then provides details on how the RSA algorithm works, including choosing two large prime numbers to generate keys, encrypting and decrypting messages, and an example calculation. Potential attacks on RSA like brute force key searching and timing analysis are also summarized.
Public key algorithms like RSA and ElGamal allow for secure encryption without a shared private key. RSA uses a public and private key pair generated from large prime numbers such that a message encrypted with the public key can only be decrypted by the corresponding private key. It is widely used due to its security being based on the difficulty of factoring large numbers, though it is less efficient than symmetric algorithms due to involving modular exponentiation. ElGamal also uses a public/private key approach and its security relies on the discrete logarithm problem.
This document summarizes several public key cryptosystems including the Knapsack cryptosystem, RSA cryptosystem, ElGamal cryptosystem, and elliptic curve cryptography applied to ElGamal. For each cryptosystem, it describes the key generation process, encryption, and decryption algorithms. It also discusses security aspects such as the hard computational problems that the cryptosystems rely on like integer factorization and discrete logarithms. Finally, it provides code examples for implementing some of the cryptosystems in C.
We will discuss the following: RSA Key generation , RSA Encryption , RSA Decryption , A Real World Example, RSA Security.
https://www.youtube.com/watch?v=x7QWJ13dgGs&list=PLKYmvyjH53q13_6aS4VwgXU0Nb_4sjwuf&index=7
Cs8792 cns - Public key cryptosystem (Unit III)ArthyR3
This document provides an overview of public key cryptography and asymmetric key ciphers. It begins with the underlying mathematics including primes, primality testing, factorization, Euler's totient function, Fermat's theorem, and exponentiation. It then discusses asymmetric key ciphers like RSA and Diffie-Hellman key exchange. RSA is described in more detail, including how public and private key pairs are generated using large prime numbers and exponentiation modulo a composite integer. Security relies on the difficulty of factoring large numbers.
RSA is a widely used public-key cryptosystem. It works by generating a public and private key pair. The public key is used for encryption and digital signatures while the private key is used for decryption and signature verification. Key generation involves finding two prime numbers p and q, computing the modulus n as their product, and using these values to calculate the public and private exponents e and d respectively.
This document provides a summary of public key encryption and digital signatures. It begins by reviewing symmetric cryptography and its limitations in key distribution. It then introduces public key encryption, where each party has a public and private key pair. The document outlines the RSA algorithm and how it uses large prime number factorization problems to encrypt and decrypt messages. It also discusses how digital signatures can provide authentication, integrity, and non-repudiation for electronic messages and contracts using public key techniques like RSA.
The document provides an overview of RSA and Diffie-Hellman algorithms. It defines key terms in cryptography like plain text, cipher text, and key. It then describes how RSA works by choosing prime numbers, computing keys, and encrypting/decrypting messages. Diffie-Hellman allows two parties to establish a shared secret key over an insecure channel by agreeing on a modulus and base, and exchanging values while keeping their secret integers private.
Digital Signature Recognition using RSA AlgorithmVinayak Raja
The document provides an overview of the RSA public key encryption algorithm. It discusses how RSA uses a public key and private key pair, with the public key used to encrypt messages and the private key used to decrypt them. The security of RSA relies on the difficulty of factoring the product of two large prime numbers. The document outlines the RSA algorithm steps of key generation, encryption, and decryption. It also discusses RSA applications, standardization, speed, weaknesses, and history.
Public key cryptography uses two keys: a public key to encrypt messages and a private key to decrypt them. The RSA algorithm is based on the difficulty of factoring large prime numbers. It works by having users generate a public/private key pair and publishing their public key. To encrypt a message, the sender uses the recipient's public key. Only the recipient can decrypt with their private key. The security of RSA relies on the computational difficulty of factoring the modulus used to generate the keys.
This document discusses network security concepts including encryption, authentication, and threats. It introduces common network security scenarios involving friends (Alice and Bob) communicating securely while an intruder (Trudy) may intercept or alter messages. Examples of real systems that require security are also given such as web browsers, online banking, and network routers. Common network attacks are then outlined like eavesdropping, spoofing, and denial of service attacks. The document proceeds to explain approaches to network security including symmetric and public key encryption methods. Specific encryption algorithms are described like DES and RSA public key encryption.
The document discusses network security principles such as cryptography, authentication, and message integrity. It explains symmetric key cryptography where senders and receivers share the same key, and public key cryptography where users have a public key for encrypting messages and a private key for decrypting. The document also outlines common attacks like eavesdropping, message insertion, and denial of service and how techniques like encryption, firewalls, and access control can help address security threats.
Module 6
Advanced Networking
Security problems with internet architecture, Introduction to Software defined networking, Working of SDN, SDN in data centre, SDN applications, Data centre networking, IoT.
The document summarizes key concepts in network security including cryptography, authentication, integrity, and access control. It discusses principles like confidentiality, authentication, and integrity. It introduces common examples of Alice, Bob, and Trudy to illustrate security concepts and the need to protect against eavesdropping, impersonation, message alteration, and denial of service attacks. Symmetric and public key cryptography algorithms are overviewed including DES, AES, and RSA.
Transport Layer Security (TLS) is a cryptographic protocol that provides secure communication over the internet. It evolved from the Secure Sockets Layer (SSL) protocol. TLS allows for server authentication through X.509 certificates signed by a trusted certificate authority. It also enables optional client authentication and negotiation of encryption algorithms and cryptographic keys to establish an encrypted connection. This ensures confidentiality, integrity, and authentication of data transmitted over the insecure network.
Secure Communication (Distributed computing)Sri Prasanna
The document discusses secure communication and digital signatures. It begins by explaining symmetric cryptography and the key distribution problem. It then describes Diffie-Hellman key exchange, which allows two parties to agree on a secret key over an insecure channel without pre-shared secrets. It also covers RSA public key cryptography. The document discusses using hybrid cryptosystems that combine public key techniques for key exchange and symmetric encryption for bulk data. Finally, it explains how digital signatures using public key cryptography allow a message to be authenticated and integrity protected without encryption.
This document discusses public key cryptography and the RSA algorithm. RSA allows two parties to communicate securely without having to share a secret key beforehand. It works by having each party generate both a public and private key. The public key can be used to encrypt messages, while only the private key can decrypt them. RSA relies on the difficulty of factoring large numbers to be secure. The document provides an example of how RSA key generation and encryption/decryption work in practice.
The document provides an introduction to cryptography, including definitions of key terms, goals of cryptography like encryption and authentication, and descriptions of common cryptographic techniques. It summarizes symmetric key encryption where a shared secret key is used for both encryption and decryption, public key encryption using key pairs, digital signatures to authenticate messages, and how public key encryption and signatures can be combined. It also discusses cryptographic attacks, Kerckhoffs' principle of secrecy depending on the key not the algorithm, provable security, block ciphers like AES and DES, encryption modes, stream ciphers, hash functions, message authentication codes, key exchange methods like Diffie-Hellman, and public key cryptosystems like RSA and ElGamal
The document provides an introduction to cryptography, including definitions of key terms, goals of cryptography like encryption and authentication, and descriptions of common cryptographic techniques. It summarizes symmetric key encryption where a shared secret key is used for both encryption and decryption, public key encryption using key pairs, digital signatures to authenticate messages, and how public key encryption and signatures can be combined. It also discusses cryptographic attacks, Kerckhoffs' principle of secrecy depending on the key not the algorithm, provable security, block ciphers like AES and DES, encryption modes, stream ciphers, hash functions, message authentication codes, key exchange methods like Diffie-Hellman, and public key cryptosystems like RSA and ElGamal
This document provides an introduction to cryptography. It defines key terms like cryptography, cryptanalysis, and cryptology. It describes the goals of encryption and authentication. It explains symmetric key cryptography where a shared secret key is used for both encryption and decryption. It also covers public key cryptography using key pairs, digital signatures to provide authentication, and how public key encryption and signatures can be combined. It discusses cryptographic attacks and the importance of Kerckhoffs' principle. It provides an overview of common cryptographic algorithms like block ciphers, stream ciphers, hash functions, and key exchange methods. It also discusses concepts like encryption modes, password hashing, random number generation, and the security of algorithms like RSA and Diffie-
introduction to cryptography (basics of it)neonaveen
This document provides an introduction to cryptography. It defines key terms like cryptography, cryptanalysis, and cryptology. It describes the goals of encryption and authentication. It explains symmetric key cryptography where a shared secret key is used for both encryption and decryption. It also covers public key cryptography using key pairs, digital signatures to provide authentication, and how public key encryption and signatures can be combined. It discusses cryptographic attacks and the importance of Kerckhoffs' principle. It provides an overview of common cryptographic algorithms like block ciphers, stream ciphers, hash functions, and key exchange methods. It also discusses concepts like encryption modes, password hashing, random number generation, and the security of algorithms like RSA and Diffie-
Asymmetric key cryptography uses two keys - a public key that can be shared publicly and a private key that is kept secret. This allows two parties who have never shared secrets before, like Alice and Bob, to communicate securely by encrypting messages with each other's public keys. Common asymmetric algorithms include RSA, which uses prime number factorization, and ECC, which is based on elliptic curve discrete logarithms. Certificate authorities issue digital certificates that bind public keys to identities to facilitate trust in public key infrastructures.
This document provides an introduction to cryptography. It defines key terms like cryptography, cryptanalysis, and cryptology. It describes the goals of encryption and authentication. It explains symmetric key cryptography where a shared secret key is used for both encryption and decryption. It also covers public key cryptography using key pairs, digital signatures to authenticate identity, and how public key encryption and signatures can be combined. The document discusses cryptographic attacks and principles like Kerckhoff's principle and provable security. It provides examples of cryptographic algorithms like block ciphers, stream ciphers, hash functions, and key exchange protocols.
The document discusses cryptography and the RSA encryption algorithm. It begins with an introduction to cryptography and its uses. It then covers the history of cryptography, common security issues, and different cryptographic techniques like symmetric and asymmetric encryption. The document focuses on explaining the RSA algorithm, how it works using public and private keys, and why factoring large numbers makes RSA secure. It provides an overview of the key aspects of cryptography and the RSA algorithm.
The document discusses network security and introduces concepts like cryptography, authentication, and message integrity. It notes that network security aims to ensure confidentiality, authentication, and access for legitimate users while preventing attacks from unauthorized parties. The chapter will cover principles of cryptography, security protocols for different layers, and operational security measures like firewalls and intrusion detection systems. Users are asked to cite the source if using the slides and to respect the authors' copyright.
This document discusses the use and sharing of PowerPoint slides from a textbook on computer networking. It allows the slides to be modified and used for educational purposes with only two requirements: 1) Cite the source if using the slides substantially unaltered, and 2) Note the copyright if posting slides substantially unaltered online. The document is copyrighted by the authors of the textbook from 1996-2007.
The document discusses network security and introduces concepts like cryptography, authentication, and message integrity. It notes that network security aims to ensure confidentiality, authentication, and access to services. Cryptography uses techniques like encryption, digital signatures, and hash functions to provide these security properties. The document provides examples to illustrate symmetric and public key cryptography, including how algorithms like DES, AES, RSA and hash functions work. It also introduces common network security examples like Alice, Bob and the intruder Trudy.
Discovery of An Apparent Red, High-Velocity Type Ia Supernova at 𝐳 = 2.9 wi...Sérgio Sacani
We present the JWST discovery of SN 2023adsy, a transient object located in a host galaxy JADES-GS
+
53.13485
−
27.82088
with a host spectroscopic redshift of
2.903
±
0.007
. The transient was identified in deep James Webb Space Telescope (JWST)/NIRCam imaging from the JWST Advanced Deep Extragalactic Survey (JADES) program. Photometric and spectroscopic followup with NIRCam and NIRSpec, respectively, confirm the redshift and yield UV-NIR light-curve, NIR color, and spectroscopic information all consistent with a Type Ia classification. Despite its classification as a likely SN Ia, SN 2023adsy is both fairly red (
�
(
�
−
�
)
∼
0.9
) despite a host galaxy with low-extinction and has a high Ca II velocity (
19
,
000
±
2
,
000
km/s) compared to the general population of SNe Ia. While these characteristics are consistent with some Ca-rich SNe Ia, particularly SN 2016hnk, SN 2023adsy is intrinsically brighter than the low-
�
Ca-rich population. Although such an object is too red for any low-
�
cosmological sample, we apply a fiducial standardization approach to SN 2023adsy and find that the SN 2023adsy luminosity distance measurement is in excellent agreement (
≲
1
�
) with
Λ
CDM. Therefore unlike low-
�
Ca-rich SNe Ia, SN 2023adsy is standardizable and gives no indication that SN Ia standardized luminosities change significantly with redshift. A larger sample of distant SNe Ia is required to determine if SN Ia population characteristics at high-
�
truly diverge from their low-
�
counterparts, and to confirm that standardized luminosities nevertheless remain constant with redshift.
The cost of acquiring information by natural selectionCarl Bergstrom
This is a short talk that I gave at the Banff International Research Station workshop on Modeling and Theory in Population Biology. The idea is to try to understand how the burden of natural selection relates to the amount of information that selection puts into the genome.
It's based on the first part of this research paper:
The cost of information acquisition by natural selection
Ryan Seamus McGee, Olivia Kosterlitz, Artem Kaznatcheev, Benjamin Kerr, Carl T. Bergstrom
bioRxiv 2022.07.02.498577; doi: https://doi.org/10.1101/2022.07.02.498577
Evidence of Jet Activity from the Secondary Black Hole in the OJ 287 Binary S...Sérgio Sacani
Wereport the study of a huge optical intraday flare on 2021 November 12 at 2 a.m. UT in the blazar OJ287. In the binary black hole model, it is associated with an impact of the secondary black hole on the accretion disk of the primary. Our multifrequency observing campaign was set up to search for such a signature of the impact based on a prediction made 8 yr earlier. The first I-band results of the flare have already been reported by Kishore et al. (2024). Here we combine these data with our monitoring in the R-band. There is a big change in the R–I spectral index by 1.0 ±0.1 between the normal background and the flare, suggesting a new component of radiation. The polarization variation during the rise of the flare suggests the same. The limits on the source size place it most reasonably in the jet of the secondary BH. We then ask why we have not seen this phenomenon before. We show that OJ287 was never before observed with sufficient sensitivity on the night when the flare should have happened according to the binary model. We also study the probability that this flare is just an oversized example of intraday variability using the Krakow data set of intense monitoring between 2015 and 2023. We find that the occurrence of a flare of this size and rapidity is unlikely. In machine-readable Tables 1 and 2, we give the full orbit-linked historical light curve of OJ287 as well as the dense monitoring sample of Krakow.
Sexuality - Issues, Attitude and Behaviour - Applied Social Psychology - Psyc...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
Travis Hills of MN is Making Clean Water Accessible to All Through High Flux ...Travis Hills MN
By harnessing the power of High Flux Vacuum Membrane Distillation, Travis Hills from MN envisions a future where clean and safe drinking water is accessible to all, regardless of geographical location or economic status.
(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...Scintica Instrumentation
Targeting Hsp90 and its pathogen Orthologs with Tethered Inhibitors as a Diagnostic and Therapeutic Strategy for cancer and infectious diseases with Dr. Timothy Haystead.
Mending Clothing to Support Sustainable Fashion_CIMaR 2024.pdfSelcen Ozturkcan
Ozturkcan, S., Berndt, A., & Angelakis, A. (2024). Mending clothing to support sustainable fashion. Presented at the 31st Annual Conference by the Consortium for International Marketing Research (CIMaR), 10-13 Jun 2024, University of Gävle, Sweden.
PPT on Direct Seeded Rice presented at the three-day 'Training and Validation Workshop on Modules of Climate Smart Agriculture (CSA) Technologies in South Asia' workshop on April 22, 2024.
Microbial interaction
Microorganisms interacts with each other and can be physically associated with another organisms in a variety of ways.
One organism can be located on the surface of another organism as an ectobiont or located within another organism as endobiont.
Microbial interaction may be positive such as mutualism, proto-cooperation, commensalism or may be negative such as parasitism, predation or competition
Types of microbial interaction
Positive interaction: mutualism, proto-cooperation, commensalism
Negative interaction: Ammensalism (antagonism), parasitism, predation, competition
I. Mutualism:
It is defined as the relationship in which each organism in interaction gets benefits from association. It is an obligatory relationship in which mutualist and host are metabolically dependent on each other.
Mutualistic relationship is very specific where one member of association cannot be replaced by another species.
Mutualism require close physical contact between interacting organisms.
Relationship of mutualism allows organisms to exist in habitat that could not occupied by either species alone.
Mutualistic relationship between organisms allows them to act as a single organism.
Examples of mutualism:
i. Lichens:
Lichens are excellent example of mutualism.
They are the association of specific fungi and certain genus of algae. In lichen, fungal partner is called mycobiont and algal partner is called
II. Syntrophism:
It is an association in which the growth of one organism either depends on or improved by the substrate provided by another organism.
In syntrophism both organism in association gets benefits.
Compound A
Utilized by population 1
Compound B
Utilized by population 2
Compound C
utilized by both Population 1+2
Products
In this theoretical example of syntrophism, population 1 is able to utilize and metabolize compound A, forming compound B but cannot metabolize beyond compound B without co-operation of population 2. Population 2is unable to utilize compound A but it can metabolize compound B forming compound C. Then both population 1 and 2 are able to carry out metabolic reaction which leads to formation of end product that neither population could produce alone.
Examples of syntrophism:
i. Methanogenic ecosystem in sludge digester
Methane produced by methanogenic bacteria depends upon interspecies hydrogen transfer by other fermentative bacteria.
Anaerobic fermentative bacteria generate CO2 and H2 utilizing carbohydrates which is then utilized by methanogenic bacteria (Methanobacter) to produce methane.
ii. Lactobacillus arobinosus and Enterococcus faecalis:
In the minimal media, Lactobacillus arobinosus and Enterococcus faecalis are able to grow together but not alone.
The synergistic relationship between E. faecalis and L. arobinosus occurs in which E. faecalis require folic acid
When I was asked to give a companion lecture in support of ‘The Philosophy of Science’ (https://shorturl.at/4pUXz) I decided not to walk through the detail of the many methodologies in order of use. Instead, I chose to employ a long standing, and ongoing, scientific development as an exemplar. And so, I chose the ever evolving story of Thermodynamics as a scientific investigation at its best.
Conducted over a period of >200 years, Thermodynamics R&D, and application, benefitted from the highest levels of professionalism, collaboration, and technical thoroughness. New layers of application, methodology, and practice were made possible by the progressive advance of technology. In turn, this has seen measurement and modelling accuracy continually improved at a micro and macro level.
Perhaps most importantly, Thermodynamics rapidly became a primary tool in the advance of applied science/engineering/technology, spanning micro-tech, to aerospace and cosmology. I can think of no better a story to illustrate the breadth of scientific methodologies and applications at their best.
Authoring a personal GPT for your research and practice: How we created the Q...Leonel Morgado
Thematic analysis in qualitative research is a time-consuming and systematic task, typically done using teams. Team members must ground their activities on common understandings of the major concepts underlying the thematic analysis, and define criteria for its development. However, conceptual misunderstandings, equivocations, and lack of adherence to criteria are challenges to the quality and speed of this process. Given the distributed and uncertain nature of this process, we wondered if the tasks in thematic analysis could be supported by readily available artificial intelligence chatbots. Our early efforts point to potential benefits: not just saving time in the coding process but better adherence to criteria and grounding, by increasing triangulation between humans and artificial intelligence. This tutorial will provide a description and demonstration of the process we followed, as two academic researchers, to develop a custom ChatGPT to assist with qualitative coding in the thematic data analysis process of immersive learning accounts in a survey of the academic literature: QUAL-E Immersive Learning Thematic Analysis Helper. In the hands-on time, participants will try out QUAL-E and develop their ideas for their own qualitative coding ChatGPT. Participants that have the paid ChatGPT Plus subscription can create a draft of their assistants. The organizers will provide course materials and slide deck that participants will be able to utilize to continue development of their custom GPT. The paid subscription to ChatGPT Plus is not required to participate in this workshop, just for trying out personal GPTs during it.
Candidate young stellar objects in the S-cluster: Kinematic analysis of a sub...Sérgio Sacani
Context. The observation of several L-band emission sources in the S cluster has led to a rich discussion of their nature. However, a definitive answer to the classification of the dusty objects requires an explanation for the detection of compact Doppler-shifted Brγ emission. The ionized hydrogen in combination with the observation of mid-infrared L-band continuum emission suggests that most of these sources are embedded in a dusty envelope. These embedded sources are part of the S-cluster, and their relationship to the S-stars is still under debate. To date, the question of the origin of these two populations has been vague, although all explanations favor migration processes for the individual cluster members. Aims. This work revisits the S-cluster and its dusty members orbiting the supermassive black hole SgrA* on bound Keplerian orbits from a kinematic perspective. The aim is to explore the Keplerian parameters for patterns that might imply a nonrandom distribution of the sample. Additionally, various analytical aspects are considered to address the nature of the dusty sources. Methods. Based on the photometric analysis, we estimated the individual H−K and K−L colors for the source sample and compared the results to known cluster members. The classification revealed a noticeable contrast between the S-stars and the dusty sources. To fit the flux-density distribution, we utilized the radiative transfer code HYPERION and implemented a young stellar object Class I model. We obtained the position angle from the Keplerian fit results; additionally, we analyzed the distribution of the inclinations and the longitudes of the ascending node. Results. The colors of the dusty sources suggest a stellar nature consistent with the spectral energy distribution in the near and midinfrared domains. Furthermore, the evaporation timescales of dusty and gaseous clumps in the vicinity of SgrA* are much shorter ( 2yr) than the epochs covered by the observations (≈15yr). In addition to the strong evidence for the stellar classification of the D-sources, we also find a clear disk-like pattern following the arrangements of S-stars proposed in the literature. Furthermore, we find a global intrinsic inclination for all dusty sources of 60 ± 20◦, implying a common formation process. Conclusions. The pattern of the dusty sources manifested in the distribution of the position angles, inclinations, and longitudes of the ascending node strongly suggests two different scenarios: the main-sequence stars and the dusty stellar S-cluster sources share a common formation history or migrated with a similar formation channel in the vicinity of SgrA*. Alternatively, the gravitational influence of SgrA* in combination with a massive perturber, such as a putative intermediate mass black hole in the IRS 13 cluster, forces the dusty objects and S-stars to follow a particular orbital arrangement. Key words. stars: black holes– stars: formation– Galaxy: center– galaxies: star formation
Immersive Learning That Works: Research Grounding and Paths ForwardLeonel Morgado
We will metaverse into the essence of immersive learning, into its three dimensions and conceptual models. This approach encompasses elements from teaching methodologies to social involvement, through organizational concerns and technologies. Challenging the perception of learning as knowledge transfer, we introduce a 'Uses, Practices & Strategies' model operationalized by the 'Immersive Learning Brain' and ‘Immersion Cube’ frameworks. This approach offers a comprehensive guide through the intricacies of immersive educational experiences and spotlighting research frontiers, along the immersion dimensions of system, narrative, and agency. Our discourse extends to stakeholders beyond the academic sphere, addressing the interests of technologists, instructional designers, and policymakers. We span various contexts, from formal education to organizational transformation to the new horizon of an AI-pervasive society. This keynote aims to unite the iLRN community in a collaborative journey towards a future where immersive learning research and practice coalesce, paving the way for innovative educational research and practice landscapes.
2. 2
Network Security
understand principles of network security:
cryptography and its many uses beyond
“confidentiality”
authentication
message integrity
key distribution
security in practice:
firewalls
security in application, transport, network, link layers
3. 3
roadmap
1 .What is network security?
2. Principles of cryptography
3. Authentication
4 .Integrity
5. Key Distribution and certification
6. Access control: firewalls
7. Attacks and counter measures
8.Security in many layers
4. 4
What is network security?
Confidentiality: only sender, intended receiver should
“understand” message contents
sender encrypts message
receiver decrypts message
Authentication: sender, receiver want to confirm identity
of each other
Message Integrity: sender, receiver want to ensure
message not altered (in transit, or afterwards) without
detection
Access and Availability: services must be accessible
and available to users
5. 5
Friends and enemies: Alice, Bob, Trudy
well-known in network security world
Bob, Alice (lovers!) want to communicate “securely”
Trudy (intruder) may intercept, delete, add messages
secure
sender
secure
receiver
channel data, control
messages
data data
Alice Bob
Trudy
6. 6
Who might Bob, Alice be?
… well, real-life Bobs and Alices!
Web browser/server for electronic
transactions (e.g., on-line purchases)
on-line banking client/server
DNS servers
routers exchanging routing table updates
7. 7
There are bad guys (and girls) out there!
Q: What can a “bad guy” do?
A: a lot!
eavesdrop: intercept messages
actively insert messages into connection
impersonation: can fake (spoof) source address in
packet (or any field in packet)
hijacking: “take over” ongoing connection by
removing sender or receiver, inserting himself in
place
denial of service: prevent service from being used
by others (e.g., by overloading resources)
more on this later ……
8. 8
The language of cryptography
symmetric key crypto: sender, receiver keys identical
public-key crypto: encryption key public, decryption key
secret (private)
plaintext plaintext
ciphertext
K
A
encryption
algorithm
decryption
algorithm
Alice’s
encryption
key
Bob’s
decryption
key
K
B
9. 9
Symmetric key cryptography
substitution cipher: substituting one thing for another
monoalphabetic cipher: substitute one letter for another
plaintext: abcdefghijklmnopqrstuvwxyz
ciphertext: mnbvcxzasdfghjklpoiuytrewq
Plaintext: bob. i love you. alice
ciphertext: nkn. s gktc wky. mgsbc
E.g.:
Q: How hard it is to break this simple cipher?:
brute force (depends on guess ,algorithms and
It is time taking too )
10. 10
Symmetric key cryptography
symmetric key crypto: Bob and Alice share know same
(symmetric) key: K
e.g., key is knowing substitution pattern in mono
alphabetic substitution cipher
plaintext
ciphertext
KA-B
encryption
algorithm
decryption
algorithm
A-B
KA-B
plaintext
message, m
K (m)
A-B
K (m)
A-B
m = K ( )
A-B
11. 11
Symmetric key crypto: DES
DES: Data Encryption Standard
US encryption standard [NIST 1993]
56-bit symmetric key, 64-bit plaintext input
How secure is DES?
DES Challenge: 56-bit-key-encrypted phrase (“Strong
cryptography makes the world a safer place”)
decrypted (brute force) in 4 months
no known “backdoor” decryption approach
making DES more secure:
use three keys sequentially (3-DES) on each datum
use cipher-block chaining
12. 12
Symmetric key
crypto: DES
initial permutation
16 identical “rounds” of
function application,
each using different
48 bits of key
final permutation
DES operation
13. 13
AES: Advanced Encryption Standard
new (Nov. 2001) symmetric-key NIST
standard, replacing DES
processes data in 128 bit blocks
128, 192, or 256 bit keys
brute force decryption (try each key) taking 1
sec on DES, takes 149 trillion years for AES
14. 14
Public Key Cryptography
symmetric key crypto
requires sender,
receiver know shared
secret key
Q: how to agree on key
in first place
(particularly if never
“met”)?
public key cryptography
radically different
approach [Diffie-
Hellman76, RSA78]
sender, receiver do
not share secret key
public encryption key
known to all
private decryption
key known only to
receiver
15. 15
Public key cryptography
plaintext
message, m
ciphertext
encryption
algorithm
decryption
algorithm
Bob’s public
key
plaintext
message
K (m)
B
+
K
B
+
Bob’s private
key
K
B
-
m = K (K (m))
B
+
B
-
16. 16
Public key encryption algorithms
need K ( ) and K ( ) such that
B B
. .
given public key K , it should be
impossible to compute private
key K B
B
Requirements:
1
2
RSA: Rivest, Shamir, Adelson algorithm
+ -
K (K (m)) = m
B
B
- +
+
-
17. 17
RSA: Choosing keys
1. Choose two large prime numbers p, q.
(e.g., 1024 bits each)
2. Compute n = pq, z = (p-1)(q-1)
3. Choose e (with e<n) that has no common factors
with z. (e, z are “relatively prime”).
4. Choose d such that ed-1 is exactly divisible by z.
(in other words: ed mod z = 1 ).
5. Public key is (n,e). Private key is (n,d).
KB
+
KB
-
18. 18
RSA: Encryption, decryption
0. Given (n,e) and (n,d) as computed above
1. To encrypt bit pattern, m, compute
c = m mod n
e (i.e., remainder when m is divided by n)
e
2. To decrypt received bit pattern, c, compute
m = c mod n
d (i.e., remainder when c is divided by n)
d
m = (m mod n)
e mod n
d
Magic
happens!
c
19. 19
RSA example:
Bob chooses p=5, q=7. Then n=35, z=24.
e=5 (so e, z relatively prime).
d=29 (so ed-1 exactly divisible by z.
letter m me c = m mod n
e
l 12 1524832 17
c m = c mod n
d
17 481968572106750915091411825223071697 12
c
d
letter
l
encrypt:
decrypt:
20. 20
RSA: Why is that m = (m mod n)
e mod n
d
(m mod n)
e
mod n = m mod n
d ed
Useful number theory result: If p,q prime and
n = pq, then:
x mod n = x mod n
y y mod (p-1)(q-1)
= m mod n
ed mod (p-1)(q-1)
= m mod n
1
= m
(using number theory result above)
(since we chose ed to be divisible by
(p-1)(q-1) with remainder 1 )
21. 21
RSA: another important property
The following property will be very useful later:
K (K (m)) = m
B
B
- +
K (K (m))
B
B
+ -
=
use public key
first, followed
by private key
use private key
first, followed
by public key
Result is the same!
22. 22
Authentication
Goal: Bob wants Alice to “prove” her identity to
him
Protocol ap1.0: Alice says “I am Alice”
Failure scenario??
“I am Alice”
23. 23
Authentication
Goal: Bob wants Alice to “prove” her identity to
him
Protocol ap1.0: Alice says “I am Alice”
in a network,
Bob can not “see”
Alice, so Trudy simply
declares
herself to be Alice
“I am Alice”
24. 24
Authentication: another try
Protocol ap2.0: Alice says “I am Alice” in an IP packet
containing her source IP address
Failure scenario??
“I am Alice”
Alice’s
IP address
25. 25
Authentication: another try
Protocol ap2.0: Alice says “I am Alice” in an IP packet
containing her source IP address
Trudy can create
a packet
“spoofing”
Alice’s address
“I am Alice”
Alice’s
IP address
26. 26
Authentication: another try
Protocol ap3.0: Alice says “I am Alice” and sends her
secret password to “prove” it.
Failure scenario??
“I’m Alice”
Alice’s
IP addr
Alice’s
password
OK
Alice’s
IP addr
27. 27
Authentication: another try
Protocol ap3.0: Alice says “I am Alice” and sends her
secret password to “prove” it.
playback attack: Trudy
records Alice’s packet
and later
plays it back to Bob
“I’m Alice”
Alice’s
IP addr
Alice’s
password
OK
Alice’s
IP addr
“I’m Alice”
Alice’s
IP addr
Alice’s
password
28. 28
Authentication: yet another try
Protocol ap3.1: Alice says “I am Alice” and sends her
encrypted secret password to “prove” it.
Failure scenario??
“I’m Alice”
Alice’s
IP addr
encrypted
password
OK
Alice’s
IP addr
29. 29
Authentication: another try
Protocol ap3.1: Alice says “I am Alice” and sends her
encrypted secret password to “prove” it.
record
and
playback
still works!
“I’m Alice”
Alice’s
IP addr
encrypted
password
OK
Alice’s
IP addr
“I’m Alice”
Alice’s
IP addr
encrypted
password
30. 30
Authentication: yet another try
Goal: avoid playback attack
Failures, drawbacks?
Nonce: number (R) used only once –in-a-lifetime
ap4.0: to prove Alice “live”, Bob sends Alice nonce, R. Alice
must return R, encrypted with shared secret key
“I am Alice”
R
K (R)
A-B
Alice is live, and
only Alice knows
key to encrypt
nonce, so it must
be Alice!
31. 31
Authentication: ap5.0
ap4.0 requires shared symmetric key
can we authenticate using public key techniques?
ap5.0: use nonce, public key cryptography
“I am Alice”
R
Bob computes
K (R)
A
-
“send me your public key”
KA
+
(K (R)) = R
A
-
KA
+
and knows only Alice
could have the private
key, that encrypted R
such that
(K (R)) = R
A
-
K
A
+
32. 32
ap5.0: security hole
Man (woman) in the middle attack: Trudy poses as
Alice (to Bob) and as Bob (to Alice)
I am Alice I am Alice
R
T
K (R)
-
Send me your public key
T
K
+
A
K (R)
-
Send me your public key
A
K
+
T
K (m)
+
T
m = K (K (m))
+
T
-
Trudy gets
sends m to Alice
encrypted with
Alice’s public key
A
K (m)
+
A
m = K (K (m))
+
A
-
R
33. 33
ap5.0: security hole
Man (woman) in the middle attack: Trudy poses as
Alice (to Bob) and as Bob (to Alice)
Difficult to detect:
Bob receives everything that Alice sends, and vice
versa. (e.g., so Bob, Alice can meet one week later and
recall conversation)
problem is that Trudy receives all messages as well!
34. 34
Digital Signatures
Cryptographic technique analogous to hand-
written signatures.
sender (Bob) digitally signs document, establishing
he is document owner/creator.
verifiable, nonforgeable: recipient (Alice) can prove
to someone that Bob, and no one else (including
Alice), must have signed document
35. 35
Digital Signatures
Simple digital signature for message m:
Bob signs m by encrypting with his private key KB,
creating “signed” message, KB(m)
-
-
Dear Alice
Oh, how I have missed
you. I think of you all the
time! …(blah blah blah)
Bob
Bob’s message, m
Public key
encryption
algorithm
Bob’s private
key
KB
-
Bob’s message, m,
signed (encrypted)
with his private key
KB
-
(m)
36. 36
Digital Signatures (more)
Suppose Alice receives msg m, digital signature KB(m)
Alice verifies m signed by Bob by applying Bob’s public
key KB to KB(m) then checks KB(KB(m) ) = m.
If KB(KB(m) ) = m, whoever signed m must have used
Bob’s private key.
+ +
-
-
- -
+
Alice thus verifies that:
Bob signed m.
No one else signed m.
Bob signed m and not m’.
Non-repudiation:
Alice can take m, and signature KB(m) to
court and prove that Bob signed m.
-
37. 37
Message Digests
Computationally expensive
to public-key-encrypt
long messages
Goal: fixed-length, easy-
to-compute digital
“fingerprint”
apply hash function H to
m, get fixed size
message digest, H(m).
Hash function properties:
many-to-1
produces fixed-size msg
digest (fingerprint)
given message digest x,
computationally infeasible
to find m such that x =
H(m)
large
message
m
H: Hash
Function
H(m)
38. 38
Internet checksum: poor crypto hash
function
Internet checksum has some properties of hash function:
produces fixed length digest (16-bit sum) of message
is many-to-one
But given message with given hash value, it is easy to find
another message with same hash value:
I O U 1
0 0 . 9
9 B O B
49 4F 55 31
30 30 2E 39
39 42 D2 42
message ASCII format
B2 C1 D2 AC
I O U 9
0 0 . 1
9 B O B
49 4F 55 39
30 30 2E 31
39 42 D2 42
message ASCII format
B2 C1 D2 AC
different messages
but identical checksums!
39. 39
large
message
m
H: Hash
function H(m)
digital
signature
(encrypt)
Bob’s
private
key KB
-
+
Bob sends digitally signed
message:
Alice verifies signature and
integrity of digitally signed
message:
KB(H(m))
-
encrypted
msg digest
KB(H(m))
-
encrypted
msg digest
large
message
m
H: Hash
function
H(m)
digital
signature
(decrypt)
H(m)
Bob’s
public
key KB
+
equal
?
Digital signature = signed message digest
40. 40
Hash Function Algorithms
MD5 hash function widely used (RFC 1321)
computes 128-bit message digest in 4-step process.
arbitrary 128-bit string x, appears difficult to construct
msg m whose MD5 hash is equal to x.
SHA-1 is also used.
US standard [NIST, FIPS PUB 180-1]
160-bit message digest
41. 41
Trusted Intermediaries
Symmetric key problem:
How do two entities
establish shared secret key
over network?
Solution:
trusted key distribution
center (KDC) acting as
intermediary between
entities
Public key problem:
When Alice obtains
Bob’s public key (from
web site, e-mail,
diskette), how does she
know it is Bob’s public
key, not Trudy’s?
Solution:
trusted certification
authority (CA)
42. 42
Key Distribution Center (KDC)
Alice, Bob need shared symmetric key.
KDC: server shares different secret key with each
registered user (many users)
Alice, Bob know own symmetric keys, KA-KDC KB-KDC , for
communicating with KDC.
KB-KDC
KX-KDC
KY-KDC
KZ-KDC
KP-KDC
KB-KDC
KA-KDC
KA-KDC
KP-KDC
KDC
43. 43
Key Distribution Center (KDC)
Alice
knows
R1
Bob knows to
use R1 to
communicate
with Alice
Alice and Bob communicate: using R1 as
session key for shared symmetric encryption
Q: How does KDC allow Bob, Alice to determine shared
symmetric secret key to communicate with each other?
KDC
generates
R1
KB-KDC(A,R1)
KA-KDC(A,B)
KA-KDC(R1, KB-KDC(A,R1) )
44. 44
Certification Authorities
Certification authority (CA): binds public key to
particular entity, E.
E (person, router) registers its public key with CA.
E provides “proof of identity” to CA.
CA creates certificate binding E to its public key.
certificate containing E’s public key digitally signed by CA –
CA says “this is E’s public key”
Bob’s
public
key KB
+
Bob’s
identifying
information
digital
signature
(encrypt)
CA
private
key
KCA
-
KB
+
certificate for
Bob’s public key,
signed by CA
45. 45
Certification Authorities
When Alice wants Bob’s public key:
gets Bob’s certificate (Bob or elsewhere).
apply CA’s public key to Bob’s certificate, get
Bob’s public key
Bob’s
public
key
KB
+
digital
signature
(decrypt)
CA
public
key
KCA
+
KB
+
46. 46
A certificate contains:
Serial number (unique to issuer)
info about certificate owner, including algorithm and
key value itself (not shown)
info about
certificate
issuer
valid dates
digital
signature by
issuer
48. 48
Firewalls: Why
prevent denial of service attacks:
SYN flooding: attacker establishes many bogus
TCP connections, no resources left for “real”
connections.
prevent illegal modification/access of internal data.
e.g., attacker replaces CIA’s homepage with
something else
allow only authorized access to inside network (set of
authenticated users/hosts)
two types of firewalls:
application-level
packet-filtering
49. 49
Packet Filtering
internal network connected to Internet via router
firewall
router filters packet-by-packet, decision to
forward/drop packet based on:
source IP address, destination IP address
TCP/UDP source and destination port numbers
ICMP message type
TCP SYN and ACK bits
Should arriving
packet be allowed
in? Departing packet
let out?
50. 50
Packet Filtering
Example 1: block incoming and outgoing datagrams
with IP protocol field = 17 and with either source or
dest port = 23.
All incoming and outgoing UDP flows and telnet
connections are blocked.
Example 2: Block inbound TCP segments with
ACK=0.
Prevents external clients from making TCP
connections with internal clients, but allows
internal clients to connect to outside.
51. 51
Application gateways
Filters packets on
application data as well as
on IP/TCP/UDP fields.
Example: allow select
internal users to telnet
outside.
host-to-gateway
telnet session
gateway-to-remote
host telnet session
application
gateway
router and filter
1. Require all telnet users to telnet through gateway.
2. For authorized users, gateway sets up telnet connection to
dest host. Gateway relays data between 2 connections
3. Router filter blocks all telnet connections not originating
from gateway.
52. 52
Limitations of firewalls and gateways
IP spoofing: router can’t
know if data “really”
comes from claimed
source
if multiple app’s. need
special treatment, each
has own app. gateway.
client software must
know how to contact
gateway.
e.g., must set IP address
of proxy in Web browser
filters often use all or
nothing policy for UDP.
tradeoff: degree of
communication with
outside world, level of
security
many highly protected
sites still suffer from
attacks.
53. 53
Internet security threats
Mapping:
before attacking: “case the joint” – find out what
services are implemented on network
Use ping to determine what hosts have
addresses on network
Port-scanning: try to establish TCP connection to
each port in sequence (see what happens)
nmap (http://www.insecure.org/nmap/) mapper:
“network exploration and security auditing”
Countermeasures?
54. 54
Internet security threats
Mapping: countermeasures
record traffic entering network
look for suspicious activity (IP addresses, pots
being scanned sequentially)
55. 55
Internet security threats
Packet sniffing:
broadcast media
promiscuous NIC reads all packets passing by
can read all unencrypted data (e.g. passwords)
e.g.: C sniffs B’s packets
A
B
C
src:B dest:A payload
Countermeasures?
56. 56
Internet security threats
Packet sniffing: countermeasures
all hosts in organization run software that checks
periodically if host interface in promiscuous mode.
one host per segment of broadcast media
(switched Ethernet at hub)
A
B
C
src:B dest:A payload
57. 57
Internet security threats
IP Spoofing:
can generate “raw” IP packets directly from
application, putting any value into IP source
address field
receiver can’t tell if source is spoofed
e.g.: C pretends to be B
A
B
C
src:B dest:A payload
Countermeasures?
58. 58
Internet security threats
IP Spoofing: ingress filtering
routers should not forward outgoing packets with
invalid source addresses (e.g., datagram source
address not in router’s network)
great, but ingress filtering can not be mandated for
all networks
A
B
C
src:B dest:A payload
59. 59
Internet security threats
Denial of service (DOS):
flood of maliciously generated packets “swamp”
receiver
Distributed DOS (DDOS): multiple coordinated
sources swamp receiver
e.g., C and remote host SYN-attack A
A
B
C
SYN
SYN
SYN
SYN
SYN
SYN
SYN
Countermeasures?
60. 60
Internet security threats
Denial of service (DOS): countermeasures
filter out flooded packets (e.g., SYN) before
reaching host: throw out good with bad
traceback to source of floods (most likely an
innocent, compromised machine)
A
B
C
SYN
SYN
SYN
SYN
SYN
SYN
SYN
61. 61
Secure e-mail
Alice:
generates random symmetric private key, KS.
encrypts message with KS (for efficiency)
also encrypts KS with Bob’s public key.
sends both KS(m) and KB(KS) to Bob.
Alice wants to send confidential e-mail, m, to Bob.
KS( )
.
KB( )
.
+
+ -
KS(m )
KB(KS )
+
m
KS
KS
KB
+
Internet
KS( )
.
KB( )
.
-
KB
-
KS
m
KS(m )
KB(KS )
+
62. 62
Secure e-mail
Bob:
uses his private key to decrypt and recover KS
uses KS to decrypt KS(m) to recover m
Alice wants to send confidential e-mail, m, to Bob.
KS( )
.
KB( )
.
+
+ -
KS(m )
KB(KS )
+
m
KS
KS
KB
+
Internet
KS( )
.
KB( )
.
-
KB
-
KS
m
KS(m )
KB(KS )
+
63. 63
Secure e-mail (continued)
• Alice wants to provide sender authentication
message integrity.
• Alice digitally signs message.
• sends both message (in the clear) and digital signature.
H( )
. KA( )
.
-
+ -
H(m )
KA(H(m))
-
m
KA
-
Internet
m
KA( )
.
+
KA
+
KA(H(m))
-
m
H( )
. H(m )
compare
64. 64
Secure e-mail (continued)
• Alice wants to provide secrecy, sender authentication,
message integrity.
Alice uses three keys: her private key, Bob’s public
key, newly created symmetric key
H( )
. KA( )
.
-
+
KA(H(m))
-
m
KA
-
m
KS( )
.
KB( )
.
+
+
KB(KS )
+
KS
KB
+
Internet
KS
65. 65
Pretty good privacy (PGP)
Internet e-mail encryption
scheme, de-facto standard.
uses symmetric key
cryptography, public key
cryptography, hash function,
and digital signature as
described.
provides secrecy, sender
authentication, integrity.
inventor, Phil Zimmerman,
was target of 3-year federal
investigation.
---BEGIN PGP SIGNED MESSAGE---
Hash: SHA1
Bob:My husband is out of town
tonight.Passionately yours,
Alice
---BEGIN PGP SIGNATURE---
Version: PGP 5.0
Charset: noconv
yhHJRHhGJGhgg/12EpJ+lo8gE4vB3mqJ
hFEvZP9t6n7G6m5Gw2
---END PGP SIGNATURE---
A PGP signed message:
66. 66
Secure sockets layer (SSL)
transport layer security
to any TCP-based app
using SSL services.
used between Web
browsers, servers for e-
commerce (shttp).
security services:
server authentication
data encryption
client authentication
(optional)
server authentication:
SSL-enabled browser
includes public keys for
trusted CAs.
Browser requests server
certificate, issued by
trusted CA.
Browser uses CA’s public
key to extract server’s
public key from
certificate.
check your browser’s
security menu to see its
trusted CAs.
67. 67
SSL (continued)
Encrypted SSL session:
Browser generates
symmetric session key,
encrypts it with server’s
public key, sends
encrypted key to server.
Using private key, server
decrypts session key.
Browser, server know
session key
All data sent into TCP socket
(by client or server)
encrypted with session key.
SSL: basis of IETF
Transport Layer
Security (TLS).
SSL can be used for
non-Web applications,
e.g., IMAP.
Client authentication
can be done with client
certificates.
68. 68
IPsec: Network Layer Security
Network-layer secrecy:
sending host encrypts the
data in IP datagram
TCP and UDP segments;
ICMP and SNMP
messages.
Network-layer authentication
destination host can
authenticate source IP
address
Two principle protocols:
authentication header (AH)
protocol
encapsulation security
payload (ESP) protocol
For both AH and ESP, source,
destination handshake:
create network-layer logical
channel called a security
association (SA)
Each SA unidirectional.
Uniquely determined by:
security protocol (AH or
ESP)
source IP address
32-bit connection ID
69. 69
Authentication Header (AH) Protocol
provides source
authentication, data
integrity, no
confidentiality
AH header inserted
between IP header, data
field.
protocol field: 51
intermediate routers
process datagrams as
usual
AH header includes:
connection identifier
authentication data:
source- signed message
digest calculated over
original IP datagram.
next header field: specifies
type of data (e.g., TCP,
UDP, ICMP)
IP header data (e.g., TCP, UDP segment)
AH header
70. 70
ESP Protocol
provides secrecy, host
authentication, data integrity.
data, ESP trailer encrypted.
next header field is in ESP
trailer.
ESP authentication field
is similar to AH
authentication field.
Protocol = 50.
IP header TCP/UDP segment
ESP
header
ESP
trailer
ESP
authent.
encrypted
authenticated
71. 71
IEEE 802.11 security
War-driving: drive around Bay area, see what 802.11
networks available?
More than 9000 accessible from public roadways
85% use no encryption/authentication
packet-sniffing and various attacks easy!
Wired Equivalent Privacy (WEP): authentication as in
protocol ap4.0
host requests authentication from access point
access point sends 128 bit nonce
host encrypts nonce using shared symmetric key
access point decrypts nonce, authenticates host
72. 72
IEEE 802.11 security
Wired Equivalent Privacy (WEP): data encryption
Host/AP share 40 bit symmetric key (semi-permanent)
Host appends 24-bit initialization vector (IV) to create
64-bit key
64 bit key used to generate stream of keys, ki
IV
ki
IV
used to encrypt ith byte, di, in frame:
ci = di XOR ki
IV
IV and encrypted bytes, ci sent in frame
73. 73
802.11 WEP encryption
IV
(per frame)
KS: 40-bit
secret
symmetric
key k1
IV
k2
IV
k3
IV
… kN
IV
kN+1
IV
… kN+1
IV
d1 d2 d3 … dN CRC1 … CRC4
c1 c2 c3 … cN cN+1 … cN+4
plaintext
frame data
plus CRC
key sequence generator
( for given KS, IV)
802.11
header
IV
WEP-encrypted data
plus CRC
Figure 7.8-new1: 802.11 WEP protocol
Sender-side WEP encryption
74. 74
Breaking 802.11 WEP encryption
Security hole:
24-bit IV, one IV per frame, -> IV’s eventually reused
IV transmitted in plaintext -> IV reuse detected
Attack:
Trudy causes Alice to encrypt known plaintext d1 d2 d3
d4 …
Trudy sees: ci = di XOR ki
IV
Trudy knows ci di, so can compute ki
IV
Trudy knows encrypting key sequence k1
IV
k2
IV
k3
IV
…
Next time IV is used, Trudy can decrypt!
75. 75
Network Security (summary)
Basic techniques…...
cryptography (symmetric and public)
authentication
message integrity
key distribution
…. used in many different security scenarios
secure email
secure transport (SSL)
IP sec
802.11 WEP
76. REFERENCES:
1.Cryptography and Network Security
Principles and Practice 2nd Edition
William Stallings
2.Data Communications and Networking 4th
Edition
Behrouz A. Forouzan
3.Computer Networks and Internet Protocol
NPTEL