08
E3
N
C
U
AC
Cryptography and Network Security
Overview
1
Dr. Abdellatif Elkouny
Roadmap 2
08
symmetric ciphers
Cryptographic
E3
asymmetric encryption
algorithms hash functions
N
Mutual Trust C
U
AC
Network Security
Dr. Abdellatif Elkouny
Confidentiality
• Data confidentiality
• Assures that private or confidential information
is not made available or disclosed to
unauthorized individuals
• Privacy
• Assures that individual's control or influence
08
what information related to them may be
collected and stored and by whom and to
E3
whom that information may be disclosed
Integrity
N
Network • Data integrity
Security C • Assures that information changed only in a
U
specified and authorized manner
• System integrity
AC
Objectives • Assures that a system performs its intended
function in an unimpaired manner, free from
deliberate or inadvertent unauthorized
manipulation of the system
Availability
• Assures that systems work promptly, and service is
Dr. Abdellatif Elkouny not denied to authorized users 3
Levels of Impact 4
08
can define 3 levels of impact
E3
from a security breach
Low
N
Moderate
High C
U
AC
Dr. Abdellatif Elkouny
Aspects of Security 5
08
consider 3 aspects of information security:
E3
• security attack
N
• security service
• security mechanism
C
U
AC
note terms
• threat – a potential for violation of security
• attack – an assault on system security, a deliberate attempt to
evade security services
Dr. Abdellatif Elkouny
08
E3
N
C
U
AC
Passive Attacks
6
Dr. Abdellatif Elkouny
08
E3
N
C
U
AC
Active Attacks
7
Dr. Abdellatif Elkouny
Security Service 8
08
E3
N
• Enhance security of data processing systems and
information transfers of an organization
C
U
• Intended to counter security attacks using one
or more security mechanisms
AC
Dr. Abdellatif Elkouny
Security Services 9
08
E3
N
X.800: C RFC 2828:
U
“a service provided by a protocol “a processing or communication
AC
layer of communicating open service provided by a system to
systems, which ensures adequate give a specific kind of protection
security of the systems or of to system resources”
data transfers”
Dr. Abdellatif Elkouny
Security Services (X.800) 10
08
• Authentication - assurance that communicating entity is the
one claimed
E3
• have both peer-entity & data origin authentication
• Access Control - prevention of unauthorized use of a resource
N
• Data Confidentiality –protection of data from unauthorized
disclosure
C
U
• Data Integrity - assurance that data received is as sent by an
AC
authorized entity
• Non-Repudiation - protection against denial by one of the
parties in a communication
• Availability – resource accessible/usable
Dr. Abdellatif Elkouny
Security Mechanism 11
08
• feature designed to detect, prevent, or recover from a
E3
security attack
• no single mechanism that will support all services
N
required
C
• However, one element underlies many of the security
U
mechanisms in use:
• CRYPTOGRAPHIC TECHNIQUES
AC
• hence our focus on this topic
Dr. Abdellatif Elkouny
Security 12
Mechanisms (X.800)
08
• specific security mechanisms:
E3
• encipherment, digital signatures,
access controls, data integrity,
N
authentication exchange, traffic
C padding, routing control.
U
• general security mechanisms:
AC
• trusted functionality, security
labels, event detection, security
audit trails, security recovery
Dr. Abdellatif Elkouny
13
08
E3
N
C
U
AC
Trust Model for Network Security (PKI)
Dr. Abdellatif Elkouny
Model for Network
Security
08
using this model requires us to:
1. design a suitable algorithm for the
E3
security transformation
2. generate the secret information
N
(keys) used by the algorithm
C
3. develop methods to distribute and
share the secret information
U
4. specify a protocol enabling the
AC
principals to use the transformation
and secret information for a
security service
Dr. Abdellatif Elkouny 14
Summary 15
08
• topic roadmap & standards organizations
E3
• security concepts:
• confidentiality, integrity, availability
N
• X.800 security architecture
C
U
• security attacks, services, mechanisms
AC
• models for network (access) security
Dr. Abdellatif Elkouny