NETWORK SECURITY
name- anoop negi
roll no- 27
Date: 4-04-2016
CONTENTS
 understand principles of network security:
 cryptography
 Digital Signatures
 Security at Various Layers
 Firewalls
INTRODUCTION
Cryptography is the study of creating and using encryption and decryption techniques.
Plaintext is the the data that before any encryption has been performed.
Ciphertext is the data after encryption has been performed.
The key is the unique piece of information that is used to create ciphertext and decrypt the ciphertext back into
plaintext.
KEY TERMS
 Confidentiality: only sender, intended receiver should “ understand” message
contents
 sender encrypts message
 receiver decrypts message
 Authentication: sender, receiver want to confirm identity of each other
 Message Integrity: sender, receiver want to ensure message not altered (in
transit, or afterwards) .
 Access and Availability: services must be accessible and available to users
CONTINUE………..
❍ eavesdrop: intercept messages
❍ impersonation: can fake (spoof) source address in packet (or any field in
packet)
❍ hijacking: “take over” ongoing connection by removing sender or receiver,
inserting himself in place
SYMMETRIC KEY
CRYPTOGRAPHY
 The same key is used by the sender (for encryption) and the receiver (for decryption).
 The key is shared.
 Encryption and Decryption Algorithms are public.
Continue……….
 substitution cipher: substituting one thing for another.
 monoalphabetic cipher: substitute one letter for another .
plaintext: abcdefghijklmnopqrstuvwxyz
ciphertext: mnbvcxzasdfghjklpoiuytrewq
Plaintext: bob. i love you. alice
ciphertext: nkn. s gktc wky. mgsbc
Data Encryption Standard
 Created in 1977 and in operation into the 1990s, the data encryption standard took a 64-
bit block of data and subjected it to 16 levels of encryption.
 The choice of encryption performed at each of the 16 levels depends on the 56-bit key
applied.
 Even though 56 bits provides over 72 quadrillion combinations, a system using this
standard has been cracked (in 1998 by Electronic Frontier Foundation in 3 days).
Continue……….
Public Key Cryptography
 Very powerful encryption technique in which two keys are used: the first key (the
public key) encrypts the message while the second key (the private key) decrypts the
message.
 Not possible to deduce one key from the other.
 Not possible to break the code given the public key.
 If you want someone to send you secure data, give them your public key, you keep the
private key.
 Secure sockets layer on the Internet is a common example of public key cryptography.
RSA
 The most common public key algorithm .
 Private key is a pair of numbers (n,d).
 Public key is a pair of numbers (n,e).
 The sender uses the following algorithm to encrypt the message:
 C=p*pow(e) mod n
 P=plaintext ,C=cyphertext and e,n are components of public key.
 Receiver : p=C*pow(d) mod n
RSA
Digital Signature
Digital signature can provide:
Authentication
Integrity
Nonrepudiation
The sender uses her private key to encrypt(sign) the message .
The receiver on the other hand uses the public key of sender to decrypt the msg.
No need to sign the entire document(digest).
Digital signature does not provide privacy.
Message Digests
 Computationally expensive to public-key-encrypt long messages.
 Goal: fixed-length, easy to-compute digital “fingerprint”.
 apply hash function H to m, get fixed size message digest, H(m).
 Hash function properties:
 Hashing is one way: digest can only be created from the msg , not vice versa.
 Hashing is one to one function: there is little probability that two msg produce same digest.
SECURITY AT IP LEVEL
 IP Security (ipsec) is a collection of protocols to provide security for a packet at the IP level.
 Ipsec requires a logical connection between two hosts using a signalling protocol called Security
Association.
 An SA connection can be simplex or duplex.
 SA is uniquely defined by three elements:
 A 32 bit security parameter index (spi),which acts as virtual circuit identifier in connection
oriented protocols.
 The source ip address.
 The type of protocol used- AH,ESP.
AUTHENTICATION HEADER (AH)
 AH provides authentication , integrity and anti-replay for the entire
packet(ip header & data payload).
 It does not provide confidentiality , which means it does not encrypt the
data.
 The data is readable but protected from modification.
 Integrity and authentication are provided by placement of AH header
between the Ip header and transport layer protocol .
 AH uses an ip protocol id of 51 to identify itself in the IP header.
AH FIELDS
 Next Header: Identifies the next header that uses IP protocol id,
ex- value might be 6 to indicate tcp.
 Length: indicate length of AH header.
 SPI: used in combination with the destination address and security protocol(AH OR ESP) to
identify correct security association for the communication.
 Sequence no. : provides anti-relay protection. It is a 32 bit number that is never allowed to
cycle . The receiver checks this field to verify that a packet with this number has not been
received yet. If one is received ,the packet is rejected.
 Authentication data: contains integrity check value to verify the integrity of the msg.
ENCAPSULATING SECURITY PAYLOAD
Provides confidentiality in addition to authentication , integrity and anti-replay.
ESP indicates itself in the IP header using IP protocol id of 50.
Ex- alice on computer A sends data to bob on computer B.
The data payload is encrypted and signed for integrity. Upon receipt the data
payload packet is decrypted . Bob can be certain it was really alice who send the
data. Also the data is unmodified and no other was able to read it.
ESP HEADER AND TRAILER FIELD
 SECURITY PARAMETER INDEX (SPI): same as in AH.
 Sequence no : same as in AH.
 Padding : the variable length field of 0’s serves as padding.
 Padding length: indicates the length of the padding field in bytes.
 This field is used by the receiver to discard the padding field.
 Next header: identifies the type of payload tcp or udp.
 Authentication data: contains the integrity check value(icv) and a msg
authentication code that is used to verify the sender’s identity and msg
integrity.
Continue….
Transport layer security
 TLS was designed to provide security at transport layer.
 TLS allows two parties to exchange messages in a secure environment. To accomplish this TLS
require that
 Two parties must agree on 3 protocols : an entity authentication protocol, a message
authentication protocol and encrypt/decrypt protocol.
 TLS has two layers.
 The top layer includes three protocols ,one for session setup(handshaking),one for alerting the
other party of unusual situation, and one informing the establishment of security parameters.
 The lower layer ,the record protocol ,is used to encapsulate msg from the upper layer.
Handshake protocol
Alert protocol
 The alert protocol is used to signal an error or a potential error to other party.
 The packet exchanged defines the severity level of the condition.
Change cipher spee protocol
 This protocol is designed to activate the security services (message
authentication and encryption/decryption) after all the agreements are
confirmed in the handshake protocol.
 After exchanging the one message defined in this protocol ,the two parties
can use the services.
FIREWALLS
 A system or combination of systems that supports an access control policy between two networks.
 A firewall can limit the types of transactions that enter a system, as well as the types of transactions that
leave a system.
 Firewalls can be programmed to stop certain types or ranges of IP addresses, as well as certain types of TCP
port numbers (applications).
 A packet filter firewall is essentially a router that has been programmed to filter out or allow to pass certain
IP addresses or TCP port numbers.
 A proxy server is a more advanced firewall that acts as a doorman into a corporate network. Any external
transaction that request something from the corporate network must enter through the proxy server.
 Proxy servers are more advanced but make external accesses slower.
THANK YOU

More Related Content

PPT
Data security in data communication
PPTX
Security in Data Communication and Networking
PPTX
Cryptography and network security
PPTX
Cryptography and network security
PPTX
Network security and cryptography
PDF
computer-security-and-cryptography-a-simple-presentation
PPTX
Introduction to Cryptography
PPTX
Information and network security 31 public key cryptography
Data security in data communication
Security in Data Communication and Networking
Cryptography and network security
Cryptography and network security
Network security and cryptography
computer-security-and-cryptography-a-simple-presentation
Introduction to Cryptography
Information and network security 31 public key cryptography

What's hot (20)

DOC
Cryptography full report
PPTX
PPT
Information Security & Cryptography
PPT
Cryptography and Network Security
PPTX
Encryption
PDF
Introduction to Cryptography
PPT
Network Security and Cryptography
PPTX
Cryptography and network security Nit701
PPTX
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PPT
Encryption
PDF
Computer Security (Cryptography) Ch01
PDF
Cryptanalysis and Attacks
PPTX
Seminar on Encryption and Authenticity
PPT
6. cryptography
PPTX
Data encryption
PPTX
Cryptography.ppt
PPTX
Cryptographic tools
 
PDF
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
PPTX
Cryptography and applications
PPTX
Cryptography
Cryptography full report
Information Security & Cryptography
Cryptography and Network Security
Encryption
Introduction to Cryptography
Network Security and Cryptography
Cryptography and network security Nit701
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
Encryption
Computer Security (Cryptography) Ch01
Cryptanalysis and Attacks
Seminar on Encryption and Authenticity
6. cryptography
Data encryption
Cryptography.ppt
Cryptographic tools
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
Cryptography and applications
Cryptography
Ad

Viewers also liked (20)

PPT
PPTX
Network security
PDF
BAIT1103 Chapter 8
PPT
Data Security
PPT
Digital Signature
PPTX
L4 internet security
PPT
Network security
PPTX
IP Security
PPTX
Seminar (network security)
PPTX
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
PPTX
PPT on Family Palnning
PPT
Firewall
 
PDF
Digital signatures
PPT
PPT
FireWall
PPT
Introduction to Digital signatures
PPTX
Family planning....ppt
Network security
BAIT1103 Chapter 8
Data Security
Digital Signature
L4 internet security
Network security
IP Security
Seminar (network security)
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
PPT on Family Palnning
Firewall
 
Digital signatures
FireWall
Introduction to Digital signatures
Family planning....ppt
Ad

Similar to Network security (20)

PDF
CS6004 CYBER FORENSICS
PPT
2800967 for internet and networkings.ppt
PPT
Seminar on ECommerce
PPTX
Parallel and distributed computing .pptx
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPT
Ip sec and ssl
PPT
Ip security
PPTX
chAPTER 19 INTERNET PROTOCOL SECURITY PRESENTATION
PPT
ch22.ppt
PPT
PPTX
Chapter 22 Internet Security Protocols and Standards
PPT
Chapter No 19 - Network and Security-by-MIT
PPT
Network Security Presentation Stallings.
PPT
CS553_ST7_Ch21-NetworkSecurityhhhhggg.ppt
PPT
CS553 ST7 Ch21 Network Security chapter 21
PDF
CNS ppt.pdf
PDF
Module 2.Cryptography and Cryptanalysis
PDF
Internet Protocol Security as the Network Cryptography System
PDF
ipsec.pdfgvdgvdgdgdgddgdgdgdgdgdgdgdgdgd
CS6004 CYBER FORENSICS
2800967 for internet and networkings.ppt
Seminar on ECommerce
Parallel and distributed computing .pptx
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Ip sec and ssl
Ip security
chAPTER 19 INTERNET PROTOCOL SECURITY PRESENTATION
ch22.ppt
Chapter 22 Internet Security Protocols and Standards
Chapter No 19 - Network and Security-by-MIT
Network Security Presentation Stallings.
CS553_ST7_Ch21-NetworkSecurityhhhhggg.ppt
CS553 ST7 Ch21 Network Security chapter 21
CNS ppt.pdf
Module 2.Cryptography and Cryptanalysis
Internet Protocol Security as the Network Cryptography System
ipsec.pdfgvdgvdgdgdgddgdgdgdgdgdgdgdgdgd

Recently uploaded (20)

PDF
Beginners-Guide-to-Artificial-Intelligence.pdf
PPTX
CNS - Unit 1 (Introduction To Computer Networks) - PPT (2).pptx
PDF
MLpara ingenieira CIVIL, meca Y AMBIENTAL
PPT
UNIT-I Machine Learning Essentials for 2nd years
PPTX
BBOC407 BIOLOGY FOR ENGINEERS (CS) - MODULE 1 PART 1.pptx
PPT
Programmable Logic Controller PLC and Industrial Automation
PDF
AIGA 012_04 Cleaning of equipment for oxygen service_reformat Jan 12.pdf
PDF
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
PPTX
Micro1New.ppt.pptx the mai themes of micfrobiology
PPTX
chapter 1.pptx dotnet technology introduction
PPTX
WN UNIT-II CH4_MKaruna_BapatlaEngineeringCollege.pptx
PDF
Present and Future of Systems Engineering: Air Combat Systems
PDF
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
PPTX
Environmental studies, Moudle 3-Environmental Pollution.pptx
PPTX
Wireless sensor networks (WSN) SRM unit 2
PDF
Micro 4 New.ppt.pdf a servay of cells and microorganism
PDF
20250617 - IR - Global Guide for HR - 51 pages.pdf
PDF
Computer organization and architecuture Digital Notes....pdf
PDF
Computer System Architecture 3rd Edition-M Morris Mano.pdf
PPTX
Solar energy pdf of gitam songa hemant k
Beginners-Guide-to-Artificial-Intelligence.pdf
CNS - Unit 1 (Introduction To Computer Networks) - PPT (2).pptx
MLpara ingenieira CIVIL, meca Y AMBIENTAL
UNIT-I Machine Learning Essentials for 2nd years
BBOC407 BIOLOGY FOR ENGINEERS (CS) - MODULE 1 PART 1.pptx
Programmable Logic Controller PLC and Industrial Automation
AIGA 012_04 Cleaning of equipment for oxygen service_reformat Jan 12.pdf
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
Micro1New.ppt.pptx the mai themes of micfrobiology
chapter 1.pptx dotnet technology introduction
WN UNIT-II CH4_MKaruna_BapatlaEngineeringCollege.pptx
Present and Future of Systems Engineering: Air Combat Systems
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
Environmental studies, Moudle 3-Environmental Pollution.pptx
Wireless sensor networks (WSN) SRM unit 2
Micro 4 New.ppt.pdf a servay of cells and microorganism
20250617 - IR - Global Guide for HR - 51 pages.pdf
Computer organization and architecuture Digital Notes....pdf
Computer System Architecture 3rd Edition-M Morris Mano.pdf
Solar energy pdf of gitam songa hemant k

Network security

  • 1. NETWORK SECURITY name- anoop negi roll no- 27 Date: 4-04-2016
  • 2. CONTENTS  understand principles of network security:  cryptography  Digital Signatures  Security at Various Layers  Firewalls
  • 3. INTRODUCTION Cryptography is the study of creating and using encryption and decryption techniques. Plaintext is the the data that before any encryption has been performed. Ciphertext is the data after encryption has been performed. The key is the unique piece of information that is used to create ciphertext and decrypt the ciphertext back into plaintext.
  • 4. KEY TERMS  Confidentiality: only sender, intended receiver should “ understand” message contents  sender encrypts message  receiver decrypts message  Authentication: sender, receiver want to confirm identity of each other  Message Integrity: sender, receiver want to ensure message not altered (in transit, or afterwards) .  Access and Availability: services must be accessible and available to users
  • 5. CONTINUE……….. ❍ eavesdrop: intercept messages ❍ impersonation: can fake (spoof) source address in packet (or any field in packet) ❍ hijacking: “take over” ongoing connection by removing sender or receiver, inserting himself in place
  • 6. SYMMETRIC KEY CRYPTOGRAPHY  The same key is used by the sender (for encryption) and the receiver (for decryption).  The key is shared.  Encryption and Decryption Algorithms are public.
  • 7. Continue……….  substitution cipher: substituting one thing for another.  monoalphabetic cipher: substitute one letter for another . plaintext: abcdefghijklmnopqrstuvwxyz ciphertext: mnbvcxzasdfghjklpoiuytrewq Plaintext: bob. i love you. alice ciphertext: nkn. s gktc wky. mgsbc
  • 8. Data Encryption Standard  Created in 1977 and in operation into the 1990s, the data encryption standard took a 64- bit block of data and subjected it to 16 levels of encryption.  The choice of encryption performed at each of the 16 levels depends on the 56-bit key applied.  Even though 56 bits provides over 72 quadrillion combinations, a system using this standard has been cracked (in 1998 by Electronic Frontier Foundation in 3 days).
  • 10. Public Key Cryptography  Very powerful encryption technique in which two keys are used: the first key (the public key) encrypts the message while the second key (the private key) decrypts the message.  Not possible to deduce one key from the other.  Not possible to break the code given the public key.  If you want someone to send you secure data, give them your public key, you keep the private key.  Secure sockets layer on the Internet is a common example of public key cryptography.
  • 11. RSA  The most common public key algorithm .  Private key is a pair of numbers (n,d).  Public key is a pair of numbers (n,e).  The sender uses the following algorithm to encrypt the message:  C=p*pow(e) mod n  P=plaintext ,C=cyphertext and e,n are components of public key.  Receiver : p=C*pow(d) mod n
  • 12. RSA
  • 13. Digital Signature Digital signature can provide: Authentication Integrity Nonrepudiation The sender uses her private key to encrypt(sign) the message . The receiver on the other hand uses the public key of sender to decrypt the msg. No need to sign the entire document(digest). Digital signature does not provide privacy.
  • 14. Message Digests  Computationally expensive to public-key-encrypt long messages.  Goal: fixed-length, easy to-compute digital “fingerprint”.  apply hash function H to m, get fixed size message digest, H(m).  Hash function properties:  Hashing is one way: digest can only be created from the msg , not vice versa.  Hashing is one to one function: there is little probability that two msg produce same digest.
  • 15. SECURITY AT IP LEVEL  IP Security (ipsec) is a collection of protocols to provide security for a packet at the IP level.  Ipsec requires a logical connection between two hosts using a signalling protocol called Security Association.  An SA connection can be simplex or duplex.  SA is uniquely defined by three elements:  A 32 bit security parameter index (spi),which acts as virtual circuit identifier in connection oriented protocols.  The source ip address.  The type of protocol used- AH,ESP.
  • 16. AUTHENTICATION HEADER (AH)  AH provides authentication , integrity and anti-replay for the entire packet(ip header & data payload).  It does not provide confidentiality , which means it does not encrypt the data.  The data is readable but protected from modification.  Integrity and authentication are provided by placement of AH header between the Ip header and transport layer protocol .  AH uses an ip protocol id of 51 to identify itself in the IP header.
  • 17. AH FIELDS  Next Header: Identifies the next header that uses IP protocol id, ex- value might be 6 to indicate tcp.  Length: indicate length of AH header.  SPI: used in combination with the destination address and security protocol(AH OR ESP) to identify correct security association for the communication.  Sequence no. : provides anti-relay protection. It is a 32 bit number that is never allowed to cycle . The receiver checks this field to verify that a packet with this number has not been received yet. If one is received ,the packet is rejected.  Authentication data: contains integrity check value to verify the integrity of the msg.
  • 18. ENCAPSULATING SECURITY PAYLOAD Provides confidentiality in addition to authentication , integrity and anti-replay. ESP indicates itself in the IP header using IP protocol id of 50. Ex- alice on computer A sends data to bob on computer B. The data payload is encrypted and signed for integrity. Upon receipt the data payload packet is decrypted . Bob can be certain it was really alice who send the data. Also the data is unmodified and no other was able to read it.
  • 19. ESP HEADER AND TRAILER FIELD  SECURITY PARAMETER INDEX (SPI): same as in AH.  Sequence no : same as in AH.  Padding : the variable length field of 0’s serves as padding.  Padding length: indicates the length of the padding field in bytes.  This field is used by the receiver to discard the padding field.  Next header: identifies the type of payload tcp or udp.  Authentication data: contains the integrity check value(icv) and a msg authentication code that is used to verify the sender’s identity and msg integrity.
  • 21. Transport layer security  TLS was designed to provide security at transport layer.  TLS allows two parties to exchange messages in a secure environment. To accomplish this TLS require that  Two parties must agree on 3 protocols : an entity authentication protocol, a message authentication protocol and encrypt/decrypt protocol.  TLS has two layers.  The top layer includes three protocols ,one for session setup(handshaking),one for alerting the other party of unusual situation, and one informing the establishment of security parameters.  The lower layer ,the record protocol ,is used to encapsulate msg from the upper layer.
  • 23. Alert protocol  The alert protocol is used to signal an error or a potential error to other party.  The packet exchanged defines the severity level of the condition.
  • 24. Change cipher spee protocol  This protocol is designed to activate the security services (message authentication and encryption/decryption) after all the agreements are confirmed in the handshake protocol.  After exchanging the one message defined in this protocol ,the two parties can use the services.
  • 25. FIREWALLS  A system or combination of systems that supports an access control policy between two networks.  A firewall can limit the types of transactions that enter a system, as well as the types of transactions that leave a system.  Firewalls can be programmed to stop certain types or ranges of IP addresses, as well as certain types of TCP port numbers (applications).  A packet filter firewall is essentially a router that has been programmed to filter out or allow to pass certain IP addresses or TCP port numbers.  A proxy server is a more advanced firewall that acts as a doorman into a corporate network. Any external transaction that request something from the corporate network must enter through the proxy server.  Proxy servers are more advanced but make external accesses slower.