Escolar Documentos
Profissional Documentos
Cultura Documentos
Akshat Jain (imb2011031) Aniruddha Guha Biswas (imb2011010) Raveesh Tandon (imb2011020) Saurabh Bharti (imb2011016) Shaurabh Singh (imb2011005)
Security Attacks
Interruption:
Attack on availability
Interception:
Attack on confidentiality
Modification:
Attack on integrity
Fabrication:
Attack on authenticity
Types Of Attack
1) Passive attacks:
Obtain information that is being transmitted.
Two types:
Release of message contents:
the location and identity of communicating hosts, and observe the frequency and length of messages being exchanged.
Very difficult to detect.
2) Active attacks:
Involve some modification of the data stream
subsequent retransmission to produce an unauthorized effect. Modification:- Some portion of a legitimate message is altered. Denial of service:- Prevents the normal use of communication facilities.
Encryption Algorithms
Data Encryption Standard (DES) IDEA Advanced Encryption Standard (AES) RSA Algorithm
RSA Algorithm
Plaintext P Encryption Algorithm Ciphertext C Decryption Algorithm Plaintext P
10
Applications
Three categories:
a) Encryption/decryption: The sender encrypts a message with the recipients public key. b) Digital signature / authentication: The sender signs a message with its private key.
c) Key exchange: Two sides cooperate to exhange a session key.
11
Created by MIT to address various security issues Implements a client-server model and provides mutual authentication to each other. Every user has a password Every application server has a password Passwords are kept only in Kerberos Database No unauthorized user has access to servers(physically) The user requires ticket for each access
PGP provides a confidentiality and authentication service that can be used for electronic mail and file storage applications.
IP Security :: IPSec
IP protocol is responsible for routing packets over the Internet. For security in packet transmission, we use IPSec. Provides two modes of protection
16
Applications:
Secure branch office connectivity over the
Internet. Secure remote access over the Internet. Establsihing extranet and intranet connectivity with partners. Enhancing electronic commerce security.
SSL Architecture
SSL Architecture
SSL session
an association between client & server created by the Handshake Protocol define a set of cryptographic parameters may be shared by multiple SSL connections
SSL connection
a transient, peer-to-peer, communications
Reference:
Computer Networks, 4th Edition (Prentice Hall) - Andrew S Tanenbaum. Network Security and Cryptography by William Stalling. Wikipedia.
Thank You