Session37 (A Model For Network Security)

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 16

20CS2222

COMPUTER NETWORKS AND SECURITY

© 2020-21 KL University – The contents of this presentation are an intellectual and copyrighted property of KL
University. ALL RIGHTS RESERVED

1
Session-37

A Model for Network Security

© 2020-21 KL University – The contents of this presentation are an intellectual and copyrighted property of KL
University. ALL RIGHTS RESERVED
2
A Model for Network Security

3
A Model for Network Security
• Using this model requires us to:
1. Design a suitable algorithm for the security
transformation
2. Generate the secret information (keys) used by the
algorithm
3. Develop methods to distribute and share the secret
information (key)
4. Specify a protocol enabling the sender and receiver to
use the transformation and key for a security service

4
A Model for Network Security

5
A Model for Network Security
• Using this model requires us to:
1. Select appropriate gatekeeper functions to identify
users
2. Implement security controls to ensure only
authorised users access designated information
• Note that model does not include:
1. monitoring of system for successful penetration
2. monitoring of authorized users for misuse
3. audit logging for forensic uses, etc.

6
Classic Encryption Techniques
• Plain Text: Original Message
• Encryption/Encipherment: Process of Converting from
Plain text to Cipher text
• Decryption/Decipherment: Restoring the plaintext from
the cipher text.
• Cryptography: Many schemes used for encryption.
• Cryptanalysis: Techniques for deciphering a message
without any knowledge of the enciphering details.
• Cryptology: areas of Cryptography and Cryptanalysis
together are called Cryptology

7
Classic Encryption Techniques
• Encryption Algorithm: Performs various substitution and
transpositions on the plain text.
• Secret Key: Value independent of plain text and the
algorithm.
• Cipher Text: Scrambled Message produced as Output.
• Decryption Algorithm: Encryption Algorithm in reverse.

8
Classic Encryption Techniques
• Two Requirements of Conventional Algorithm

- Strong Encryption Algorithm:


Opponent who knows the algorithm and have
access to one or more Cipher texts would be unable
to decipher the cipher text and discovery the key.
- Sender and receiver must have obtained copies of
the secret key in a secure fashion and must keep
the key secure.

9
Cryptography
• Cryptography is associated with the process of converting
ordinary plain text into unintelligible text and vice-versa.
• It is a method of storing and transmitting data in a
particular form so that only those for whom it is intended
can read and process it.
1. Symmetric key Cryptography
  - also known as Symmetric Encryption is when a
secret key is leveraged for both encryption and decryption
functions.
- This method is the opposite of
Asymmetric Encryption where one key is used to encrypt and
another is used to decrypt.
10
Cryptography
2. Public key cryptography
- uses a pair of keys to encrypt and decrypt data to
protect it against unauthorized access or use.
-  Network users receive a public and private key pair
from certification authorities. ... This key is used to
encrypt the message, and to send it to the recipient

NOTE: Symmetric cryptography was only type prior to


invention of public-key in 1970’s and by far most widely
used (still) is significantly faster than public-key crypto

11
Symmetric Cipher Model

12
Model of Conventional Cryptosystem

13
Symmetric Cipher Model
• Two requirements for secure use of symmetric encryption:
- a strong encryption algorithm
- a secret key known only to sender / receiver
• Mathematically
Y = E(K, X) = EK(X)
X = D(K, Y) = DK(Y)
• Assume encryption algorithm is publicly known, so the
security rely upon the secrecy of key alone.
• A secure channel is required to distribute the key, this is
a big problem in symmetric cryptography

14
Symmetric Cipher Model
Cryptographic algorithms are characterized by:
• Type of encryption operations used
substitution, transposition, product
Substitution: Elements of plain text is mapped with
another element
Transposition: Elements of plaintext are rearranged
Product: Combination of Substitution and Transposition
• Number of keys used
single-key, two-key

15
Symmetric Cipher Model
• way in which plaintext is processed
Block: Input is Processed one block at a time and outputs
a block
Stream: Process the input element one at a time and
outputs one element at a time.

16

You might also like