Lecture 7
Lecture 7
Security
Fundamentals of secure networks;
Cryptography
• Computer data often travels from one computer to another, leaving the safety of
its protected physical surroundings.
• Once the data is out of hand, people with bad intention could modify or forge your
data, either for amusement or for their own benefit.
• Network Security - measures to protect data during their transmission
• Cryptography can reformat and transform our data, making it safer on its trip
between computers.
• The technology is based on the essentials of secret codes, augmented by modern
mathematics that protects our data in powerful ways.
• Cryptography is a method of protecting information and communication through
the use of codes so that only those for whom the information is intended can read
and process it.
Basic terminology in cryptographic system
4
Symmetric encryption systems
• There two basic kinds of encryptions are symmetric (also called "secret key") and
asymmetric (also called "public key").
• The symmetric systems provide a two-way channel to their users: A and B share a
secret key, and they can both encrypt information to send to the other as well as
decrypt information from the other.
• The symmetry of this situation is a major advantage of this type of encryption, but
it also leads to a problem: key distribution. How do A and B obtain their shared
secret key? And only A and B can use that key for their encrypted
communications.
• If A wants to share encrypted communication with another user C, A and C need a
different shared key. Key generation and key distribution is the major difficulty in
using symmetric encryption.
5
Cont.…
• In general, n users who want to communicate in pairs need n * (n -
1)/2 keys.
• In other words, the number of keys needed increases at a rate
proportional to the square of the number of users! So a property of
symmetric encryption systems is that they require a means of key
distribution.
Asymmetric encryption systems
• Public key systems excel at key management.
• Asymmetric encryption transforms plaintext into ciphertext using a one of two
keys and an encryption algorithm.
• Using the paired key and a decryption algorithm, the plaintext is recovered from
the ciphertext.
• Public key cryptography solves symmetric key encryption problem of having to
exchange secret key
• Uses two mathematically related digital keys public key (widely
disseminated) and private key (kept secret by owner)
• Once key is used to encrypt message, same key cannot be used to
decrypt message
• For example, sender uses recipients public key to encrypt message;
recipient uses his/her private key to decrypt it 7
Cont.…
• By the nature of the public key approach, we can send a public key in
an e-mail message or post it in a public directory.
• Only the corresponding private key, which presumably is kept private,
can decrypt what has been encrypted with the public key.
• But for both kinds of encryption, a key must be kept well secured.
• Once the private key is known by an outsider, all messages written
previously or in the future can be decrypted (and hence read or
modified) by the outsider.
• So, for all encryption algorithms, key management is a major issue.
Firewalls
• Firewalls are network devices that enforce an organization’s security policy
• A firewall is a network security device that monitors incoming and outgoing
network traffic and decides whether to allow or block specific traffic based on a
defined set of security rules.
• A network administrator configures the firewall based on the policy of the
organization. The policy may take user productivity and bandwidth usage into
account as well as the security concerns of an organization.
• A firewall is a combination of hardware and software that isolates an
organization’s internal network from the Internet at large, allowing some packets
to pass and blocking others.
• A firewall allows a network administrator to control access between the outside
world and resources within the administered network by managing the traffic flow
to and from these resources.
Cont.…