Lec09_Symmetric_Confidentiality

Lec09_Symmetric_Confidentiality - Confidentiality Using...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Prof. Ren 1 Confidentiality Using Symmetric Encryption Lecture 9 Prof. Ren 2 Outline Placement of Encryption Potential Locations for Confidentiality Attacks Link vs. End-to-End Encryption Traffic Confidentiality Key Distribution Random Number Generation
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Points of Vulnerability Traditionally symmetric encryption is used to provide message confidentiality Prof. Ren 3 Prof. Ren 4 Potential Locations for Confidentiality Attacks Communications model: In most organizations, workstations are attached to LANs. Typically, the user can reach other workstations, hosts, and servers directly on the LAN or on the other LANs in the same building that are interconnected with bridges and routers. Vulnerable to eavesdropping by another employee, or external intruders.
Background image of page 2
3 Prof. Ren 5 How? Typically, a LAN is a broadcast network: Transmission between any two stations is visible on the LAN medium. Data are transmitted in the form of frames, with each frame containing the source and destination address. An eavesdropper can monitor the traffic on the LAN and capture any traffic desired on the basis of source and destination addresses. Prof. Ren 6 Potential Locations for Confidentiality Attacks Access to the outside world from the LAN is almost always available through an Internet router, or some type of communications server. From the communications server, there is a line leading to a wiring closet. The wiring closet serves as a patch panel for interconnecting internal data and phone lines and for providing a staging point for external communications. The wiring closet itself is vulnerable.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Prof. Ren 7 How? If an intruder can penetrate to the closet, the intruder can tap into each wire to determine which are used for data transmission. After isolating one or more lines, the intruder can attach a low-power radio transmitter. The resulting signals can be picked up from a nearby location. In addition to the potential vulnerability of
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 10/27/2009 for the course ECE 816 taught by Professor Ren during the Spring '09 term at Michigan State University.

Page1 / 14

Lec09_Symmetric_Confidentiality - Confidentiality Using...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online