ch01 - W el om c e! Internet Security EE 282 Electrical...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Internet Security EE 282 Electrical Engineering Dept. SJSU Dr. Jalel Rejeb W e l c ome !
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Internet Security 2 EE 282 Course Outline/Motivation ± Let us consider the following example from which we will try to identity some of the main topics that will be covered in this course: ± Example : Bob sends an email message to Alice , his bank manger, requesting her to make a transaction of half million dollars from his bank account to buy gold. This transaction can be Bob’s major life investment move, following the advise of his financial advisor who just informed him that the market value of gold is going to sharply increase on the next couple of days. Now Trudy , is one of Bob’s Exs and she does not get along with Alice at all (rumour has it; Trudy suspects that Alice and Bob are romantically involved.) Trudy decides to carry out numerous security attacks on Bob-Alice message using all of her state-of-the art computational resources.
Background image of page 2
Internet Security 3 EE 282 Example … She, Trudy, starts with the easiest type of attacks, eavesdropping on the Bob’s message Î This an example of passive attacks . Î Solution: Bob (Alice) can transform his message into one that is unintelligible (perhaps by permutations of the letters in her message, so it becomes incomprehensible to Trudy.) ¾ This process is also known as encryption. Now Bob can transmit this transformed message, known as ciphertext, to Alice.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Internet Security 4 EE 282 Course Outline/Motivation … Alice receives Bob ’s message. But she needs to transform it back/recover it to its original form (as a plaintext) so he can understand it. ¾ this process is called decryption ± In this course we will examine/compare/analyze modern approaches/implementations for encryption/decryption ¾ Using Symmetric Keys, Part 1: Chapters 2- 7 ¾ Using Public Keys, Part 2: Chapters 8-12 ± others possible of attacks that Trudy can perform include How Alice would be sure that the message she just received is from Bob and not from Trudy!? (Trudy can impersonate Bob, ask for instance to sell all gold!) Î Example of active attacks Solution: Authentication : Part3, chapter 7-13, handouts
Background image of page 4
Internet Security 5 EE 282 Course Outline/Motivation … ± A related problem to the authentication schemes is the situation where Bob denies that he ever sent
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 23

ch01 - W el om c e! Internet Security EE 282 Electrical...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online