21-NetworkSecurity

21 networksecurity

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Data and Computer Communications Communications Chapter 21 – Network Security Eighth Edition by William Stallings Lecture slides by Lawrie Brown Network Security Network To guard against the baneful influence exerted by strangers is therefore an elementary dictate of savage prudence. Hence before strangers are allowed to enter a district, or at least before they are permitted to mingle freely with the inhabitants, certain ceremonies are often performed by the natives of the country for the purpose of disarming the strangers of their magical powers, or of disinfecting, so to speak, the tainted atmosphere by which they are supposed to be surrounded. —The Golden Bough, Sir James George Frazer Security Requirements Security confidentiality - protect data content/access integrity - protect data accuracy availability - ensure timely service authenticity - protect data origin Passive Attacks Passive eavesdropping on transmissions to obtain information release of possibly sensitive/confidential release message contents message traffic analysis which monitors frequency and traffic length of messages to get info on senders length difficult to detect can be prevented using encryption Active Attacks Active masquerade pretending to be a different entity replay modification of messages denial of service easy to detect detection may lead to deterrent focus on detection and recovery hard to prevent Symmetric Encryption Symmetric Requirements for Security Requirements strong encryption algorithm even known, unable to decrypt without key even if many plaintexts & ciphertexts available sender and receiver must obtain secret sender key securely key once key is known, all communication once using this key is readable using Attacking Encryption Attacking cryptanalysis relay on nature of algorithm plus some knowledge of relay general characteristics of plaintext general attempt to deduce plaintext or key try every pos...
View Full Document

This note was uploaded on 04/06/2011 for the course EE 5363 taught by Professor Kang during the Spring '09 term at NYU Poly.

Ask a homework question - tutors are online