Security

Security - Network Security 1 What do We Need?...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Network Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Communication Networks © Kang Xi, Polytechnic Institute of NYU 2 What do We Need? Confidentiality You are downloading your credit card statement, if Mr. Hacker captures your packets…. Integrity How to detect a message has been modified… Availability Available to authorized parties Authenticity You have a link to your bank, how do you know it is not Mr. Phisher’s bank?
Background image of page 2
Encryption Make the content of a message unreadable to anyone except those possessing special knowledge Special knowledge often consists of a secret key and decryption method Communication Networks © Kang Xi, Polytechnic Institute of NYU 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Communication Networks © Kang Xi, Polytechnic Institute of NYU 4 Symmetric Encryption Sender and receiver Share the same Secret Key Sender Encryption algorithm( Plaintext, Key ) Ciphertext Receiver Decryption algorithm( Ciphertext, Key ) Plaintext
Background image of page 4
Communication Networks © Kang Xi, Polytechnic Institute of NYU 5 Example Algorithm: XOR Plaintext: 1101 1001 1111 Key: 1001 Cyphertext: 0100 0000 0110 How to attack for the key?
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Communication Networks © Kang Xi, Polytechnic Institute of NYU 6 Cryptanalysis Know both plaintext and cyphertext Exploit algorithm characteristics for keys Example: Plaintext: 1101 1001 1111 Cyphertext: 0100 0000 0110 XOR: 1001 1001 1001
Background image of page 6
Communication Networks © Kang Xi, Polytechnic Institute of NYU 7 Brute-force Try all possible keys on cyphertext to get an intelligible plaintext
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Communication Networks © Kang Xi, Polytechnic Institute of NYU 8 Requirements for Strong Encryption Long keys
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/06/2011 for the course EE 5363 taught by Professor Kang during the Spring '09 term at NYU Poly.

Page1 / 27

Security - Network Security 1 What do We Need?...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online