EE450-U11-NetworkSecurity-Nazarian-Summer11

EE450-U11-NetworkSec - EE450 Computer Networks Network Security Shahin Nazarian Summer 2011 What is Network Security Shahin Nazarian/EE450/Summer

Info iconThis preview shows pages 1–12. Sign up to view the full content.

View Full Document Right Arrow Icon
EE450 Computer Networks Network Security Shahin Nazarian Summer 2011
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Shahin Nazarian/EE450/Summer 2011 What is Network Security? 2
Background image of page 2
Shahin Nazarian/EE450/Summer 2011 Friends & Enemies: Alice, Bob, & Trudy Well-known in network security world! Bob, Alice (lovers!) want to communicate “securely” Trudy or Eve (intruder) may intercept, delete, add messages secure sender secure receiver channel data, control messages data data Alice Bob Trudy 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Shahin Nazarian/EE450/Summer 2011 Who Might Bob and Alice Be? … well, real-life Bobs and Alices! Web browser/server for electronic transactions (e.g., on-line purchases) On-line banking client/server DNS servers Routers exchanging routing table updates Two email applications that want to exchange secure email 4
Background image of page 4
Shahin Nazarian/EE450/Summer 2011 There are bad guys (and girls) out there! Q: What can a “bad guy” do? A: a lot! Eavesdrop: intercept messages Actively insert messages into connection Impersonation: can fake (spoof) source address in packet (or any field in packet) Hijacking: “take over” ongoing connection by removing sender or receiver, inserting himself in place _________ of service : prevent service from being used by others (e.g., by overloading resources) 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Shahin Nazarian/EE450/Summer 2011 Message Confidentiality 6
Background image of page 6
Shahin Nazarian/EE450/Summer 2011 The Language of Cryptography plaintext plaintext ciphertext K A encryption algorithm decryption algorithm Alice’s encryption key Bob’s decryption key K B 7 Symmetric key crypto.: sender and receiver keys are identical and _______ Asymmetric ( _____-key ) crypto.: encryption key is ________ , however the decryption key is _______ ( private) Knowing the public key, Eve should not be able to calculate the private key Eve
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Shahin Nazarian/EE450/Summer 2011 Comparison between Two Categories of Cryptography
Background image of page 8
Shahin Nazarian/EE450/Summer 2011 Message Confidentiality Using Symmetric Keys in Two Directions 9
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Shahin Nazarian/EE450/Summer 2011 Symmetric Key Cryptography (Cont.) Symmetric key crypto: Bob and Alice share know same (symmetric) key: K A-B E.g., key is knowing substitution pattern in mono alphabetic substitution cipher plaintext ciphertext K A-B encryption algorithm decryption algorithm K A-B plaintext message, m K (m) A-B K (m) A-B m = K ( ) A-B
Background image of page 10
Shahin Nazarian/EE450/Summer 2011 Symmetric Key Cryptography – Example Substitution cipher: Substituting one thing for another Monoalphabetic cipher: substitute one letter for another Plaintext: abcdefghijklmnopqrstuvwxyz Ciphertext: mnbvcxzasdfghjklpoiuytrewq Plaintext: bob. i love you. alice Ciphertext: nkn. s gktc wky. mgsbc E.g.: Q: How hard to break this simple cipher?
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 08/27/2011 for the course EE 450 taught by Professor Zahid during the Summer '06 term at USC.

Page1 / 39

EE450-U11-NetworkSec - EE450 Computer Networks Network Security Shahin Nazarian Summer 2011 What is Network Security Shahin Nazarian/EE450/Summer

This preview shows document pages 1 - 12. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online