1 / 16

ECE509 Cyber Security : Concept, Theory, and Practice

ECE509 Cyber Security : Concept, Theory, and Practice. Cryptography Spring 2014. Attack Types. Passive attack: observe communications and/or data Active attack: modify communications and/or data. What are the security services in the OSI model?. Security Services in OSI Model.

Download Presentation

ECE509 Cyber Security : Concept, Theory, and Practice

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ECE509 Cyber Security :Concept, Theory, and Practice Cryptography Spring 2014

  2. Attack Types • Passive attack: observe communications and/or data • Active attack: modify communications and/or data

  3. What are the security services in the OSI model?

  4. Security Services in OSI Model • Physical Layer: • Data-Link Layer: • Network Layer: • Transport Layer: • Session Layer: • Presentation Layer: • Application Layer:

  5. Security Services in OSI Model • Confidentiality • Integrity • Authentication • Access Control • Non-repudiation

  6. Security Mechanisms to provide the needed security services • Checksums/hash algorithms: Authorization and Integrity • Encryption: Confidentiality, Integrity, Authentication • Digital signatures: Integrity, Authentication, Non-repudiation

  7. Secure Sockets Layer (SSL) • Mechanisms: • Hashing • SHA: Secure Hash Algorithm • MD5: Message-Digest algorithm • Encryptions • DES: Data Encryption Standard • RSA: Ron Rivest, AdiShamir, and Leonard Adleman • Signatures • DSA: Digital Signature Algorithm • RSA: Ron Rivest, AdiShamir, and Leonard Adleman

  8. Hash Function Data Data Channel Hashing Message Hash

  9. MAC (Message Authentication Code) Data Data Channel MAC Message MAC Channel

  10. Traditional Encryption(Symmetric Encryption) Common Key Data Data Insecure Channel

  11. Key Agreement Key Agreement Data Data Insecure Channel

  12. Public Key Encryption Data Data Insecure Channel

  13. Digital Signature Data Data Channel Hashing Message Hash Encrypt Signature Signature Channel

  14. Digital Signature Hashing Compare Message Hash Data Signature Decrypt

  15. Message/Data Encryption Encrypted Session Key Encrypted Session Key Channel Data Data Channel

  16. Reading • “Understanding Security Using the OSI Model”, SANS Institute InfoSec Reading Room, [ https://www.sans.org/reading-room/whitepapers/protocols/understanding-security-osi-model-377 ]

More Related