120 likes | 210 Views
GROUP 8. Security Protocol. Usman Ali Suneel Parvaiz Atif Ahmed.
E N D
GROUP 8 Security Protocol Usman Ali SuneelParvaiz Atif Ahmed
“In information technology, a protocol (from the Greek word Protocollon, which was a leaf of paper pasted to a manuscript volume, describing its contents) is the special set of rules that end points in a telecommunication connection use when they communicate”.[1] PROTOCOL
Limit data disclosure to intended set • Monitor communications to catch terrorists • Keep data from being corrupted • Destroy computers with pirated content • Track down bad guys • Communicate anonymously SECURITY
A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods. There are so many security protocols grouped on the basis of algorithm they use to conceal information from unauthorized access. SECURITY PROTOCOL
ARBITRATED PROTOCOL- A third party arbitrates the protocol to ensure no party is cheated. • ADJUDICATED- A third party is called in only if a clash during the execution of the protocol arises. • SELF ENFORCING- No arbitrator is used and the protocol itself ensures fairness. SECURITY PROTOCOL TYPES
The biggest problem in Symmetric Encryptionis that of key management. For communication to take place in an encrypted mode, each party must have the same encryption/decryption key. • COMSET • Conference Key Distribution • Diffie-Hellman • Encrypted Key Exchange (EKE) • Shamir's Three Pass Protocol KEY EXCHANGE SYSTEM
In Public Key Cipher Algorithm we had two types of keys • Public Key • Private Key • ElGamel • LUC • Knapsack • Pohlig-Hellman • Rabin • RSA - Public key algorithm for digital signatures PUBLIC KEY CIPHER ALGORITHMS
This is exactly the same as the above two. These algorithms encrypt data in blocks. Each block is of a specific number of bits. • 3-Way • Blowfish • DES • IDEA • CRAB BLOCK CRYPTOGRAPHIC ALGORITHMS
Authentication • MAC • One Way Hash Function • Identification Schemes • Combined Authentication & Key Exchange Other Security Protocol Groups
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212839,00.htmlhttp://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212839,00.html • http://en.wikipedia.org/wiki/Protocol_%28computing%29 • http://www.comptechdoc.org/independent/security/guide/secprotocols.html • http://www.afn.org/~afn21533/keyexchg.htm REFERENCES