170 likes | 425 Views
ECE509 Cyber Security : Concept, Theory, and Practice. Cryptography Spring 2014. Attack Types. Passive attack: observe communications and/or data Active attack: modify communications and/or data. What are the security services in the OSI model?. Security Services in OSI Model.
E N D
ECE509 Cyber Security :Concept, Theory, and Practice Cryptography Spring 2014
Attack Types • Passive attack: observe communications and/or data • Active attack: modify communications and/or data
Security Services in OSI Model • Physical Layer: • Data-Link Layer: • Network Layer: • Transport Layer: • Session Layer: • Presentation Layer: • Application Layer:
Security Services in OSI Model • Confidentiality • Integrity • Authentication • Access Control • Non-repudiation
Security Mechanisms to provide the needed security services • Checksums/hash algorithms: Authorization and Integrity • Encryption: Confidentiality, Integrity, Authentication • Digital signatures: Integrity, Authentication, Non-repudiation
Secure Sockets Layer (SSL) • Mechanisms: • Hashing • SHA: Secure Hash Algorithm • MD5: Message-Digest algorithm • Encryptions • DES: Data Encryption Standard • RSA: Ron Rivest, AdiShamir, and Leonard Adleman • Signatures • DSA: Digital Signature Algorithm • RSA: Ron Rivest, AdiShamir, and Leonard Adleman
Hash Function Data Data Channel Hashing Message Hash
MAC (Message Authentication Code) Data Data Channel MAC Message MAC Channel
Traditional Encryption(Symmetric Encryption) Common Key Data Data Insecure Channel
Key Agreement Key Agreement Data Data Insecure Channel
Public Key Encryption Data Data Insecure Channel
Digital Signature Data Data Channel Hashing Message Hash Encrypt Signature Signature Channel
Digital Signature Hashing Compare Message Hash Data Signature Decrypt
Message/Data Encryption Encrypted Session Key Encrypted Session Key Channel Data Data Channel
Reading • “Understanding Security Using the OSI Model”, SANS Institute InfoSec Reading Room, [ https://www.sans.org/reading-room/whitepapers/protocols/understanding-security-osi-model-377 ]