1 / 11

CPE5021 Advanced Network Security --- Reading in Security---

CPE5021 Advanced Network Security --- Reading in Security---. Outline. Discuss important security issues in the future. Choose the right technology for security. Find the main focuses of security. Further research and reading in security. References.

monita
Download Presentation

CPE5021 Advanced Network Security --- Reading in Security---

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CPE5021Advanced Network Security--- Reading in Security---

  2. Outline • Discuss important security issues in the future. • Choose the right technology for security. • Find the main focuses of security. • Further research and reading in security. CPE5021 - Advanced Nework Security

  3. References • An Introduction to Probabilistic Encryption by George J. Fuchsbauer – Osjecki Matematicki List 6(2006), 37-44 • “Quantum Cryptosystem”: Practical Technologies, TAJIMA AKIO(Nec) NAMBU YOSHIHIRO(Nec)   Journal Title;OptronicsJournal Code:Y0019AISSN:0286-9659VOL.;NO.285;PAGE.110-114(2005) • Tutorial on Qunatum Cryptography - http://www.cs.dartmouth.edu/~jford/crypto.html • Group key systems and dynamic key generation : Theory and Applications ( please get the papers from Tony Yang, Ping Wu, Osama Dandash or Harry Ngo by looking up their webpages at Monash) • Phu Dung Le & Yi (Tony) Yang • Phu Dung Le & Ping Wu • Phu Dung Le & Osama Dandash • Phu Dung Le & Harry Ngo CPE5021 - Advanced Nework Security

  4. Future Security • Should IT community focus on improving the security of the Internet? • Can we make the Internet more secure? If YES, then • Is it O.K with everyone? • Is implementation feasible? • What will be the trend of cryptography? • Quantum crypto? • Dynamic key crypto system? • One-time pad crypto system? • Probabilistic cryptosystem? • Different approaches to Public Key System? • Should certificates be uniformly used for authentication of all services? • How will we deal with wireless malicious code? • What authentication model will be used? CPE5021 - Advanced Nework Security

  5. Security developments • Intelligent IDS • Wireless anti-malicious code system • Wireless information sharing • Wireless database management system and security • Group authentication • Authentication of services • Authentication of users of different groups CPE5021 - Advanced Nework Security

  6. Trend of cryptosystems: Probabilistic encryption • Encrypt a plaintext P using a key K & an encryption algorithm E C = E(K,P) • Decrypt a ciphertext C using the same key K and the matching decryption algorithm D P = D(K,C) • Note: P = D(K,C) = D(K, E(K,P)) CPE5021 - Advanced Nework Security

  7. Can we create a probabilistic crypto system? • Fist time: C1 = E(K,P) • Second time: C2 = E(K,P) • Nth time: Cn = E(K,P) • C1, C2, … Cn are all different (An Introduction to Probabilistic Encryption by George J. Fuchsbauer – Osjecki Matematicki List 6(2006), 37-44) CPE5021 - Advanced Nework Security

  8. Quantum cryptosystems • With quantum physics we can make a system that we can detect taping, so do we still need a crypto system? • Will quantum cryptosystems replace other cryptosystems? • Are quantum cryptosystems 100% secure? • Can we use quantum cryptosystems for authentication? CPE5021 - Advanced Nework Security

  9. Dynamic key systems • Problem with static key systems and the demand for dynamic key systems • Wireless services • Increase in computer power and attacking techniques • Is it possible to generate a different key each time we use? If yes, then • Can we use this technique for storing information? CPE5021 - Advanced Nework Security

  10. Group key cryptosystems • Information and services are building up. • Many applications have group information sharing in nature. • Medical systems • Military systems • Banking systems • Record tracking systems CPE5021 - Advanced Nework Security

  11. Main focuses of security • Wireless authentication and information sharing. • Users and services authentication. • Wireless anti-malicious code systems. • New attacks embedded in multimedia-data. • Information and black mailing. • Intelligent IDS systems with learning capacity. CPE5021 - Advanced Nework Security

More Related