120 likes | 373 Views
CPE5021 Advanced Network Security --- Reading in Security---. Outline. Discuss important security issues in the future. Choose the right technology for security. Find the main focuses of security. Further research and reading in security. References.
E N D
Outline • Discuss important security issues in the future. • Choose the right technology for security. • Find the main focuses of security. • Further research and reading in security. CPE5021 - Advanced Nework Security
References • An Introduction to Probabilistic Encryption by George J. Fuchsbauer – Osjecki Matematicki List 6(2006), 37-44 • “Quantum Cryptosystem”: Practical Technologies, TAJIMA AKIO(Nec) NAMBU YOSHIHIRO(Nec) Journal Title;OptronicsJournal Code:Y0019AISSN:0286-9659VOL.;NO.285;PAGE.110-114(2005) • Tutorial on Qunatum Cryptography - http://www.cs.dartmouth.edu/~jford/crypto.html • Group key systems and dynamic key generation : Theory and Applications ( please get the papers from Tony Yang, Ping Wu, Osama Dandash or Harry Ngo by looking up their webpages at Monash) • Phu Dung Le & Yi (Tony) Yang • Phu Dung Le & Ping Wu • Phu Dung Le & Osama Dandash • Phu Dung Le & Harry Ngo CPE5021 - Advanced Nework Security
Future Security • Should IT community focus on improving the security of the Internet? • Can we make the Internet more secure? If YES, then • Is it O.K with everyone? • Is implementation feasible? • What will be the trend of cryptography? • Quantum crypto? • Dynamic key crypto system? • One-time pad crypto system? • Probabilistic cryptosystem? • Different approaches to Public Key System? • Should certificates be uniformly used for authentication of all services? • How will we deal with wireless malicious code? • What authentication model will be used? CPE5021 - Advanced Nework Security
Security developments • Intelligent IDS • Wireless anti-malicious code system • Wireless information sharing • Wireless database management system and security • Group authentication • Authentication of services • Authentication of users of different groups CPE5021 - Advanced Nework Security
Trend of cryptosystems: Probabilistic encryption • Encrypt a plaintext P using a key K & an encryption algorithm E C = E(K,P) • Decrypt a ciphertext C using the same key K and the matching decryption algorithm D P = D(K,C) • Note: P = D(K,C) = D(K, E(K,P)) CPE5021 - Advanced Nework Security
Can we create a probabilistic crypto system? • Fist time: C1 = E(K,P) • Second time: C2 = E(K,P) • Nth time: Cn = E(K,P) • C1, C2, … Cn are all different (An Introduction to Probabilistic Encryption by George J. Fuchsbauer – Osjecki Matematicki List 6(2006), 37-44) CPE5021 - Advanced Nework Security
Quantum cryptosystems • With quantum physics we can make a system that we can detect taping, so do we still need a crypto system? • Will quantum cryptosystems replace other cryptosystems? • Are quantum cryptosystems 100% secure? • Can we use quantum cryptosystems for authentication? CPE5021 - Advanced Nework Security
Dynamic key systems • Problem with static key systems and the demand for dynamic key systems • Wireless services • Increase in computer power and attacking techniques • Is it possible to generate a different key each time we use? If yes, then • Can we use this technique for storing information? CPE5021 - Advanced Nework Security
Group key cryptosystems • Information and services are building up. • Many applications have group information sharing in nature. • Medical systems • Military systems • Banking systems • Record tracking systems CPE5021 - Advanced Nework Security
Main focuses of security • Wireless authentication and information sharing. • Users and services authentication. • Wireless anti-malicious code systems. • New attacks embedded in multimedia-data. • Information and black mailing. • Intelligent IDS systems with learning capacity. CPE5021 - Advanced Nework Security