160 likes | 173 Views
Security in Network Communications. Deepti Reddy Suphannee Sae Chai Sarah Summers. Presentation Overview. Motivation Communication Security Issues Secure Email. Motivation. Network Communications are a fact of every day life. Need to protect sensitive information.
E N D
Security in Network Communications Deepti Reddy Suphannee Sae Chai Sarah Summers CS522 Computer Communications
Presentation Overview • Motivation • Communication Security Issues • Secure Email CS522 Computer Communications
Motivation • Network Communications are a fact of every day life. • Need to protect sensitive information. • Need to control access. CS522 Computer Communications
Communication Security Issues • Confidentiality • Authentication • Integrity • Non-repudiation CS522 Computer Communications
Email Security Protocols • PGP (Pretty Good Privacy) • PEM • S/MIME CS522 Computer Communications
PGP (Pretty Good Privacy) • Hybrid Crypto System • Combines Features of Symmetric and Asymmetric Cryptography • Confidentiality • Authentication • Digital Signatures • Compression CS522 Computer Communications
How PGP Works • Preprocessor invoked by user • Compresses plaintext using MD5 • Resulting Hash encrypted using RSA with sender’s private key • PGP concatenates encrypted hash and original message into single message and compresses it using a ZIP programme CS522 Computer Communications
How PGP Works? • PGP generates a session key using the IDEA algorithm • Key generated from random key strokes and mouse movements • Session key encrypted using receiver’s public key • Encrypted session key and zipped message are concatenated and converted to base 64 CS522 Computer Communications
PGP Encryption CS522 Computer Communications
Future Work • Staying ahead of attackers by developing stronger algorithms and security techniques. • Modification of current protocols. • Creation of new protocols. CS522 Computer Communications
Conclusions • Network Communications security is a broad and complex subject. • Cryptographic methods are the solution. • Security mechanisms will always be attacked and eventually broken. CS522 Computer Communications
Questions ?Under Pain of Death! CS522 Computer Communications
References [1] Communication Security – available techniques, AXIS Communications White Paper, http://www.axis.com/documentation/whitepaper/security.pdf [2] IDEA (International Data Encryption Algorithm) http://www.quadibloc.com/crypto/co040302.htm [3] International Data Encryption Algorithm – Technical Description, http://www.mediacrypt.com/_pdf/IDEA_Technical_Description_0105.pdf [4] How PGP Works, http://www.pgpi.org/doc/pgpintro CS522 Computer Communications
IDEA ALGORITHM • International Data Encryption Algorithm • Block Cipher Algorithm • Operates on 64 bit plaintext and cipher text blocks • Utilizes 128 bit key CS522 Computer Communications
How IDEA Works • Comprised of 8 identical encryption processes (rounds) followed by a final output transformation • Plaintext partitioned into four 16 bit sub-blocks • Three operations used to combine two 16-bit values to produce a 16-bit result -addition, XOR and multiplication CS522 Computer Communications
How IDEA Works (conitnued) CS522 Computer Communications