network security section 1: introduction to security

13
Network Security Section 1: Introduction to security

Upload: jerome-may

Post on 13-Jan-2016

223 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Network Security Section 1: Introduction to security

Network Security

Section 1: Introduction to security

Page 2: Network Security Section 1: Introduction to security

What is Security?

• What is the biggest enemy for humans?H U M A N S!

• We need security until the people with bad minds exists!

• What is the best solution for security?

No high-tech hardware

No high-tech software

Change the way of thinking!

SIMPLEBUT

HARD TO DO!

Page 3: Network Security Section 1: Introduction to security

Why security?

• Why Linux is more secure than Windows?

Popularity of Windows

• Why Firefox is more secure that IE?

Popularity of IE

• Why network security is not important in IRAN?

Unpopularity of information in computers

Page 4: Network Security Section 1: Introduction to security

What is Network Security?

C I A

Confidentiality

Integrity Availability

Page 5: Network Security Section 1: Introduction to security

People with bad minds

Page 6: Network Security Section 1: Introduction to security

Network Security Problems

• Secrecy

• Authentication

• Non-repudiation

• Integrity Control

Page 7: Network Security Section 1: Introduction to security

Physical vs. Network Security

• Security in real word– Voice, Face, Handwritting

• Security in Network– Cryptography, Digital Signature

Page 8: Network Security Section 1: Introduction to security

Cryptography

• Cryptography Lexicon

• Cipher vs. Code

• Plaintext, Key, Cipher text

• Crypto analysis

• Cryptology

• Work Factor

Page 9: Network Security Section 1: Introduction to security

C = Ek(P) & P = Dk(C)

• C: Cipher text, K: Key, P: Plaintext

• E: Encryption Function

• D: Decryption Function

• Dk(Ek(P)) = ?

• Main Rule for Cryptography: Algorithm must be clear for all only key is hidden.

• Security by obscurity

Page 10: Network Security Section 1: Introduction to security

Crack Cipher text

• Problems:– Cipher text Only– Known Plaintext– Chosen Plaintext

• Cipher text only– Do you think it’s not crack able?

Yes!

No, What is your idea?

Page 11: Network Security Section 1: Introduction to security

Substitution Cipher

• One or group of character(s) substitute with another character.

• A => D, B => E, C => F.

• Attack => DWWDFN

• kths character substitution.

• What is your idea for cracking it?– Estimating usual character, Estimating usual

word

Page 12: Network Security Section 1: Introduction to security

Transposition Cipher

• Change the situation/ Transpose of characters.

Any idea for cracking this kind of encryption?

Page 13: Network Security Section 1: Introduction to security

One-Time Pads

• Use random key.

• Not crack able at all! Because of information theory.

• Example: I LOVE YOU! What are the problems?

Long padsHard to transportation