Types of Cryptography
Types of Cryptography
Types of Cryptography
NETWORK SECURITY
1
CONTENTS
• What is Cryptography?
• Types of Cryptography
1. Secret(symmetric) Key Cryptography.
2. Public(asymmetric) Key Cryptography.
3. Hash Functions.
4. Trust Models.
2
Does security provide some very basic protections that we are
naive to believe that we don't need? During this time when the Internet
provides essential communication between tens of millions of people and is
being increasingly used as a tool for commerce, security becomes a
tremendously important issue to deal with.
There are many aspects to security and many applications,
Ranging from secure commerce and payments to private
communications and protecting passwords. One essential aspect for
Secure communications is that of cryptography.
3
1. Secret Key Cryptography
4
Secret key cryptography schemes are generally categorized as being either
stream ciphers or block ciphers.
Stream ciphers operate on a single bit (byte or computer word) at a
time and implement some form of feedback mechanism so that the key is
constantly changing. A block cipher is so- called because the scheme
encrypts one block of data at a time using the same key on each block. In
general, the same plain text block will always encrypt to the same cipher
text when using the same key in a block cipher whereas the same plaintext
will encrypt to different ciphertext in a stream cipher.
4. TRUST MODELS
Secure use of cryptography requires trust. While secret key
cryptography can ensure message confidentiality and hash codes can
ensure integrity, none of this works without trust. In SKC, PKC solved the
secret distribution problem,
There are a number of trust models employed by various
cryptographic schemes.
5
• The web of trust employed by Pretty Good Privacy (PGP) users, who
hold their own set of trusted public keys.
• Kerberos, a secret key distribution scheme using a trusted third party.
• Certificates, which allow a set of trusted third parties to authenticate
each other and, by implication, each other's users.
Each of these trust models differs in complexity, general applicability,
scope, and scalability.
Types of authority
• Establish identity: Associate, or bind, a public key to an individual,
organization, corporate position, or other entity.
• Assign authority: Establish what actions the holder may or may not
take based upon this certificate.
• Secure confidential information (e.g., encrypting the session's
symmetric key for data confidentiality).
----------------------------------------------------------------------------
6
• Application backdoors - Some programs have special features that allow
for remote access . Others contain bugs that provide a backdoor , or hidden
access , that provides some level of control of the program.
• Denial of service - You have probably heard this phrase used in news
reports on the attacks on major Web sites . This type of attack is nearly
Impossible to counter . What happens is that the hacker sends a request to
the server to connect to it . When the server responds with an
acknowledgement and tries to establish a session , it cannot find the system
that made the request . By inundating a server with these unanswerable
session requests , a hacker causes the server to slow to a crawl or
eventually crash.
7
Network security can be done by various methods.
Step 1. - The remote user dials into their local ISP and logs into the ISP’s network
as usual.
Step 2. - When connectivity to the corporate network is desired, the user initiates a
tunnel request to the destination Security server on the corporate network. The
security server authenticates the user and creates the other end of tunnel.
8
Step 3. - The user then sends data through the tunnel which encrypted by the VPN
software before being sent over the ISP connection.
Step 4. - The destination Security server receives the encrypted data and decrypts.
The Security server then forwards the decrypted data packets onto the corporate
network. Any information sent back to the Remote user is also encrypted before
being sent over the Internet.
9
2.Firewalls:
A firewall provides a strong barrier between your private network and
the Internet . You can set firewalls to restrict the number of open ports ,
what type of packets are passed through and which protocols are allowed
through . You should already have a good firewall in place before you
implement a VPN , but a firewall can also be used to terminate the VPN
sessions .
3.IPSec -
Internet Protocol Security Protocol (IPSec) provides
enhanced security features such as better encryption algorithms and more
comprehensive authentication . IPSec has two encryption modes : tunnel and
transport . Tunnel encrypts the header and the payload of each packet while
transport only encrypts the payload. Only systems that are IPSec compliant
can take advantage of this Protocol . Also , all devices must use a
common key and the firewalls of each network must have very similar
security policies set up. IPSec can encrypt data between various devices ,
such as :
Router to router
Firewall to router
PC to router
PC to server
10
4. AAA Server - AAA (authentication , authorization and accounting)
servers are used for more secure access in a remote-access VPN environment
. When a request to establish a session comes in from a dial up client , the
Request is proxies to the AAA server . AAA then checks the following :
Who you are (authentication)
What you are allowed to do (authorization)
What you actually do (accounting)
The accounting information is especially useful for tracking client. Use for
security auditing , billing or reporting purposes .
11