W 13 SKR 3200
W 13 SKR 3200
W 13 SKR 3200
1
Learning Outcome
• Explain the network security services(C4)
• Show the cryptography techniques(P3)
• Explain the network management services (C4)
2
SECURITY SERVICES
3
Message Confidentiality
• Message confidentiality or privacy means that the
sender and the receiver expect confidentiality.
• The transmitted message must make sense to only
the intended receiver.
• To all others, the message must be garbage.
• The message must be encrypted at the sender site
and decrypted at the receiver site.
• This can be done using either symmetric-key
cryptography or asymmetric-key cryptography.
Confidentiality with Symmetric-Key Cryptography
Confidentiality with Asymmetric-Key Cryptography
4
Message confidentiality using symmetric keys in two directions
5
Message confidentiality using asymmetric keys
6
Message Integrity
• Message integrity means that the data must arrive at
the receiver exactly as they were sent.
• Encryption and decryption provide secrecy, or
confidentiality, but not integrity.
• However, on occasion we may not even need secrecy,
but instead must have integrity.
Document and Fingerprint
Message and Message Digest
Creating and Checking the Digest
Hash Function Criteria
Hash Algorithms: SHA-1
7
Note
8
Message and message digest
Note
9
Checking integrity
10
Criteria of a hash function
Strong collision resistance: Ensue that we cannot fine two messages that
hash to the same digest.
11
Message digest creation
12
Note
13
Processing of one block in SHA-1
14
Message Authentication
• Message authentication is a service beyond message
integrity.
• In message authentication the receiver needs to be sure
of the sender’s identity and that an imposter has not sent
the message.
• A hash function per se cannot provide authentication.
• The digest created by a hash function can detect any
modification in the message, but not authentication.
MAC: A keyed Message Authentication Code
HMAC: Hashed MAC uses keyless hash function such as SHA-1
15
MAC, created by Alice and checked by Bob
16
HMAC
17
Message Non-repudiation
• Message non-repudiation means that a sender must not
be able to deny sending a message that he or she, in
fact, did send.
• The burden of proof falls on the receiver.
Note
18
Using a trusted center for non-repudiation
19
Digital Signature
• When Alice sends a message to Bob, Bob needs to
check the authenticity of the sender; he needs to be
sure that the message comes from Alice and not Eve.
• Bob can ask Alice to sign the message electronically.
• In other words, an electronic signature can prove the
authenticity of Alice as the sender of the message.
• We refer to this type of signature as a digital signature.
Note
20
Signing the message itself in digital signature
21
Note
22
Signing the digest in a digital signature
23
Note
24
Entity Authentication
25
Entity Authentication
26
Note
In challenge-response authentication,
the claimant proves that she knows a secret without
revealing it.
27
Note
28
Challenge/response authentication using a nonce
29
Challenge-response authentication using a timestamp
30
Challenge-response authentication using a keyed-hash function
31
Authentication, asymmetric-key
32
Authentication, using digital signature
33
Network Management System
34
Functions of a network management system
35
Configuration Management
36
Fault Management
37
Performance Management
38
Security and Accounting Management
• Security Management
– Is responsible for controlling access to the network based on
the predefined policy
• Accounting Management
– Is the control of users’ access to network resources through
charges.
– Individual users, departments, divisions are charged for the
services they receive from the network maybe for budgeting
purpose
39
Simple Network Management
Protocol (SNMP)
• The Simple Network Management Protocol
(SNMP) is a framework for managing devices in an
internet using the TCP/IP protocol suite.
40