Unit-3 1
Unit-3 1
Network Security
1
UNIT 1
2
Aspects of Security
security service
note terms
threat – a potential for violation of security
3
Key Security Concepts
4
Confidentiality
6
Availability
7
Taxonomy of attacks with relation to
security goals
8
Attacks on confidentiality(Passive)
9
Attacks on confidentiality(Passive)
10
Attacks on Integrity(Active)
12
Handling Attacks
11/28/2023 13
Model for Network Security
14
Symmetric Encryption
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Objectives
To distinguish between two cryptosystems:
symmetric-key and asymmetric-key
To introduce trapdoor one-way functions and their
use in asymmetric-key cryptosystems
To discuss the RSA cryptosystem
To discuss the ElGamal cryptosystem
To discuss the elliptic curve cryptosystem
INTRODUCTION TO PUBLIC-KEY
CRYPTOGRAPHY
Symmetric and asymmetric-key cryptography will exist
in parallel and continue to serve the community. We
actually believe that they are complements of each
other; the advantages of one can compensate for the
disadvantages of the other.
Note
Symmetric-key cryptography is based on sharing secrecy;
asymmetric-key cryptography is based on personal secrecy.
10.24
public-key/two-key/asymmetric cryptography
involves the use of two keys:
Encryption/Decryption
C = e(Kpublic , P) P = d(Kprivate , C)
Message Integrity
and
Message Authentication
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
11.32
Message Authentication
95