• Network Security - Lecture 22Network Security - Lecture 22

    In today’s we explored the limitations of the centralized key distribution and have explored key distribution in a decentralized fashion. Message Authentication Mechanism Message encryption MAC Hash

    pptx34 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 518 | Lượt tải: 0

  • Network Security - Lecture 21Network Security - Lecture 21

    In today’s we continued our discussion about Confidentiality using symmetric encryption Key exchange is a challenging task in symmetric key cryptography. We discussed the role of KDC The design constraints for Key Distribution was also explored

    pptx24 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 590 | Lượt tải: 0

  • Network Security - Lecture 20Network Security - Lecture 20

    link encryption obscure header details but overall traffic volumes in networks and at end-points is still visible traffic padding can further obscure flows End to end Encryption Application layer: communicating entities are visible Transport layer: network address and traffic patterns are visible Uniform Padding deny an opponent knowledge of ...

    pptx23 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 556 | Lượt tải: 0

  • Network Security - Lecture 19Network Security - Lecture 19

    We explored an example of PKC, i.e., RSA. In today’s lecture we talked about the random numbers and the random number generators We have also discussed random numbers and pseudorandom numbers. The design constraints were also discussed.

    pptx27 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 555 | Lượt tải: 0

  • Network Security - Lecture 18Network Security - Lecture 18

    Given knowledge of the algorithm used to create the numbers and its internal state (i.e. seed), you can predict all the numbers returned by subsequent calls to the algorithm, whereas with genuinely random numbers, knowledge of one number or an arbitrarily long sequence of numbers is of no use whatsoever in predicting the next number to be generated...

    pptx20 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 527 | Lượt tải: 0

  • Network Security - Lecture 17Network Security - Lecture 17

    An example of RSA algorithm was discussed. We will talk about random numbers. The design constraints for random numbers and pseudo random numbers will be explored

    pptx35 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 515 | Lượt tải: 0

  • Network Security - Lecture 16Network Security - Lecture 16

    claimed secure against known attacks have some analyses, none practical result is very non-linear since RC4 is a stream cipher, must never reuse a key have a concern with WEP, but due to key handling rather than RC4 itself

    pptx35 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 591 | Lượt tải: 0

  • Network Security - Lecture 15Network Security - Lecture 15

    can efficiently implement on 32-bit CPU redefine steps to use 32-bit words can precompute 4 tables of 256-words then each column in each round can be computed using 4 table lookups + 4 XORs at a cost of 4Kb to store tables designers believe this very efficient implementation was a key factor in its selection as the AES cipher

    pptx35 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 599 | Lượt tải: 0

  • Network Security - Lecture 14Network Security - Lecture 14

    We discussed symmetric key cryptography We also discussed Fiestel Structure which is the basis of DES Data Encryption Standard (DES) is a type of symmetric key cryptography which uses certain steps to obtain the cipher text through plain text.

    pptx32 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 501 | Lượt tải: 0

  • Network Security - Lecture 13Network Security - Lecture 13

    We discussed transposition ciphers and a couple of examples such as Rail Fence Cipher was discussed. We have also explored the Hill Cipher and have seen how this technique can ensure security.

    pptx29 trang | Chia sẻ: dntpro1256 | Ngày: 20/11/2020 | Lượt xem: 493 | Lượt tải: 0