Module 7.
7
Basic Terminologies
Network Security
Application layer
E-mail: PGP, using a web-of-trust
Web: HTTP-S, using a certificate hierarchy
Transport layer
Transport Layer Security/ Secure Socket
Layer
Network layer
IP Sec
Network infrastructure
DNS-Sec and BGP-Sec
2
Basic Security Properties
Confidentiality:
Authenticity:
Integrity:
Availability:
Non-repudiation:
Access control:
3
Basic Security Properties
Confidentiality: Concealment of information or resources
Authenticity: Identification and assurance of origin of
info
Integrity: Trustworthiness of data or resources in terms of
preventing improper and unauthorized changes
Availability: Ability to use desired information or
resource
Non-repudiation: Offer of evidence that a party indeed
is sender or a receiver of certain information
Access control: Facilities to determine and enforce who
is allowed access to what resources (host, software,
network, )
4
Encryption and
MAC/Signatures
Confidentiality (Encryption)Auth/Integrity (MAC / Signature)
Sender: Sender:
Compute C = EncK(M) Compute s = SigK(Hash (M))
Send C Send <M, s>
Receiver: Receiver:
Recover M = DecK(C) Compute s = VerK(Hash (M))
Check s == s
These are simplified forms of the actual
algorithms
5