Академический Документы
Профессиональный Документы
Культура Документы
html
NETWORK SECURITY
1 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
ABSTRACT
Now a day’s people are using networks in all fields, mainly for
Banking, Shopping, Business applications, and filing their tax returns and day
by day Internet and its applications are also increasing at rapid rate. Therefore
the growing Net requires security for their data and authentication. So the
network security got a lot of attention. To provide security for the people who
are losing sleep trying to protect the endless terabytes of data contained in
millions of networked computers from prowling hackers, virus writers and
information stealers, cryptography was evolved. It provides a solution to the
electronic security and privacy issue.
Public Key cryptography is a system for supporting digital
signatures and document encryption for an organization. It is fast becoming
essential for an effective secure commerce and to fulfill general security and
authentication requirements over non-secure networks. The banking services
are the most popular usage of this technology, which is quickly spreading
over all the applications that need security to be fully operational.
If electronic signatures were used to secure the data then security
could easily be compromised. The objective of this paper is to briefly describe
about how this problem can avoided using Digital signature mechanism and
digital signature associated with encryption.
2 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
INTRODUCTION
Network security measures are needed to protect data during their
transmission, and to generate guarantee that data transmissions are authentic.
Malicious people trying to gain some benefit, get attention, or to harm
someone intentionally cause most security problems. The most common
security problems in networks are as listed below:
ADVERSARY GOAL
Student To have fun snooping on people’s e-mail
Cracker To test out someone’s security system; steal data
Businessma To discover a competitor’s strategic marketing plan
n
Accountant To embezzle money from a company
Conman To steal credit card numbers for sale
Spy To learn an enemy’s military or industrial secrets
Terrorist To steal germ warfare secrets.
3 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
machine invented was the Enigma, used in the Second World War to send
military messages.
Types of Cryptosystems
There are two kinds of cryptosystems:
1. Secret key crypto system (Symmetric)
2. Public key crypto system (Asymmetric)
Symmetric (Private Key) Encryption
Symmetric encryption is the simpler of the two classes of key-based
encryption algorithms. In this class, the same key is used to encrypt and
decrypt the message. Taking our example, Alice would encrypt her message
using a key, and then send the message to Bob. Alice would separately
communicate the key to Bob to allow him to decrypt the message. To
maintain security and privacy, Alice and Bob need to ensure that the key
remains private to them. A simple example of this is the use of a password as
4 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
Asymmetric(PublicKey)Encryption
Asymmetric, or Public Key, encryption differs from symmetric
encryption by using a pair of keys instead of a single key. One of the keys is
kept private while the second one is made public so that it can be accessed by
anyone. The key-pair works in a complementary manner – information
encrypted by one key can only be decrypted using the other. This property of
the key-pair can be used to perform two functions, encryption and digital
signatures.
5 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
As long as Bob’s private key has not been compromised, then both Alice and
Bob know that the message is secure.
Asymmetric key encryption algorithms: RSA, Elliptic curve cryptography
(ECC), Cipherunicorn-A,GNU privacy guard,sigma 2000
Digital Signatures
The principle of public/private key-pairs can be used by the sender to
digitally sign a message. The process of digitally signing a message starts
with the creation of a unique identifier for the message. The unique identifier
can be created using a mathematical technique called Hashing. Hashing is the
method used to obtain a "digital fingerprint" (hash) for a given Message A
hash function uses a mathematical algorithm to convert the message into a
short fixed-length string of bits, often referred to as a ‘hash value’ or
‘message digest’, that uniquely represents the message used to create it. The
hash value is specific to the contents of the message, thus any change to the
message contents will change the hash value that would be generated by the
hash function.
Fig. Hashing
Digital signature mechanism
In this mechanism, Sender applies receiver’s public key to encrypt the
message using a digital signature algorithm to generate a digital signature. He
then sends the message along with the digital signature to receiver. Receiver
checks, or verifies, the signature by applying receiver’s private key to the
signature using a digital signature verification algorithm. This confirms that
the message came from the sender and no-one else, as long as the receiver’s
private key remains secure. The message can be re-hashed and compared with
the decrypted hash value – if the values do not match then the message has
been altered since it was sent.
Digital signatures can be used to deliver three of the cryptographic
services authentication, non repudiation, and data integrity. These are
generally the most critical security services for smart card applications. ECC
6 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
can be used to generate strong digital signatures with only a small amount of
processing power.
7 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
The digital signature validates if the message has not been corrupted
during the transmission (Integrity).
8 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
9 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
CONCLUSION
Security is a very difficult topic. Everyone has a different idea of what
“security” is, and what levels of risk are acceptable. The key for building a
secure network is to define what security means to our organization. Once
that has been defined, everything that goes on with the network can be
evaluated with respect to that policy. Many people pay great amounts of lip
service to security, but do not want to be bothered with it when it gets in their
way. It's important to build systems and networks in such a way that the user
is not constantly reminded of the security system around him. Users who find
security policies and systems too restrictive will find ways around them.
Cryptography provides a solution to the problem of information
security and privacy. For electronic communications, the techniques of
private and public key cryptography are becoming increasingly popular. The
implementation of public key cryptography requires several supporting
components to handle key creation, distribution and revocation.
Security is everybody's business, and only with everyone's cooperation,
an intelligent policy, and consistent practices, will it be achievable.
REFERENCES
- Andrew S Tanenbaum, “Computer networks”
10 Email: chinna_chetan05@yahoo.com