Network Security: BITS Pilani
Network Security: BITS Pilani
Network Security
Lecture-1, January 9, 2012 Rahul Banerjee, PhD (CSE)
Professor, Department of Computer Science & Information Systems
E-mail:[email protected], Home: http://universe.bits-pilani.ac.in/pilani/rahulbanerjee/Profile
Interaction Points
About the focus of the course How shall this course be conducted? Resources & Timelines for the course What is Network Security? Elements involved in Network Security Select References to the literature Summary
Methodology to be used:
42
Classroom
lectures
(three
per
week,
as
per
the
provided
course
handout)
Learning
Reinforcements
through:
Online
Discussion
Forum
(at
the
LMS:
hNp://nalanda.bits-pilani.ac.in/
)
Case-studies
interlaced
with
design
discussions
(in
classroom)
Mini-project
/
TheoreQcal
Study
/
Research
Seminar
/
Laboratory
Experiments:
25%
Self-study
assignments
<for
learning
enhancement
at
appropriate
points
of
Qme,
no
evaluaQon
weightage>
Only
ONE
Test:
Mid-Semester
Test
<closed
book>
30%
Quizzes
<Open
Book
/
Open
Notes>
5%
Comprehensive
ExaminaQon
<Open
Book:
20%,
Closed
Book:
20%>
30%
<You
are
allowed
to
carry
Laptops/Notebooks/Netbooks/Tablets/iPads
etc.
with
wireless
access
disabled
in
classrooms
as
well
as
in
open-book
examinaQons
and
quizzes>
11/01/12 (c) Dr. Rahul Banerjee, BITS Pilani, INDIA 4
This page shall have the original slides <in PDF> developed by me
11/01/12
Passive
aNacks
involve
simply
gedng
access
to
link
or
device
and
consequently
data.
(c)
Rahul
Banerjee,
BITS,
Pilani
(India)
8
Role of Cryptography
Symmetric / ConvenQonal cryptography Asymmetric cryptography Built-in OS Security at the Kernel-level Support for Cryptographic APIs Network Protocol Stack design based security
Symmetric-Key
Cryptography
Symmetric-Key
cryptography
is
called
so
since
in
this
class
of
cryptographic
algorithms,
encrypQon
as
well
as
decrypQon
processes
are
performed
using
the
same
(i.e.
symmetric)
key.
The
algorithms
/
schemes
/
programs
that
use
this
paradigm
are
o^en
termed
as
Symmetric-Key
Ciphers
/
Private-Key
Ciphers
/
Secret-Key
Ciphers
/
ConvenQonal
Ciphers
etc.
In
such
cases,
Plaintext,
EncrypQon-DecrypQon
Algorithm,
Key
and
Ciphertext
form
four
basic
components
of
the
Symmetric
Cipher
Model.
Such
schemes
should
exhibit:
Security
of
Key
Distribu0on
to
the
legal
recipients)
Adequate
(c)
Rahul
Banerjee,
BITS,
Pilani
strength
of
Encryp0on
(India)
10
References
Bruce
Schneier:
Applied
Cryptography,
Wiley
Student
EdiQon,
Second
EdiQon,
Singapore,
1996.
Alfred
Menezes,
Paul
van
Oorschot,
and
ScoN
Vanstone:
Handbook
of
Applied
Cryptography.
CRC
Press,
NY.
William
Stallings:
Cryptography
and
Network
Security.
Fi^h
EdiQon,
Pearson,
New
Delhi,
2011.
C.Kauman,
R.Perlman
and
M.Spenser:
Network
Security,
Second
EdiQon,
PrenQce
Hall,
Englewood
Clis,
2002.
S.Bellovin
and
W.Chesvick:
Internet
Security
and
Firewalls,
Second
EdiQon,
Addison-Wesley,
Reading,
1998.
(c)
Rahul
Banerjee,
BITS,
Pilani
(India)
11
12
13
Rahul Banerjee