CS 134 Elements Of Cryptography And Computer &

2y ago
63 Views
5 Downloads
937.55 KB
33 Pages
Last View : 22d ago
Last Download : 3m ago
Upload by : Angela Sonnier
Transcription

CS 134Elements of Cryptography andComputer & Network SecurityFall 2019Instructor: Qi Alfred Chenhttps://www.ics.uci.edu/ alfchen/teaching/cs134-2019-Fall[lecture slides are adapted from previous slides by Prof. Gene Tsudik]1

Today Administrative Stuff Course Organization Course Topics Gentle Introduction Basics of Cryptography (Crypto)2

CS 134 Background Classes: Tu/Th 2-3:20pm @ HSLH 100A 4 discussion sessions: W W W W8-8:509-9:501-1:502-2:50AM SH 128AM SH 128PM PSCB 140PM PSCB 140Senior-level undergraduate courseSome overlap with CS 203 / NetSYS 240 (graduate)Offered yearly since 2002Last time offered Spring 20193

Why (not) take this course? Difficult course material There will be some unusual math e.g., number theory, group theory Tough grading might work hard and still wind up with a “C” Mean instructor Lecture slides may not available ahead of class No drop after second week No [Pass/No-Pass] option4

Contact Information Instructor: Qi Alfred Chen -- Just call me “Alfred”– Email: alfchen@uci.edu– Assistant Prof. in CS– Research area: Cybersecurity–Most interested in the attack side–Breaking things, especially real-world systems, are fun!– Past: Smartphone, network protocols, GUI, access control, – Recent: Smart home, self-driving cars, smart traffic light, ––Also work on the defense side––My attack demo videos on YouTube attracted 90,000 views (as of this year) from allover the world (daily peak of 17,000 views )Fixing problems are bigger contributions!More details in my website: https://www.ics.uci.edu/ alfchen/– Office Hours: Wednesdays, 4-5 PM, DBH 3204 More if needed, e.g., before midterm and/or final Otherwise, by appointment: contact by email but try TA-s first5

Contact Information TAs: Yoshimichi NakatsukaContact: nakatsuy@uci.edu Samuel PangestuContact: spangest@uci.edu Readers: Takami SatoContact: takamis@uci.edu Ziwen WanContact: ziwen.wan@uci.eduOFFICE HOURS: Thursday 5-6 PM (starting next week), DBH 4011ICS2214, 215, 216, 217Please only use Piazza for questions to TA/readers; emails above are only foremergency use6

PrerequisitesIdeally, at least 2 of:– Operating Systems (CS 143A)– Distributed Systems (CS 131)– Computer Networks (CS 132)AND:– Design/Analysis of Algorithms (CS 161)7

Class Info Lecture format––––lecture slides (not always posted before class) 19 lectures total (including midterm)possibly some guest lecturesClasses I will most likely miss– Oct 29: Security PI meeting– Nov 21: CPS PI meeting Course website: check it regularly news, assignments, grades and lecture notes (PDF) willall be posted there Read your email often8

Class Info Course space: Canvas https://canvas.eee.uci.edu/courses/19896 Only for email-based announcements Q&A space: Piazza https://piazza.com/uci/fall2019/compsci134 Post all your questions here Grading: Gradescope https://www.gradescope.com/courses/66307 Entry code in Piazza Homeworks will be turned in here9

Course Textbooks/ReadingsOPTIONAL (BUT RECOMMENDED):Network Security: Private Communication in a Public World, 2nd editionCharlie Kaufman, Radia Perlman, Mike SpecinerPrentice Hall – 2002 – ISBN: 0130460192OPTIONAL:Cryptography : Theory and Practice, 3rd editionDouglas R. StinsonCRC Press – 2005 – ISBN: 1584885084Also:Cryptography and Network Security, 4th editionWilliam StallingsPrentice Hall – 2006 – ISBN: 013187316410

Course Grading Midterm (26%) Time (tentative): Oct 31 Thursday, in class Final (26%) Time: Dec 12 Thursday, 1:30-3:30pm 3 Homeworks (16% each)BTW: I may or may not grade on a curveI do not hesitate assigning “C”-s and worse This is a large class ( 150 students) 10% didn’t pass in previous years, so study hard11

Student Expectations Keep up with material covered in lectures!– browse lecture slides Slides will be on-line the same day Attend all lectures No excuses for not reading your email! Exams and homework:– No collaboration of any sort– Violators will be dealt with harshly– An F in the course is guaranteed if caught– A note in your file12

Drop Policy No late drops except for documented emergencies Incompletes to be avoided at all costs But, what if: I have to graduate this quarter! Should have planned better.13

And remember: This is not an easy course and you do not have to be here This is a big class and some of you will get unpleasant grades14

However: You might have fun security and crypto are very"interesting” topics (require a special mindset) I will certainly make mistakes – point them out! I want your constructive feedback Please ask questions and challenge (within reason)me and TAs15

Complaints about: Course content: to me Course grading: to me TAs/Readers: to me Instructor, i.e., me:– ICS Associate Dean of Student Affairs (M. Gopi)or– Computer Science Department Chair (A. Nicolau)16

Course Topics – Tentative andUnsortedWe may also touch uponWill be covered Security attacks/servicesConventional CryptographyPublic Key CryptographyKey ManagementDigital SignaturesSecure Hash FunctionsAuthentication & IdentificationCertification/Revocation Wireless/Mobile Net securityDDOS attacks and trace-backInternet Protocol (IP) securityFirewallsSSL/TLSKerberos, X.509Access Control (RBAC)E-cash, secure e-commerceRFID securityTrojans/Worms/VirusesIntrusion Detection17

Focus of the Class Recognize security attacks/threats Learn basic defense mechanisms cryptographic and other techniques Appreciate how much remains to be learned after this courseBTW: You certainly won’t become an expert (or a Mr. Robot-type) You might be interested to study the subject further18

Bird’s eye viewThis courseNetworkSecurityCRYPTOComputerSecurity19

Outline Players/actors/entitiesTerminologyAttacks, services and mechanismsSecurity attacksSecurity servicesMethods of defenseModel for network security20

Computer Security:The Cast of CharactersAttacker or AdversaryCan be: individuals,organizations, nations (including software or evenhardware acting on theirbehalf)Your Computer/Phone/TabletYour data: financial, healthrecords, intellectual property 21

Network Security:The Cast of Characterscommunication channelBobAliceEve(sdropper)22

Terminology (Cryptography) Cryptology, Cryptography, CryptanalysisCipher, Cryptosystem, Encryption schemeEncryption/Decryption, Encipher/DecipherPrivacy/Confidentiality, Authentication, IdentificationIntegrityNon-repudiationFreshness, Timeliness, CausalityIntruder, Adversary, Interloper, AttackerAnonymity, Unlinkability/Untraceability23

Terminology (Security) Access Control & Authorization Accountability Intrusion Detection Physical Security Tamper-Resistance Certification & Revocation24

Attacks, Services and Mechanisms Security Attack: an action (or event) that aims tocompromise (undermine) security of information or resource Security Mechanism: a measure (technique or method)designed to detect, prevent, or recover from, a security attack Security Service: something that enhances security. A“security service” makes use of one or more “securitymechanisms” Examples:– Security Attack: Eavesdropping (aka Interception)– Security Mechanism: Encryption– Security Service: Confidentiality25

Some Classes of Security Attacks26

Security Attacks Interruption: attack on availability Interception: attack on confidentiality Modification: attack on integrity Fabrication: attack on authenticity27

Main Security ity28

Security Threats:Threat vs Attack?By InjectionBy Deletion29

Example Security Services Confidentiality: to assure information privacy and secrecy Authentication: who created or sent data Integrity: data has not been altered Access control: prevent misuse of resources Availability: offer access to resources, permanence, non-erasureExamples of attacks on Availability:– Denial of Service (DoS) Attacks e.g., against a DNS name server or Bank Web server– Malware (ransomware) that deletes or encrypts files30

BobAliceAttacker/Adversary31

Some Security Mechanisms Cryptography confidentiality, authentication, identification,integrity, etc. Software Controls (e.g., in databases, operating systems) protectsystem from users and users from each other Hardware Controls (e.g., smartcards, badges, biometrics) authenticate holders (users) Policies (e.g., frequent password changes, separation of duty rules) prevent insider attacks Physical Controls (doors, guards, moats, etc.) physical accesscontrols32

End of Lecture 1Any urgentquestions?33

Security Attack: an action (or event) that aims to compromise (undermine) security of information or resource Security Mechanism:a measure (technique or method) designed to detect, prevent, or recover from, a security attack Security Service: something that enhances security. A “security ser

Related Documents:

134-1400 LS EP Switch 265-1002 134-1402 LS EP Switch 265-1006 Original Part No. Mfg. Description Part No. 134-1403 LS EP Switch 265-1005 134-1404 LS EP Switch 265-1002 134-1405 LS EP Switch 265-1004 134-1406 LS EP Switch 265-1003 134-1407 LS EP Switch 265-1006 134-1452 LS Pressure Elec. Switch 134-1451 134-1456 LS Pressure Elec. Switch 134-1451 .

22913553 m adamowicz jorge alberto 134 668 6219298 f adaro tomasa petrona 134 668 36905048 m addamo marcos eduardo 134 668 35232822 m addamo maximiliano nicolas 134 668 . 45073074 f aguilera rocio 134 668 111423 f aguilera julia delia 134 668 46689312 m aguilera joaquin 134 668 38937886 m aguilera fernando 134 668

of public-key cryptography; providing hands-on experience with some of the most common encryption algorithms that are used on the internet today. Modern Cryptography Introduction Outline 1 Introduction 2 Historical Cryptography Caesar Cipher 3 Public{Key Cryptography

Cryptography with DNA binary strands and so on. In terms of DNA algorithms, there are such results as A DNA-based, bimolecular cryptography design, Public-key system using DNA as a one-way function for key distribution, DNASC cryptography system and so on. However, DNA cryptography is an

Cryptography and Java Java provides cryptographic functionality using two APIs: JCA - Java Cryptography Architecture - security framework integrated with the core Java API JCE - Java Cryptography Extension - Extensions for strong encryption (exported after 2000 US export policy)

sensitive information. Even though both cryptography and steganography has its own advantages and disadvantages, we can combine both the techniques together. This paper presents a comparative study of both cryptography and steganography. KEYWORDS: Cryptography, Steganography, Encryptio

integrating together cryptography and Steganography through image processing. In particular, we present a system able to perform Steganography and cryptography at the same time. In this paper, both Cryptography and Steganography methods are used for data security over the network. IRIS i

Cryptography in Java The Java Cryptography Architecture (JCA) is a set of APIs to implement concepts of modern cryptography such as digital signatures, message digests, certificates, encryption, key generation and management, and secure random number generation, etc. Using JCA, developers c