Top Banner

of 19

4901 Course Work

Apr 07, 2018

Download

Documents

Uday Kiran
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/6/2019 4901 Course Work

    1/19

    49014901

    GROUP E

    SUBMITTED BY

    SRINIVAS PAVULURI

    PRAVEEN

    ATCHYUT

    WAQAS

  • 8/6/2019 4901 Course Work

    2/19

    PAPERPAPER11

    USING ENCRYPTIONUSING ENCRYPTION

    AUTHENTICATION IN LARGEAUTHENTICATION IN LARGE

    NETWORKS OF COMPUTERSNETWORKS OF COMPUTERS

    BY

    SRINIVAS PAVULURI

    PRAVEEN

  • 8/6/2019 4901 Course Work

    3/19

    Is This Paper Well Organized

    The paper given for us mainly discuss about the

    authentication and the protocols used for authentication

    The format is an IEEE paper but the content on thepaper not that much clear

  • 8/6/2019 4901 Course Work

    4/19

  • 8/6/2019 4901 Course Work

    5/19

    INTRODUCTIONINTRODUCTION

    As per the upgrading of the technology we need to

    mainly concentrate on the security of the communication,

    for security we need to mainly concentrate on the

    Authentication

    Authentication means determining whom you are

    talking to before revealing sensitive information

    Arbitrary keys are used for encrypt and decrypt the

    message between two machines

  • 8/6/2019 4901 Course Work

    6/19

    WHY WE NEED TO HAVEWHY WE NEED TO HAVE

    AUTHENTICATIONAUTHENTICATION

    During the communication intruder can hack the

    message either he can alter or copy the message. So,

    we need to have authentication for the

    communication channel

    If we use authentication then the channel will be

    more secure, In order to access the channel Its

    compulsory to have the key

    The different security issues are

    Email security, IP security, Web security, Firewalls,

    Wireless security

  • 8/6/2019 4901 Course Work

    7/19

    Classification ofAuthenticationClassification ofAuthentication

    A two way communication between two machines

    which is authenticated either direction

    A one way communication where there is no protocolexchange between the sender and the receiver

    Authentication will be done by the third party

  • 8/6/2019 4901 Course Work

    8/19

    Steps of encryption

    Encryption Algorithms

    Authentication Servers

    Means of Encryption

    Protocols

    MAINSECTIONMAINSECTION

  • 8/6/2019 4901 Course Work

    9/19

    EncryptionAlgorithmsEncryptionAlgorithms

    The two Different types of Algorithms are

    Conventional

    Public-key encryption

  • 8/6/2019 4901 Course Work

    10/19

    ConventionalAlgorithmConventionalAlgorithm

    For convolution encryption algorithm same key is

    used for encryption and decryption

    NBSData encryption standard is used as the basic

    conventional algorithm

  • 8/6/2019 4901 Course Work

    11/19

    PublicPublic--key encryptionkey encryption

    For public-key encryption two types of keys are

    used public key and secrete key

    Both the keys are used to for conversion of the clear

    text to cipher text or vise versa

  • 8/6/2019 4901 Course Work

    12/19

    AUTHENTICATIONSERVERSAUTHENTICATIONSERVERS

    The authentication server has data base containing

    index by names

    The purpose of authenticate server is to identify and

    deliver the requested secret key

  • 8/6/2019 4901 Course Work

    13/19

    MEANSOF ENCRYPTIONMEANSOF ENCRYPTION

    The format of encryption

    X= encryption(Y,key)

    The format of decryption

    Y=decryption(X,key)

  • 8/6/2019 4901 Course Work

    14/19

    ProtocolsProtocols

    Conventional algorithmIt is a general algorithm which uses

    A --> AS: A, B, IA1

    AS--> A: {IAI, B, CK, {CK, A}KB} KA

    A--->B: {CK, A}KA

    B--->A: {IB} cKA--->B: {Is - 1} Ck

    There are five messages in the algorithm so we can the no of

    messages to three but we need the mutual handshakingA ---> B: {CK, A} KB, {IA2) CKB--->A: {IA2- 1,IB} CK

  • 8/6/2019 4901 Course Work

    15/19

    With PublicWith Public--Key AlgorithmsKey Algorithms

    Any user will have the two keys , public key and secrete keyPublic key is a key which can known by any one where as secret

    key is confidential key like banks pin no

    A and B is presumed to know the AS's public key, PKAS, which

    is used to decrypt the message SKA S is the authentication

    server's secret key

    AAS A, B

    ASA {PKB, B} SKAS

    A B {IA, A} PKBB AS B, A

    ASB: {PKA, A} SKAS

    B A {IA, IB}

    A B {IB} PKB

  • 8/6/2019 4901 Course Work

    16/19

    MultipleAuthenticationServersMultipleAuthenticationServersA and B are under same authentication servers we can follow above

    protocols if the A and B are not in same servers

    In case of conventional algorithm protocol the requirement is still to

    produce an item of the form {CK,A} KB forA to use when making

    his first approach to his server ASA asking the server CK of B server

    looks for it finds in the another server ASB then ASA asking ASB that

    checksum between B and A , Nonce in this way..

    ASA---> ASB: CK, B ,A, IA1

    Then the ASB replies to the ASA that checksum of a encrpting withthe

    key of B and Nonce of A

    ASB---> ASA: {CK, A}ICB, IA

    In the case of public key algorithm A directly approachesASB

    directly ifA knows that server's public key. We assume that A already

    has this knowledge if not A lookup in the master server authentication

    for the public key of the ASB

  • 8/6/2019 4901 Course Work

    17/19

    DigitalSignaturesDigitalSignatures

    When A sends the message to B may not be confident thatmessage sent by A is same message . To provide integrity

    signatures are used which are produced by the certificate

    authorities .

    Signatures with Conventional Encryption

    Conventional algorithm uses the characteristic function which

    consists of the clear text message and property function which

    computes and generates the characteristic value it is hard to

    find another sensible clear text message thatproduces the same characteristic value. Now A send the

    message to the AS then requesting signature blockfrom the

    authentication server:

    A ~ AS: A, {CS} KA

  • 8/6/2019 4901 Course Work

    18/19

    On the B side when B receives the message from A decrypts the

    message and computes the characteristic value . Now sends the

    signature block to the AS which

    B--> AS: B, {A, CS} KAs

    The server decrypts the signature block and returns its

    contents to B:

    A S -->B: {A, CS} KB

    Now B matches the signature value he got and from the server if

    it matches it B Confident that the message is from A

  • 8/6/2019 4901 Course Work

    19/19

    REFERENCESREFERENCES

    EBOOKS

    Network security by William Stallings

    E REFERENCES

    Wikipedia.org