Page 152 - DCAP516_COMPUTER_SECURITY
P. 152

Computer Security




                    Notes
                                     Did u know?  PKI is often considered to be a standard, but in fact it is a set of policies,
                                     products, and procedures that leave some room for interpretation. The policies define the
                                     rules under which the cryptographic systems should operate. In particular, the policies
                                     specify how to handle keys and valuable information and how to match level of control to
                                     level of risk. The procedures dictate how the keys should be generated, managed, and
                                     used. Finally, the products actually implement the policies, and they generate, store, and
                                     manage the keys.

                                   4.  SSH Encryption: SSH (secure shell) is a pair of protocols (versions 1 and 2), originally
                                       defined for Unix but also available under Windows 2000, that provides an authenticated
                                       and encrypted path to the shell or operating system command interpreter. Both SSH
                                       versions replace Unix utilities such as Telnet, rlogin, and rsh for remote access. SSH protects
                                       against spoofing attacks and modification of data in communication.
                                       The SSH protocol involves negotiation between local and remote sites for encryption
                                       algorithm (for example, DES, IDEA, AES) and authentication (including public key and
                                       Kerberos).
                                       SSL Encryption
                                       The SSL (Secure Sockets Layer) protocol was originally designed by Netscape to protect
                                       communication between a web browser and server. It is also known now as TLS, for
                                       transport layer security. SSL interfaces between applications (such as browsers) and the
                                       TCP/IP protocols to provide server authentication, optional client authentication, and an
                                       encrypted communications channel between client and server. Client and server negotiate
                                       a mutually supported suite of encryption for session encryption and hashing; possibilities
                                       include triple DES and SHA1, or RC4 with a 128-bit key and MD5.

                                       To use SSL, the client requests an SSL session. The server responds with its public key
                                       certificate so that the client can determine the authenticity of the server. The client returns
                                       part of a symmetric session key encrypted under the server’s public key. Both the server
                                       and client compute the session key, and then they switch to encrypted communication,
                                       using the shared session key.
                                       The protocol is simple but effective, and it is the most widely used secure communication
                                       protocol on the Internet.

                                   5.  IPSec: As you know that the address space for the Internet is running out. As domain
                                       names and equipment proliferate, the original, 30-year old, 32-bit address structure of the
                                       Internet is filling up. A new structure, called IPv6 (version 6 of the IP protocol suite),
                                       solves the addressing problem. This restructuring also offered an excellent opportunity
                                       for the Internet Engineering Task Force (IETF) to address serious security requirements.
                                   6.  Encrypted E-Mail: An electronic mail message is much like the back of a post card. The
                                       mail carrier (and everyone in the postal system through whose hands the card passes) can
                                       read not just the address but also everything in the message field. To protect the privacy of
                                       the message and routing information, we can use encryption to protect the confidentiality
                                       of the message and perhaps its integrity.
                                   7.  Content Integrity: Content integrity comes as a bonus with cryptography. No one can
                                       change encrypted data in a meaningful way without breaking the encryption. This does
                                       not say, however, that encrypted data cannot be modified. Changing even one bit of an
                                       encrypted data stream will affect the result after decryption, often in a way that seriously
                                       alters the resulting plaintext. We need to consider three potential threats:
                                       (i)  malicious modification that changes content in a meaningful way



          146                               LOVELY PROFESSIONAL UNIVERSITY
   147   148   149   150   151   152   153   154   155   156   157