a. steffen, 14.09.2013, 0-overview.pptx 1 information security 2 (infsi2) prof. dr. andreas steffen...
TRANSCRIPT
![Page 1: A. Steffen, 14.09.2013, 0-Overview.pptx 1 Information Security 2 (InfSi2) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications](https://reader036.vdocuments.us/reader036/viewer/2022082505/56649ee65503460f94bf67f4/html5/thumbnails/1.jpg)
A. Steffen, 14.09.2013, 0-Overview.pptx 1
Information Security 2 (InfSi2)
Prof. Dr. Andreas Steffen
Institute for Internet Technologies and Applications (ITA)
Overview
![Page 2: A. Steffen, 14.09.2013, 0-Overview.pptx 1 Information Security 2 (InfSi2) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications](https://reader036.vdocuments.us/reader036/viewer/2022082505/56649ee65503460f94bf67f4/html5/thumbnails/2.jpg)
A. Steffen, 14.09.2013, 0-Overview.pptx 2
Random
Sources
Cryptographical Building Blocks
BlockCipher
s
Stream
Ciphers
Symmetric KeyCryptography
Authentication
Confidentiality
Encryption
HashFunction
s
Challenge
Response
IVs
MACsMICs
MessageDigests
Nonces
Secret Keys
SmartCards
DHRSA
Public KeyCryptography
EllipticCurve
s
Digital Signatures
DataIntegrity
Secure Network Protocols and Platforms
Non-Repudiatio
n
PseudoRandom
![Page 3: A. Steffen, 14.09.2013, 0-Overview.pptx 1 Information Security 2 (InfSi2) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications](https://reader036.vdocuments.us/reader036/viewer/2022082505/56649ee65503460f94bf67f4/html5/thumbnails/3.jpg)
A. Steffen, 14.09.2013, 0-Overview.pptx 3
Security Protocols for the OSI Stack
Application layer Platform Security, Web Application Security, VoIP Security, SW SecurityTransport layer TLS
Network layer IPsec
Data Link layer [PPTP, L2TP], IEEE 802.1X,IEEE 802.1AE, IEEE 802.11i (WPA2)Physical layer Quantum Cryptography
Communication layers
Security protocols
![Page 4: A. Steffen, 14.09.2013, 0-Overview.pptx 1 Information Security 2 (InfSi2) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications](https://reader036.vdocuments.us/reader036/viewer/2022082505/56649ee65503460f94bf67f4/html5/thumbnails/4.jpg)
A. Steffen, 14.09.2013, 0-Overview.pptx 4
Overview, Constant Cryptographic Strength, Elliptic Curves
Agenda of “InfSi2 – Network & Platform Security”
Physical Layer Security (Quantum Crypto, Random Numbers)
18.09.13
25.09.13
2.10.13
9.10.13
16.10.13
23.10.13
30.10.13
6.11.13
13.11.13
20.11.13
27.11.13
4.12.13
11.12.13
18.12.13
Link Layer Security (MAC, WLAN, 3G/4G, 802.1X, RADIUS)
Network Layer Security (Virtual Private Networks, IPsec)
Platform Security (Trusted Platform Module, Attestation)
Platform Security (Virtualization, Separation)
Network Layer Security (Internet Key Exchange)
Network Layer Security (DNSSEC)
Session Layer Security (VoIP Security via SRTP, MIKEY)
Network Access Control (Firewalls, Intrusion Detection/Prevention)
Network Access Control (Trusted Network Connect)
Platform Security (Smartcards, Hardware Security Modules)
Platform Security Threats (Buffer Overflows, Rootkits)
Network Anonymity (Mix Chains, Tor)
![Page 5: A. Steffen, 14.09.2013, 0-Overview.pptx 1 Information Security 2 (InfSi2) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications](https://reader036.vdocuments.us/reader036/viewer/2022082505/56649ee65503460f94bf67f4/html5/thumbnails/5.jpg)
A. Steffen, 14.09.2013, 0-Overview.pptx 5
Recommended Literature – Network Security
• William Stallings,Network Security Essentials,Fifth Edition,International Edition,448 pages, 2013,Pearson Education, Inc.,ISBN 0-27-379336-5
41 € @ amazon.de