Network Security - Detailed Explanation of All Topics
1. Passive and Active Attacks
Passive Attacks: - The attacker silently observes the network. - No changes are made to the data. - The
goal is to gather sensitive information like passwords, messages, or credit card numbers. - Examples: -
Eavesdropping: Listening to private communication. - Traffic analysis: Studying data flow to deduce
patterns.
Active Attacks: - The attacker interferes with the communication. - Data may be modified, deleted, or
replayed. - Examples: - Man-in-the-middle attack: Intercepting and altering messages between two
parties. - Denial-of-Service (DoS): Overloading a system to make it unusable. - Spoofing: Pretending to
be someone else to gain access.
2. Symmetric Encryption
• The same key is used for both encryption (converting message to unreadable form) and
decryption (back to readable form).
• Fast and efficient for large volumes of data.
• Key must be securely shared between sender and receiver.
• Examples: AES (Advanced Encryption Standard), DES (Data Encryption Standard).
3. Encryption Algorithms
DES: - Symmetric encryption with a 56-bit key. - Now considered weak due to small key size.
AES: - Replaced DES. - Uses 128, 192, or 256-bit keys. - Strong and widely used.
RSA: - Asymmetric encryption using a public and private key. - Used for secure data transmission.
4. Key Distribution
• Process of securely providing keys to communication parties.
• Methods:
• Manual key exchange.
• Key Distribution Center (KDC).
• Using RSA to encrypt symmetric keys.
5. Traffic Padding
• Extra data is added to messages.
• Prevents attackers from identifying real message patterns.
• Used to confuse attackers and hide traffic size and frequency.
1
6. Message Authentication
• Ensures the message is from the claimed sender and hasn’t been changed.
• Uses:
• Message Authentication Code (MAC).
• Digital signatures.
• Verifies authenticity and integrity.
7. Hash Function
• A function that converts input into a fixed-length string.
• Used to check data integrity.
• A small change in input creates a very different output.
• Not reversible.
8. Secure Hash Function
• A cryptographic hash that is resistant to:
• Pre-image attack.
• Collision (two inputs having the same hash).
• Example: SHA-256.
9. Public-key Encryption (Asymmetric Encryption)
• Uses a pair of keys: Public (shared) and Private (kept secret).
• Data encrypted with the public key can only be decrypted with the private key.
• Example: RSA.
10. Digital Signature
• Ensures data origin and integrity.
• Sender signs data with their private key.
• Receiver verifies it using sender’s public key.
• Prevents forgery and tampering.
11. RSA Public Key Encryption Algorithm
• Based on mathematical difficulty of factoring large numbers.
• Public key = (e, n), Private key = (d, n).
• Used in:
• Secure communications.
• Digital signatures.
2
12. Key Management
• Involves generating, storing, distributing, rotating, and destroying encryption keys.
• Poor key management = weak security.
• Central to any secure communication system.
13. SSL/TLS (Secure Socket Layer / Transport Layer Security)
• Used to secure internet communication (HTTPS).
• Encrypts data in transit.
SSL Architecture: - Contains multiple layers for different security tasks.
Record Protocol: - Takes application data, fragments it, applies MAC, encrypts, and sends it.
Handshake Protocol: - Establishes session. - Negotiates encryption type. - Exchanges keys.
Change Cipher Spec Protocol: - Indicates switch to encrypted session.
Alert Protocol: - Sends error/warning messages (e.g. invalid certificate).
14. IPSEC (IP Level Security)
• Protocol suite for securing IP communications.
• Provides:
• Authentication.
• Data integrity.
• Confidentiality.
• Operates at the network layer.
15. PGP (Pretty Good Privacy)
• Provides security for emails and files.
• Combines:
• Symmetric encryption for data.
• Public key encryption for key exchange.
• Ensures confidentiality, integrity, and authentication.
16. Firewall
• Monitors and controls network traffic.
• Applies predefined rules.
• Types:
• Packet filtering.
• Stateful inspection.
• Proxy firewall.
• Next-gen firewall.
3
17. VPN (Virtual Private Network)
• Creates a secure tunnel between the user and the network.
• Encrypts all traffic.
• Hides user’s real IP address.
• Commonly used for:
• Privacy protection.
• Remote access to a corporate network.
These topics form the foundation of Network Security and are critical for understanding how data is
protected across modern communication systems.