Network Security - Complete Notes
1. Passive and Active Attacks
- Passive: Eavesdropping or monitoring (no change in data).
- Active: Altering, modifying, or disrupting the communication.
2. Symmetric Encryption
- Same key used for encryption and decryption.
- Example: AES, DES
3. Encryption Algorithms
- DES: Outdated, 56-bit key.
- AES: Secure, supports 128/192/256-bit keys.
4. Key Distribution
- Sharing secret key securely using trusted parties or public key methods.
5. Traffic Padding
- Adding fake data to hide real traffic patterns.
6. Message Authentication
- Verifies sender and checks data integrity.
- Techniques: MAC, Digital Signatures.
7. Hash Function
- Converts input to fixed-size hash value.
- One-way, used for data verification.
8. Secure Hash Function
- Cryptographic hash: collision-resistant, secure.
- Example: SHA-256
9. Public-Key Encryption
- Two keys: public (encrypt) and private (decrypt).
- Example: RSA
10. Digital Signature
- Ensures authenticity and integrity.
- Uses sender's private key to sign, public key to verify.
11. RSA Algorithm
- Public-key system using large prime numbers.
12. Key Management
- Handling the lifecycle of keys: creation, distribution, storage, and destruction.
13. SSL/TLS
- Secures internet communication (HTTPS).
SSL Sub-protocols:
- SSL Architecture: Layers and structure of SSL.
- Record Protocol: Encrypts and sends data blocks.
- Change Cipher Spec: Switches to new encryption settings.
- Alert Protocol: Sends warnings/errors.
- Handshake Protocol: Initializes connection and key exchange.
14. IPsec (IP-level security)
- Secures IP packets with encryption and authentication.
15. PGP (Pretty Good Privacy)
- Email/file encryption using a mix of symmetric and public-key methods.
16. Firewall
- Filters incoming/outgoing traffic based on rules.
- Types: Hardware, Software.
17. VPN (Virtual Private Network)
- Creates secure, encrypted tunnel over the internet.