• Improving Network Security Using Elliptic Curve Cryptosystem

  • CHAPTER TWO -- [Total Page(s) 11]

    Page 1 of 11

    1 2 3 4 5    Next
    • CHAPTER TWO
      2.0    LITERATURE REVIEW
      2.2    NETWORK SECURITY
      As we have already discussed that the fast development of the modern Internet technology and information technology cause the individual, enterprise, school and government department joining the Internet, Which cause more illegal users to attack and destroy the network by using the fake websites, fake mail, Trojan horse and backdoor virus at the same time. So we need some type of security to protect our networks from such malicious users. Network security mainly consists of the technologies and the processes that are deployed to protect internal networks from external threats. The primary goal of network security is to provide controls along the network perimeter which allow access to the internal network and only let traffic pass if that traffic is authorized, valid, and of acceptable risk. One thing should always be kept in mind that network security controls cannot completely eliminate the risk. The goal is to minimize risk as much as possible and to avoid unnecessary or excessive risk.
      2.2    CHARACTERISTICS OF NETWORK SECURITY
      Network security has the following four basic characteristics:
      1.    Data Integrity: it means the data cannot be changed without the authorization that is, only people who can be allowed can modify data, and can determine whether data has been modified.
      2.    The confidentiality of the data: this states that data cannot be leaked to unauthorized users for their use. Data encryption is used to achieve this goal. By encrypting the data in transmission and use it can be protected from illegal access by third parties.
      3.    Data availability: it states that data is not available to all the users at all the time. It means that only authorized users can access and use the data and data is made available only on demand.
      4.    Data controllable: that can control the flow of information and the behavior patterns within the mandate, such as access to data, communication and content with the control. System must be able to control who can access the system or network data, and how to access at the same time, be able to authenticate users on the network, and record the network activity of all users.
      2.4    MAIN THREATS TO NETWORK SECURITY
      From a technical point of view, the network insecurity, on the one hand because of all the resources through a network share, on the other hand its technology is open. In general, network security threats are the following:
      1.    Inadvertent human error: improper use of operators, security configuration vulnerabilities, user with poor security awareness, choosing inadvertently a password will pose a threat to network security.
      2.    Man-made malicious attacks: such attacks are divided into two kinds: one is the active attacks, its purpose is to tamper with the information contained in the system, or to change the system's state and operation in variety of ways and to destroy it validity, integrity and authenticity; the other is a passive attack, it does not affect the normal work of the network, intercept and theft information, strong threat confidentiality of the system.
      3.    "Back door" of networking software and loopholes: all network software cannot be 100% free from vulnerabilities which are a prime target for hacker attacks. Thus due to their own vulnerability the corresponding system and application software are targeted by the hackers.
      4.    Non-authorized access: the use of network or computer resources without their consent is seen as a non-authorized access. Mainly in the following forms: the illegal users by impersonating the identity access the network for illegal operation; authorized users in lawful manner operate and so on.
      2.4    SOLUTION OF NETWORK SECURITY PROBLEM
      A.    Firewalls
      Firewalls may be defined as the network devices used to restrict traffic passing between networks. A fire wall can consist of hardware and software, or even several components working together. Firewalls are mainly used to implement security policies which govern the flow of traffic between two or more networks.
      As a traditional security technology, the main function of firewall is to strengthen the visit restrictions between the networks and prevent the exterior network user from entering into the internal network by illegal method. If an intruder want access to the target computer; first of all, it must pass through firewall. By setting the visit rules to filtrate the visits which are not safely, it may enhance the network security enormously and reduce the risk of host.
      Limitations of Firewalls are:
      1.    Firewall cannot prevent attacks coming from Intranet.
      2.    The access control policy of firewall is static, and cannot adapt itself to the change of the attack from outside.
      3.    Filtering rules of firewall are usually very simple, so firewall cannot prevent attacks coming from application layer, and cannot prevent viruses also.
      B.    Types of firewalls
      There are mainly five types of firewalls and are given below:
      1.    Simple packet filter
      2.    State full inspection filter
      3.    Application proxy
      4.    Hybrid firewalls
      5.    Personal firewalls
       Now we will explain all these type of firewalls one by one.
      i.    Simple packet filter):
  • CHAPTER TWO -- [Total Page(s) 11]

    Page 1 of 11

    1 2 3 4 5    Next
    • ABSRACT - [ Total Page(s): 1 ]ABSTRACTSecuring a network wired or wireless for network administrator has been a big challenges for network administrators in the present day of Internet usage. This project presents ECDSA Cryptosystem as a solution to the problem been faced by network administrators and Engineers. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA) with the attractiveness that there is no sub exponential algorithm known to solve the ell ... Continue reading---

         

      TABLE OF CONTENTS - [ Total Page(s): 1 ]TABLE OF CONTENTTittle Page    Declaration    Certification    Dedication    Acknowledgements   Abstract    Tables of contents    Table of Content1.0    CHAPTER ONE (INTRODUCTION)1.1    BACKGROUND TO THE WORK    1.2    PROBLEM DEFINITION    1.3    PROJECT JUSTIFICATION    1.4    OBJECTIVES    2.0    CHAPTER TWO (LITERATURE REVIEW)2.1    NETWORK SECURITY    2.2    CHARACTERISTICS OF NETWORK SECURITY   2.3    MAIN THREATS TO NETWORK S ... Continue reading---

         

      CHAPTER ONE - [ Total Page(s): 2 ]CHAPTER ONE1.0    INTRODUCTION1.1    BACKGROUND TO THE WORKThe fast development of the modern Internet technology and information technology cause the individual, enterprise, school and government department joining the Internet, Which cause more illegal users to attack and destroy the network by using the fake websites, fake mail, Trojan horse and backdoor virus at the same time. The target of the attacks and intrusion on the network are computers, so once the intruders succeed, it will c ... Continue reading---

         

      CHAPTER THREE - [ Total Page(s): 8 ]CHAPTER THREE3.0    METHODOLOGY3.1    BACKGROUND OF ELLIPTIC CURVE CRYPROGRAPHYElliptic curve cryptography provides a methodology for obtaining high-speed, efficient, and scalable implementations of network security protocols. The security of these protocols depends on the difficulty of computing elliptic curve discrete logarithm in the elliptic curve group.The group operations utilize the arithmetic of points which are elements of the set of solutions of an elliptic curve equation d ... Continue reading---

         

      CHAPTER FOUR - [ Total Page(s): 10 ]Step 3: verifying the signatureAt this stage the program try to verify the signature weather it’s correct or not. It will display VALID or INVALID to ascertain the validity.Result:The result above what gotten using Secp256kr1 algorithm as shown above, the private and public key was gotten based on previous work inculcated into the database for the key generation and FRANCIS was used as the message string in other to get a signature value. ... Continue reading---

         

      CHAPTER FIVE - [ Total Page(s): 1 ]CHAPTER FIVESUMMARY, CONCLUSION, AND RECOMMENDATIONElliptic Curve Digital Signature Algorithm (ECDSA) which is one of the variants of Elliptic Curve Cryptography (ECC) proposed as an alternative to established public key systems such as Digital Signature Algorithm (DSA) and Rivest Shamir Adleman (RSA), have recently gained a lot of attention in industry and academia.The main reason for the attractiveness of ECDSA is the fact that there is no sub exponential algorith known to solve the elliptic c ... Continue reading---