• Improving Network Security Using Elliptic Curve Cryptosystem

  • CHAPTER ONE -- [Total Page(s) 2]

    Page 1 of 2

    1 2    Next
    • CHAPTER ONE
      1.0    INTRODUCTION
      1.1    BACKGROUND TO THE WORK
      The fast development of the modern Internet technology and information technology cause the individual, enterprise, school and government department joining the Internet, Which cause more illegal users to attack and destroy the network by using the fake websites, fake mail, Trojan horse and backdoor virus at the same time. The target of the attacks and intrusion on the network are computers, so once the intruders succeed, it will cause thousands of network computers in a paralyzed state. By this way, the intruders steal massive information to seek user's benefits.    In addition, some invaders with ulterior motives look upon the military and government department as the target which cause enormous threats for the social and national security.
      Besides the problems of the network, the defense measures we usually take also have their own shortcoming; security event is facing other challenge, for example:
      • From security event was discovered to be controlled, the basic approach is taken manually and is difficult to control in time.
      •  The unknown security event and the network virus are unable to guard against.
      • The mis-operation and network data destruction which caused by internal personnel, the spread of network virus, the Trojan horse.
      •  The safety equipment’s work dispersedly which are unable to coordinate the management.
      They only can form the simple point defense.
      Quick information accessibility on the Internet has become increasingly important for growing businesses. As companies begin to spread various business functions to the public network, precautions are highly needed to make sure that their network not been tampered with or does not fall to wrong hands. If a network is accessed by a hacker or dissatisfied employee, it could create havoc for organization proprietary data, affect company productivity negatively, and retard the ability to compete with other businesses. Unauthorized network access can also harm a company’s relationship with customers and business partners who may question the company's ability to protect their confidential information. Furthermore, any part of a network can be susceptible to attacks or unauthorized activity as earlier discussed. Company competitors or even internal employees can violate all routers switches and hosts.
      In order to determine the appropriate ways of protecting a company's property against attackers, the Information Technology Manager of such company should understand the attacks that can be instigated and the havoc they can cause to business infrastructures.
      As the computers and networked systems increases in the world of today, the need for increase and strong computer and network security also becomes increasingly necessary and important. The increase in the computer network system has exposed many networks to various kinds of internet threats and with this exposure, one can see that the need for improved network security is vital and important in every organization. The security may include identification, authentication and authorization, and surveillance camera to protect integrity, availability, accountability, and authenticity of computer hardware or network equipment. There is no laid- down procedure for designing a secure network. Network security has to be designed to fit the needs of one organization network and not anyone else’s. For instance, a small-sized law company would allow access to case information for authorized users on the outside of the network, and at the same time ensure that full access to the internet is always available to staff on the inside of the network, in other cases to access a case file from the office or on the road. Good network security protects a network in a manner that is consistent with its purpose and precautions must be taken when choosing a network provider for an organization especially one like a law firm.
      1.2    PROBLEM DEFINITION
      Network security is sometimes more than what people always thought it to be, malware, virus, Trojan, hackers. Network security could be caused by unintentional human error and it could be compromised by human nature as well.
      A common network security problem (Employees) most organizations are facing sometimes has to do with the company’s employees and their various errors they make. According to Dr. Michael E. Whitman, CISM, CISSP, and the author of the textbook “Principals of Information Security, “Humans make mistakes; sometimes that is due to inexperience or improper training, and sometimes it is Because an incorrect assumption was reached. But regardless of the reason—and the lack of malicious intent—something as simple as a keyboarding error has the potential to cause a worldwide Internet outage”. (Whitman and Mattord 2012)
      The problem of piracy is another common network problem. Piracy is a situation where intellectual properties are compromised although there are technical mechanisms that aid in enforcing copyright laws to tackle this problem.
      However it is not only human errors that can cause problem to network security, problems can also be caused by natural forces like fire breakouts, earthquakes, floods lightning etc.
      The ways network administrators think about securing networks has been changed by an increasingly dynamic and technically challenging risk environment.
      New business models rely on open networks with multiple access points to conduct business in real time, driving down costs and improving response to revenue generating opportunity by leveraging on the ability to quickly exchange critical information, share business files or folders and improve their competitive position. Therefore the urgent need to improve our network security should become a paramount concern to every individual and co-operate organization.
  • CHAPTER ONE -- [Total Page(s) 2]

    Page 1 of 2

    1 2    Next
    • ABSRACT - [ Total Page(s): 1 ]ABSTRACTSecuring a network wired or wireless for network administrator has been a big challenges for network administrators in the present day of Internet usage. This project presents ECDSA Cryptosystem as a solution to the problem been faced by network administrators and Engineers. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA) with the attractiveness that there is no sub exponential algorithm known to solve the ell ... Continue reading---

         

      TABLE OF CONTENTS - [ Total Page(s): 1 ]TABLE OF CONTENTTittle Page    Declaration    Certification    Dedication    Acknowledgements   Abstract    Tables of contents    Table of Content1.0    CHAPTER ONE (INTRODUCTION)1.1    BACKGROUND TO THE WORK    1.2    PROBLEM DEFINITION    1.3    PROJECT JUSTIFICATION    1.4    OBJECTIVES    2.0    CHAPTER TWO (LITERATURE REVIEW)2.1    NETWORK SECURITY    2.2    CHARACTERISTICS OF NETWORK SECURITY   2.3    MAIN THREATS TO NETWORK S ... Continue reading---

         

      CHAPTER TWO - [ Total Page(s): 11 ]Simple packet filters selectively controls the flow of packets in/out of a network or between networks. Control is based and enforced through a series of rules. These rules are based on information stored in the IP and TCP/UDP/ICMP headers.Rule criteria can be based on the following characteristics of the IP packet:➢    Source and/or destination addresses➢    Protocol including TCP, UDP, ICMP, or all IP➢    TCP or UDP source and/or destination ports➢    ICMP messa ... Continue reading---

         

      CHAPTER THREE - [ Total Page(s): 8 ]CHAPTER THREE3.0    METHODOLOGY3.1    BACKGROUND OF ELLIPTIC CURVE CRYPROGRAPHYElliptic curve cryptography provides a methodology for obtaining high-speed, efficient, and scalable implementations of network security protocols. The security of these protocols depends on the difficulty of computing elliptic curve discrete logarithm in the elliptic curve group.The group operations utilize the arithmetic of points which are elements of the set of solutions of an elliptic curve equation d ... Continue reading---

         

      CHAPTER FOUR - [ Total Page(s): 10 ]Step 3: verifying the signatureAt this stage the program try to verify the signature weather it’s correct or not. It will display VALID or INVALID to ascertain the validity.Result:The result above what gotten using Secp256kr1 algorithm as shown above, the private and public key was gotten based on previous work inculcated into the database for the key generation and FRANCIS was used as the message string in other to get a signature value. ... Continue reading---

         

      CHAPTER FIVE - [ Total Page(s): 1 ]CHAPTER FIVESUMMARY, CONCLUSION, AND RECOMMENDATIONElliptic Curve Digital Signature Algorithm (ECDSA) which is one of the variants of Elliptic Curve Cryptography (ECC) proposed as an alternative to established public key systems such as Digital Signature Algorithm (DSA) and Rivest Shamir Adleman (RSA), have recently gained a lot of attention in industry and academia.The main reason for the attractiveness of ECDSA is the fact that there is no sub exponential algorith known to solve the elliptic c ... Continue reading---