0% found this document useful (0 votes)
74 views13 pages

Data Security in x.25 Networks

This document discusses data security in X.25 networks. It introduces X.25 as a protocol for wide area network communication and describes its network devices like DTE, DCE, and PAD. Threats to X.25 security include passive wiretapping and active data interference. The document outlines security requirements and problems related to key management. It proposes a solution based on unique RSA keys, key encrypting keys, and data encrypting keys to enable automated key management across the network.

Uploaded by

lipika008
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views13 pages

Data Security in x.25 Networks

This document discusses data security in X.25 networks. It introduces X.25 as a protocol for wide area network communication and describes its network devices like DTE, DCE, and PAD. Threats to X.25 security include passive wiretapping and active data interference. The document outlines security requirements and problems related to key management. It proposes a solution based on unique RSA keys, key encrypting keys, and data encrypting keys to enable automated key management across the network.

Uploaded by

lipika008
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 13

DATA SECURITY IN X.

25 NETWORKS
Technical Seminar Presentation 2004

“DATA SECURITY IN
X.25 NETWORKS”
Advisor:
Mr. Anisur Rahman

GOURAV PODDAR IT200147004 [1]


DATA SECURITY IN X.25 NETWORKS

INTRODUCTION
Technical Seminar Presentation 2004

• X.25 : An ITU-T protocol for WAN Communication.

• User to Network Interfacing (UNI); DTE – DCE Interface.

• Many channels share one physical connection.

• Security mechanism:
 Data Encryption for secrecy
 Data & Entity Authentication for preserving Data Integrity

GOURAV PODDAR IT200147004 [2]


DATA SECURITY IN X.25 NETWORKS

X.25 Network Devices


Technical Seminar Presentation 2004

 DTE – Data Terminal equipment

 DCE – Data Circuit-terminating Equipment

 PSE – Packet Switching Exchange

 PAD – Packet Assembler / Disassembler

GOURAV PODDAR IT200147004 [3]


DATA SECURITY IN X.25 NETWORKS

X.25 Network Device Operation


Technical Seminar Presentation 2004

GOURAV PODDAR IT200147004 [4]


DATA SECURITY IN X.25 NETWORKS

Virtual Circuits
Technical Seminar Presentation 2004

 Virtual Call
 Two Types of Virtual Circuits:
 Switched virtual circuit (SVC): Phone call
 Permanent virtual circuit (PVC): Leased lines
 Up to 4095 VCs on one X.25 interface

GOURAV PODDAR IT200147004 [5]


DATA SECURITY IN X.25 NETWORKS

X.25 Protocol Suite


Technical Seminar Presentation 2004

 PLP – Packet Layer Protocol

 LAPB – Link Access Procedure – Balanced

 X.21bis Protocol

GOURAV PODDAR IT200147004 [6]


DATA SECURITY IN X.25 NETWORKS

Threats to Data Security in X.25


Technical Seminar Presentation 2004

 Passive Wiretap : Tapping into the carrier


medium and reading the data.
 Active Interference : Modification of Data during
transmission.

GOURAV PODDAR IT200147004 [7]


DATA SECURITY IN X.25 NETWORKS

Security Requirements
Technical Seminar Presentation 2004

 Operational

 Secure Key Management

 Approval

GOURAV PODDAR IT200147004 [8]


DATA SECURITY IN X.25 NETWORKS

X.25 Security Problem


Technical Seminar Presentation 2004

The Key Management Problem

 General

Layer 6 and 7

Layer 3

GOURAV PODDAR IT200147004 [9]


DATA SECURITY IN X.25 NETWORKS

Basis of Solution
Technical Seminar Presentation 2004

 Unit Unique RSA Keys

 Key Encrypting Keys (KEKs)

 Data Encrypting Keys (DEKs)

GOURAV PODDAR IT200147004 [10


DATA SECURITY IN X.25 NETWORKS

Fast RSA Processing


Technical Seminar Presentation 2004

 Completely automated key management across the network

 Relies on RSA for the secure mechanisms

 Reliant on RSA co-processor in each crypto unit

 Power to perform a 512-bit RSA decryption under a second

GOURAV PODDAR IT200147004 [11


DATA SECURITY IN X.25 NETWORKS

CONCLUSION
Technical Seminar Presentation 2004

 Developed to overcome the problems inherent in transmitting the


data over low quality copper wires.

 Ensured reliable transmission of data over WAN with supported


speed of up-to 56 Kbps.

 Added overhead and processing imposed on the transmission to


achieve high level of reliability was a drawback.

 But still remains cost effective and viable alternative for low
speed connectivity among many locations.

GOURAV PODDAR IT200147004 [12


DATA SECURITY IN X.25 NETWORKS
Technical Seminar Presentation 2004

THANK YOU !

GOURAV PODDAR IT200147004 [13

You might also like