Network Security Model

Understanding secure communication architecture

Network Security Model Diagram
Symmetric encryption flow showing plaintext to ciphertext transmission and decryption
Symmetric Key Encryption Communication ModelSecret Key (K)PlaintextEncryptionAlgorithmCiphertextNetworkAttacker(Sees ciphertext only)CiphertextDecryptionAlgorithmSecret Key (K)PlaintextKey Points:• Sender encrypts plaintext using encryption algorithm and secret key• Attacker intercepts ciphertext but cannot decrypt without the key• Receiver decrypts ciphertext using same secret key to recover plaintext
Interactive Simulation: Data Transmission & Security
Watch how data is encrypted, intercepted as ciphertext by a hacker, and then decrypted by the recipient

Sender (Device A)

HELLO

Plaintext: 5 chars

Sender

The sender is the party that wants to transmit a message securely to the recipient.

  • Originates the plaintext message
  • Possesses the secret key/shared secret
  • Performs encryption/encoding on the message
  • Sends encrypted message through the information channel
Recipient

The recipient is the intended party who receives and decrypts the secure message.

  • Receives encrypted message from channel
  • Possesses the same secret key as sender
  • Performs decryption/decoding on the message
  • Recovers the original plaintext message
Trusted Third Party

Ensures secure initial exchange of secret information between sender and recipient.

  • Distributes secret keys securely
  • Can act as an arbiter in disputes
  • Trusted by both sender and recipient
  • Uses secure channels for key distribution
Opponent

An adversary who attempts to intercept or compromise secure communication.

  • Monitors the information channel
  • Attempts to decipher encrypted messages
  • May try to intercept key distribution
  • Uses cryptanalysis techniques to break encryption
Information Channel

The communication medium through which encrypted data is transmitted from sender to recipient.

Types

  • • Wired networks (Ethernet)
  • • Wireless networks (WiFi, 5G)
  • • Internet connections
  • • Satellite links

Threats

  • • Eavesdropping
  • • Message interception
  • • Traffic analysis
  • • Man-in-the-middle attacks

Protection

  • • Encryption protocols
  • • Digital signatures
  • • VPN tunnels
  • • SSL/TLS protocols
Key Concepts in Network Security

Encryption (E)

The process of converting plaintext into ciphertext using a cryptographic algorithm and secret key.

Plaintext → [E] → Ciphertext

Decryption (D)

The process of converting ciphertext back into plaintext using the same secret key.

Ciphertext → [D] → Plaintext

Authentication (A)

Verifying the identity of the sender and ensuring the message hasn't been tampered with.

[A] = Digital Signature / MAC

Secret Key

Shared secret information known only to the sender and recipient, essential for encryption/decryption.

Must be securely shared via TTP
Security Goals in Network Communication

Confidentiality

Ensures that only the intended recipient can read the message. Opponent cannot understand encrypted content.

Integrity

Ensures that the message has not been altered during transmission. Any modification is detected.

Authentication

Ensures the recipient can verify the sender's identity and that the sender cannot deny sending the message.

Non-repudiation

Prevents the sender from denying that they sent a particular message. Provides proof of origin.