Advanced Computer Networks: Lecture 40. This lecture will cover the following: security; encryption algorithms; cryptography functions; taxonomy of network security; secret key encryption; public key authentication; authentication protocols; message integrity protocols; key distribution; firewalls;...
Trang 11 1
CS716 Advanced Computer Networks
By Dr. Amir Qayyum
Trang 2Lecture No. 40
Trang 4– Integrity: making sure message has not been
altered
Trang 5Taxonomy of Network Security
Security
Cryptography algorithms
Public key (e.g RSA)
Secret
key
(e.g DES)
Message digest (e.g MD5)
Security services
Authentication
integrity
Trang 6Secret Key Encryption
Trang 8Final permutation
Trang 9Expansion Phase of DES
4-bit chunk
Expanded to 6 bits by stealing
a bit from left and right chunks
■ ■ ■
■ ■ ■
Trang 11• Repeat for larger messages
Cipher Block Chaining (CBC)
Block 1 IV
+ +
+
Trang 12Public Key Encryption
Trang 13Public Key Authentication
Trang 14Plaintext Decrypt with private key
Trang 15– Two numbers are relatively prime if they have no common factor greater than one
Trang 17Message Digest
– Just as a regular checksum protects the receiver from accidental changes to the message, a cryptographic checksum
protects the receiver from malicious
changes to the message
Trang 24Message Integrity
Trang 25• Applies MD5 to the concatenation of this random key message
Trang 27Treestructured CA Hierarchy
Trang 28Authentication
Trang 29Session Key Communication
Trang 30Session Key Communication
Trang 31Key
Distribution
Center