1. Trang chủ
  2. » Giáo án - Bài giảng

mạng máy tính nâng cao nguyễn đức thái chương ter8 network security sinhvienzone com

68 43 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 68
Dung lượng 3,98 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Public-Key SignaturesDigital signatures using public-key cryptography... Authentication Based on a Shared Secret Key 2A shortened two-way authentication protocol... Authentication Based

Trang 1

Network Security

Chapter 8

SinhVienZone.Com

Trang 3

Need for Security

Some people who cause security problems and why.

SinhVienZone.Com

Trang 4

An Introduction to Cryptography

The encryption model (for a symmetric-key cipher).

SinhVienZone.Com

Trang 5

Transposition Ciphers

A transposition cipher.

SinhVienZone.Com

Trang 6

One-Time Pads

The use of a one-time pad for encryption and the possibility of getting any possible plaintext from the ciphertext by the use of some other pad.

SinhVienZone.Com

Trang 7

Quantum Cryptography

SinhVienZone.Com

Trang 8

Symmetric-Key Algorithms

• DES – The Data Encryption Standard

• AES – The Advanced Encryption Standard

• Cipher Modes

• Other Ciphers

• Cryptanalysis

SinhVienZone.Com

Trang 9

Product Ciphers

Basic elements of product ciphers (a) P-box (b) S-box (c) Product.

SinhVienZone.Com

Trang 10

Data Encryption Standard

The data encryption standard (a) General outline.

SinhVienZone.Com

Trang 11

Triple DES

(a) Triple encryption using DES (b) Decryption.

SinhVienZone.Com

Trang 12

AES – The Advanced Encryption Standard

Rules for AES proposals

1 The algorithm must be a symmetric block cipher.

2 The full design must be public.

3 Key lengths of 128, 192, and 256 bits supported.

4 Both software and hardware implementations required

5 The algorithm must be public or licensed on

nondiscriminatory terms.

SinhVienZone.Com

Trang 13

AES (2)

An outline of

Rijndael.

SinhVienZone.Com

Trang 14

AES (3)

Creating of the state and rk arrays.

SinhVienZone.Com

Trang 15

Electronic Code Book Mode

The plaintext of a file encrypted as 16 DES blocks.

SinhVienZone.Com

Trang 16

Cipher Block Chaining Mode

Cipher block chaining (a) Encryption (b) Decryption.

SinhVienZone.Com

Trang 17

Cipher Feedback Mode

(a) Encryption (c) Decryption.

SinhVienZone.Com

Trang 18

Stream Cipher Mode

A stream cipher (a) Encryption (b) Decryption.

SinhVienZone.Com

Trang 19

Counter Mode

Encryption using counter mode.

SinhVienZone.Com

Trang 20

Some common symmetric-key cryptographic algorithms.

SinhVienZone.Com

Trang 21

Public-Key Algorithms

• Other Public-Key Algorithms

SinhVienZone.Com

Trang 22

An example of the RSA algorithm.

SinhVienZone.Com

Trang 24

Symmetric-Key Signatures

Digital signatures with Big Brother.

SinhVienZone.Com

Trang 25

Public-Key Signatures

Digital signatures using public-key cryptography.

SinhVienZone.Com

Trang 26

Message Digests

Digital signatures using message digests.

SinhVienZone.Com

Trang 27

Use of SHA-1 and RSA for signing nonsecret messages.

SinhVienZone.Com

Trang 28

SHA-1 (2)

(a) A message padded out to a multiple of 512 bits

SinhVienZone.Com

Trang 29

Management of Public Keys

• Certificates

• X.509

• Public Key Infrastructures

SinhVienZone.Com

Trang 30

Problems with Public-Key Encryption

A way for Trudy to subvert public-key encryption.

SinhVienZone.Com

Trang 31

A possible certificate and its signed hash.

SinhVienZone.Com

Trang 32

The basic fields of an X.509 certificate.

SinhVienZone.Com

Trang 33

Public-Key Infrastructures

(a) A hierarchical PKI (b) A chain of certificates.

SinhVienZone.Com

Trang 35

The IPsec authentication header in transport mode for IPv4.

SinhVienZone.Com

Trang 36

IPsec (2)

(a) ESP in transport mode (b) ESP in tunnel mode.

SinhVienZone.Com

Trang 37

A firewall consisting of two packet filters and an application gateway.

SinhVienZone.Com

Trang 38

Virtual Private Networks

(a) A leased-line private network (b) A virtual private network.

SinhVienZone.Com

Trang 39

802.11 Security

Packet encryption using WEP.

SinhVienZone.Com

Trang 40

Authentication Protocols

• Authentication Based on a Shared Secret Key

• Establishing a Shared Key: Diffie-Hellman

• Authentication Using a Key Distribution Center

• Authentication Using Kerberos

• Authentication Using Public-Key Cryptography

SinhVienZone.Com

Trang 41

Authentication Based on a Shared Secret Key

SinhVienZone.Com

Trang 42

Authentication Based on a Shared Secret Key (2)

A shortened two-way authentication protocol.

SinhVienZone.Com

Trang 43

Authentication Based on a Shared Secret Key (3)

The reflection attack.

SinhVienZone.Com

Trang 44

Authentication Based on a Shared Secret Key (4)

A reflection attack on the protocol of Fig 8-32

SinhVienZone.Com

Trang 45

Authentication Based on a Shared Secret Key (5)

Authentication using HMACs.

SinhVienZone.Com

Trang 46

Establishing a Shared Key:

The Diffie-Hellman Key Exchange

The Diffie-Hellman key exchange.

SinhVienZone.Com

Trang 47

Establishing a Shared Key:

The Diffie-Hellman Key Exchange

The bucket brigade or man-in-the-middle attack.

SinhVienZone.Com

Trang 48

Authentication Using a Key Distribution Center

A first attempt at an authentication protocol using a KDC.

SinhVienZone.Com

Trang 49

Authentication Using a Key Distribution Center (2)

The Needham-Schroeder authentication protocol.

SinhVienZone.Com

Trang 50

Authentication Using a Key Distribution Center (3)

The Otway-Rees authentication protocol (slightly simplified).

SinhVienZone.Com

Trang 51

Authentication Using Kerberos

The operation of Kerberos V4.

SinhVienZone.Com

Trang 52

Authentication Using Public-Key Cryptography

Mutual authentication using public-key cryptography.

SinhVienZone.Com

Trang 53

E-Mail Security

• PGP – Pretty Good Privacy

• PEM – Privacy Enhanced Mail

• S/MIME

SinhVienZone.Com

Trang 54

PGP – Pretty Good Privacy

PGP in operation for sending a message.

SinhVienZone.Com

Trang 55

PGP – Pretty Good Privacy (2)

A PGP message.

SinhVienZone.Com

Trang 56

Web Security

• Threats

• Secure Naming

• SSL – The Secure Sockets Layer

• Mobile Code Security

SinhVienZone.Com

Trang 57

Secure Naming

(a) Normal situation (b) An attack based on breaking

SinhVienZone.Com

Trang 58

Secure Naming (2)

How Trudy spoofs Alice's ISP.

SinhVienZone.Com

Trang 59

Secure DNS

An example RRSet for bob.com The KEY record is Bob's

public key The SIG record is the top-level com server's signed has of the A and KEY records to verify their authenticity.

SinhVienZone.Com

Trang 60

Self-Certifying Names

A self-certifying URL containing a hash of server's

name and public key.

SinhVienZone.Com

Trang 61

SSL—The Secure Sockets Layer

Layers (and protocols) for a home user browsing with SSL.

SinhVienZone.Com

Trang 62

SSL (2)

A simplified version of the SSL connection establishment subprotocol.

SinhVienZone.Com

Trang 63

SSL (3)

SinhVienZone.Com

Trang 64

Java Applet Security

Applets inserted into a Java Virtual Machine

SinhVienZone.Com

Trang 66

Anonymous Remailers

Users who wish anonymity chain requests through

SinhVienZone.Com

Trang 67

Freedom of Speech

Possibly banned material:

1 Material inappropriate for children or teenagers.

2 Hate aimed at various ethnic, religious, sexual, or other

groups.

3 Information about democracy and democratic values.

4 Accounts of historical events contradicting the

government's version.

5 Manuals for picking locks, building weapons, encrypting

messages, etc.

SinhVienZone.Com

Trang 68

(a) Three zebras and a tree (b) Three zebras, a tree, and the

SinhVienZone.Com

Ngày đăng: 30/01/2020, 23:02

🧩 Sản phẩm bạn có thể quan tâm