1. Trang chủ
  2. » Cao đẳng - Đại học

Slide mạng máy tính nâng cao chapter8 network security

68 9 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Nội dung

Chapter Network Security CuuDuongThanCong.com https://fb.com/tailieudientucntt Cryptography • • • • • Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles CuuDuongThanCong.com https://fb.com/tailieudientucntt Need for Security Some people who cause security problems and why CuuDuongThanCong.com https://fb.com/tailieudientucntt An Introduction to Cryptography The encryption model (for a symmetric-key cipher) CuuDuongThanCong.com https://fb.com/tailieudientucntt Transposition Ciphers A transposition cipher CuuDuongThanCong.com https://fb.com/tailieudientucntt One-Time Pads The use of a one-time pad for encryption and the possibility of getting any possible plaintext from the ciphertext by the use of some other pad CuuDuongThanCong.com https://fb.com/tailieudientucntt Quantum Cryptography An example of quantum cryptography CuuDuongThanCong.com https://fb.com/tailieudientucntt Symmetric-Key Algorithms • • • • • DES – The Data Encryption Standard AES – The Advanced Encryption Standard Cipher Modes Other Ciphers Cryptanalysis CuuDuongThanCong.com https://fb.com/tailieudientucntt Product Ciphers Basic elements of product ciphers (a) P-box (b) S-box (c) Product CuuDuongThanCong.com https://fb.com/tailieudientucntt Data Encryption Standard The data encryption standard (a) General outline (b) Detail of one iteration The circled + means exclusive OR CuuDuongThanCong.com https://fb.com/tailieudientucntt PGP – Pretty Good Privacy PGP in operation for sending a message CuuDuongThanCong.com https://fb.com/tailieudientucntt PGP – Pretty Good Privacy (2) A PGP message CuuDuongThanCong.com https://fb.com/tailieudientucntt Web Security • • • • Threats Secure Naming SSL – The Secure Sockets Layer Mobile Code Security CuuDuongThanCong.com https://fb.com/tailieudientucntt Secure Naming (a) Normal situation (b) An attack based on breaking into DNS and modifying Bob's record CuuDuongThanCong.com https://fb.com/tailieudientucntt Secure Naming (2) How Trudy spoofs Alice's ISP CuuDuongThanCong.com https://fb.com/tailieudientucntt Secure DNS An example RRSet for bob.com The KEY record is Bob's public key The SIG record is the top-level com server's signed has of the A and KEY records to verify their authenticity CuuDuongThanCong.com https://fb.com/tailieudientucntt Self-Certifying Names A self-certifying URL containing a hash of server's name and public key CuuDuongThanCong.com https://fb.com/tailieudientucntt SSL—The Secure Sockets Layer Layers (and protocols) for a home user browsing with SSL CuuDuongThanCong.com https://fb.com/tailieudientucntt SSL (2) A simplified version of the SSL connection establishment subprotocol CuuDuongThanCong.com https://fb.com/tailieudientucntt SSL (3) Data transmission using SSL CuuDuongThanCong.com https://fb.com/tailieudientucntt Java Applet Security Applets inserted into a Java Virtual Machine interpreter inside the browser CuuDuongThanCong.com https://fb.com/tailieudientucntt Social Issues • Privacy • Freedom of Speech • Copyright CuuDuongThanCong.com https://fb.com/tailieudientucntt Anonymous Remailers Users who wish anonymity chain requests through multiple anonymous remailers CuuDuongThanCong.com https://fb.com/tailieudientucntt Freedom of Speech Possibly banned material: Material inappropriate for children or teenagers Hate aimed at various ethnic, religious, sexual, or other groups Information about democracy and democratic values Accounts of historical events contradicting the government's version Manuals for picking locks, building weapons, encrypting messages, etc CuuDuongThanCong.com https://fb.com/tailieudientucntt Steganography (a) Three zebras and a tree (b) Three zebras, a tree, and the complete text of five plays by William Shakespeare CuuDuongThanCong.com https://fb.com/tailieudientucntt ... https://fb.com/tailieudientucntt Virtual Private Networks (a) A leased-line private network (b) A virtual private network CuuDuongThanCong.com https://fb.com/tailieudientucntt 802.11 Security Packet encryption using... CuuDuongThanCong.com https://fb.com/tailieudientucntt Communication Security • • • • IPsec Firewalls Virtual Private Networks Wireless Security CuuDuongThanCong.com https://fb.com/tailieudientucntt... Cryptographic Principles CuuDuongThanCong.com https://fb.com/tailieudientucntt Need for Security Some people who cause security problems and why CuuDuongThanCong.com https://fb.com/tailieudientucntt

Ngày đăng: 14/12/2021, 07:13