网络信息安全原理简介.ppt
《网络信息安全原理简介.ppt》由会员分享,可在线阅读,更多相关《网络信息安全原理简介.ppt(42页珍藏版)》请在课桌文档上搜索。
1、,1,网络信息安全原理简介,2,Outline,Foundations:what is security?cryptographyauthenticationmessage integritykey distribution and certificationSecurity in practice:application layer:secure e-mailtransport layer:Internet commerce,SSL,SETnetwork layer:IP security,3,Friends and enemies:Alice,Bob,Trudy,well-known in
2、 network security worldBob,Alice(lovers!)want to communicate“securely”Trudy,the“intruder”may intercept,delete,add messages,Figure 7.1 goes here,4,What is network security?,Secrecy:only sender,intended receiver should“understand”msg contentssender encrypts msgreceiver decrypts msgAuthentication:sende
3、r,receiver want to confirm identity of each other Message Integrity:sender,receiver want to ensure message not altered(in transit,or afterwards)without detection,5,Internet security threats,Packet sniffing:broadcast mediapromiscuous NIC reads all packets passing bycan read all unencrypted data(e.g.p
4、asswords)e.g.:C sniffs Bs packets,6,Internet security threats,IP Spoofing:can generate“raw”IP packets directly from application,putting any value into IP source address fieldreceiver cant tell if source is spoofede.g.:C pretends to be B,A,B,C,7,Internet security threats,Denial of service(DOS):flood
5、of maliciously generated packets“swamp”receiverDistributed DOS(DDOS):multiple coordinated sources swamp receivere.g.,C and remote host SYN-attack A,A,B,C,8,The language of cryptography,symmetric key crypto:sender,receiver keys identicalpublic-key crypto:encrypt key public,decrypt key secret,Figure 7
6、.3 goes here,plaintext,plaintext,ciphertext,9,Symmetric key cryptography,substitution cipher:substituting one thing for anothermonoalphabetic cipher:substitute one letter for another,plaintext:abcdefghijklmnopqrstuvwxyz,ciphertext:mnbvcxzasdfghjklpoiuytrewq,Plaintext:bob.i love you.alice,ciphertext:
7、nkn.s gktc wky.mgsbc,E.g.:,Q:How hard to break this simple cipher?:brute force(how hard?)other?,10,Symmetric key crypto:DES,DES:Data Encryption StandardUS encryption standard NIST 199356-bit symmetric key,64 bit plaintext inputHow secure is DES?DES Challenge:56-bit-key-encrypted phrase(“Strong crypt
8、ography makes the world a safer place”)decrypted(brute force)in 4 monthsno known“backdoor”decryption approachmaking DES more secureuse three keys sequentially(3-DES)on each datumuse cipher-block chaining,11,Symmetric key crypto:DES,initial permutation 16 identical“rounds”of function application,each
9、 using different 48 bits of keyfinal permutation,12,Public Key Cryptography,symmetric key cryptorequires sender,receiver know shared secret keyQ:how to agree on key in first place(particularly if never“met”)?,public key cryptographyradically different approach Diffie-Hellman76,RSA78sender,receiver d
10、o not share secret keyencryption key public(known to all)decryption key private(known only to receiver),13,Public key cryptography,Figure 7.7 goes here,14,Public key encryption algorithms,need d()and e()such that,B,B,.,.,Two inter-related requirements:,RSA:Rivest,Shamir,Adelson algorithm,15,RSA:Choo
11、sing keys,1.Choose two large prime numbers p,q.(e.g.,1024 bits each),2.Compute n=pq,z=(p-1)(q-1),3.Choose e(with en)that has no common factors with z.(e,z are“relatively prime”).,4.Choose d such that ed-1 is exactly divisible by z.(in other words:ed mod z=1).,5.Public key is(n,e).Private key is(n,d)
12、.,16,RSA:Encryption,decryption,0.Given(n,e)and(n,d)as computed above,2.To decrypt received bit pattern,c,compute,(i.e.,remainder when c is divided by n),d,17,RSA example:,Bob chooses p=5,q=7.Then n=35,z=24.,e=5(so e,z relatively prime).d=29(so ed-1 exactly divisible by z.,letter,m,m,e,l,12,1524832,1
13、7,c,17,481968572106750915091411825223072000,12,letter,l,encrypt:,decrypt:,18,Authentication,Goal:Bob wants Alice to“prove”her identity to him,Protocol ap1.0:Alice says“I am Alice”,Failure scenario?,19,Authentication:another try,Protocol ap2.0:Alice says“I am Alice”and sends her IP address along to“p
14、rove”it.,Failure scenario?,20,Authentication:another try,Protocol ap3.0:Alice says“I am Alice”and sends her secret password to“prove”it.,Failure scenario?,21,Authentication:yet another try,Protocol ap3.1:Alice says“I am Alice”and sends her encrypted secret password to“prove”it.,Failure scenario?,I a
15、m Aliceencrypt(password),22,Authentication:yet another try,Goal:avoid playback attack,Failures,drawbacks?,Figure 7.11 goes here,Nonce:number(R)used onlyonce in a lifetime,ap4.0:to prove Alice“live”,Bob sends Alice nonce,R.Alicemust return R,encrypted with shared secret key,23,Figure 7.12 goes here,A
16、uthentication:ap5.0,ap4.0 requires shared symmetric keyproblem:how do Bob,Alice agree on keycan we authenticate using public key techniques?ap5.0:use nonce,public key cryptography,24,Figure 7.14 goes here,ap5.0:security hole,Man(woman)in the middle attack:Trudy poses as Alice(to Bob)and as Bob(to Al
17、ice),Need“certified”public keys(more later),25,Digital Signatures,Cryptographic technique analogous to hand-written signatures.Sender(Bob)digitally signs document,establishing he is document owner/creator.Verifiable,nonforgeable:recipient(Alice)can verify that Bob,and no one else,signed document.,Si
18、mple digital signature for message m:Bob encrypts m with his private key dB,creating signed message,dB(m).Bob sends m and dB(m)to Alice.,26,Digital Signatures(more),Suppose Alice receives msg m,and digital signature dB(m)Alice verifies m signed by Bob by applying Bobs public key eB to dB(m)then chec
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 网络 信息 安全 原理 简介

链接地址:https://www.desk33.com/p-233730.html