版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
NetworkSecurityContentsIntroductionCryptographySymmetric-KeyAlgorithmsPublic-KeyAlgorithmsDigitalSignaturesManagementofPublicKeysCommunicationSecurityAuthenticationProtocolsNeedforSecuritySomepeoplewhocausesecurityproblemsandwhyIntroductionNetworksecurityproblemscanbedividedroughlyintofourcloselyintertwinedareas:secrecy,authentication,nonrepudiation,andintegritycontrol.Secrecy,alsocalledconfidentiality,hastodowithkeepinginformationoutofthehandsofunauthorizedusers.Authenticationdealswithdeterminingwhomyouaretalkingtobeforerevealingsensitiveinformationorenteringintoabusinessdeal.Nonrepudiationdealswithsignatures:Howdoyouprovethatyourcustomerreallyplacedanelectronicorderfortenmillionleft-handeddoohickeysat89centseachwhenhelaterclaimsthepricewas69cents?Whereintheprotocolstacknetworksecuritybelongs.Inthephysicallayer,Inthedatalinklayer,Inthenetworklayer,Inthetransportlayer,IntheapplicationlayerCryptographyIntroductiontoCryptographySubstitutionCiphersTranspositionCiphersAnIntroductiontoCryptographyTheencryptionmodel(forasymmetric-keycipher)SubstitutionCiphersInasubstitutionciphereachletterorgroupoflettersisreplacedbyanotherletterorgroupofletterstodisguiseit.plaintext:abcdefghijklmnopqrstuvwxyzciphertext:QWERTYUIOPASDFGHJKLZXCVBNMForthekeyabove,theplaintextattack
wouldbetransformedintotheciphertextQZZQEA.TranspositionCiphersAtranspositioncipher.Symmetric-KeyAlgorithmsSymmetric-keyalgorithms:usedthesamekeyforencryptionanddecryptionCryptographicalgorithmscanbeimplementedineitherhardware(forspeed)orinsoftware(forflexibility).DES–TheDataEncryptionStandardProductCiphersBasicelementsofproductciphers.(a)P-box.(b)S-box.(c)Product.SubstitutionsareperformedbyS-boxesP-boxcanbemadetoperformanytranspositionDataEncryptionStandardThedataencryptionstandard.(a)Generaloutline.
(b)Detailofoneiteration.Thecircled+meansexclusiveOR.Public-KeyAlgorithmsAradicallynewkindofcryptosystem,oneinwhichtheencryptionanddecryptionkeysweredifferent,andthedecryptionkeycouldnotfeasiblybederivedfromtheencryptionkey.Inthiskindofcryptosystem,the(keyed)encryptionalgorithm,E,andthe(keyed)decryptionalgorithm,D,hadtomeetthreerequirements.Theserequirementscanbestatedsimplyasfollows:D(E(P))=PItisexceedinglydifficulttodeduceDfromE.Ecannotbebrokenbyachosenplaintextattack.Theencryptionalgorithmandthekeyaremadepublic,hencethenamepublic-keycryptography.Public-keycryptographyrequireseachusertohavetwokeys:apublickey,usedbytheentireworldforencryptingmessagestobesenttothatuser,andaprivatekey,whichtheuserneedsfordecryptingmessages.RSAOnegoodpublic-KeyalgorithmswasdiscoveredbyagroupatM.I.T.(Rivestetal.,1978).Itisknownbytheinitialsofthethreediscoverers(Rivest,Shamir,Adleman):RSA.TheRSAmethodisbasedonsomeprinciplesfromnumbertheory.Howtousethemethod:Choosetwolargeprimes,pandq(typically1024bits).Computen=pxqandz=(p-1)x(q-1).Chooseanumberrelativelyprimetozandcallitd.Findesuchthatexd=1modz.Withtheseparameterscomputedinadvance,wearereadytobeginencryption.groupingtheplaintextintoblocksofkbits,wherekisthelargestintegerforwhich2k<nistrue.Toencryptamessage,P,computeC=Pe(modn).TodecryptC,computeP=Cd(modn).
RSAAnexampleoftheRSAalgorithmp=3andq=11n=33andz=20d=7,e=3DigitalSignaturesTheauthenticityofmanylegal,financial,andotherdocumentsisdeterminedbythepresenceorabsenceofanauthorizedhandwrittensignature.Forcomputerizedmessagesystemstoreplacethephysicaltransportofpaperandinkdocuments,amethodmustbefoundtoallowdocumentstobesignedinanunforgeableway.Basically,whatisneededisasystembywhichonepartycansendasignedmessagetoanotherpartyinsuchawaythatthefollowingconditionshold:Thereceivercanverifytheclaimedidentityofthesender.Thesendercannotlaterrepudiatethecontentsofthemessage.Thereceivercannotpossiblyhaveconcoctedthemessagehimself.Symmetric-KeySignaturesOneapproachtodigitalsignaturesistohaveacentralauthoritythatknowseverythingandwhomeveryonetrusts.DigitalsignatureswithBigBrotherPublic-KeySignaturesDigitalsignaturesusingpublic-keycryptographyItwouldbeniceifsigningdocumentsdidnotrequireatrustedauthority.thepublic-keyencryptionanddecryptionalgorithmshavethepropertythatE(D(P))=Pinaddition,ofcourse,totheusualpropertythatD(E(P))=P.
MessageDigestsAnauthenticationschemethatdoesnotrequireencryptingtheentiremessagemessagedigest:aone-wayhashfunction,MD,thattakesanarbitrarilylongpieceofplaintextandfromitcomputesafixed-lengthbitstring.messagedigesthasfourimportantpropertiesGivenP,itiseasytocomputeMD(P).GivenMD(P),itiseffectivelyimpossibletofindPGivenPnoonecanfindP'suchthatMD(P')=MD(P).Achangetotheinputofeven1bitproducesaverydifferentoutput.Computingamessagedigestfromapieceofplaintextismuchfasterthanencryptingthatplaintextwithapublic-keyalgorithm.Avarietyofmessagedigestfunctionshavebeenproposed.ThemostwidelyusedonesareMD5(Rivest,1992)andSHA-1(NIST,1993).SHA-1(SecureHashAlgorithm)processesinputdatain512-bitblocks,onlyunlikeMD5,itgeneratesa160-bitmessagedigestMessageDigestsDigitalsignaturesusingmessagedigestsSHA-1UseofSHA-1andRSAforsigningnonsecretmessages.ManagementofPublicKeysCertificatesX.509PublicKeyInfrastructuresProblemswithPublic-KeyEncryptionAwayforTrudytosubvertpublic-keyencryptionAsafirstattemptatdistributingpublickeyssecurely,wecouldimagineakeydistributioncenteravailableon-line24hoursadaytoprovidepublickeysondemand.AnorganizationthatcertifiespublickeysisnowcalledaCA(CertificationAuthority).CertificatesApossiblecertificateanditssignedhash.TheCAthenissuesacertificatesimilartotheoneinFig.8-24andsignsitsSHA-1hashwiththeCA'sprivatekey.ThisschemedoesnotrequiretheCAtobeon-lineforverificationX.509IfeverybodywhowantedsomethingsignedwenttotheCAwithadifferentkindofcertificate,managingallthedifferentformatswouldsoonbecomeaproblem.Tosolvethisproblem,astandardforcertificateshasbeendevisedandapprovedbyITU.ThestandardiscalledX.509andisinwidespreaduseontheInternet.TheIETFversionofX.509isdescribedinRFC3280.X.509isawaytodescribecertificatesX.509ThebasicfieldsofanX.509certificate.Forexample,ifBobworksintheloandepartmentoftheMoneyBank,hisX.500addressmightbe:/C=US/O=MoneyBank/OU=Loan/CN=Bob/
Public-KeyInfrastructuresPKI(PublicKeyInfrastructure):forcertifyingpublickeysAPKIhasmultiplecomponents,includingusers,CAs,certificates,anddirectories.WhatthePKIdoesisprovideawayofstructuringthesecomponentsanddefinestandardsforthevariousdocumentsandprotocols.Public-KeyInfrastructures(a)AhierarchicalPKI.(b)Achainofcertificates.RAs(RegionalAuthorities)trustanchorsCommunicationSecurityCommunicationsecurity:howtogetthebitssecretlyandwithoutmodificationfromsourcetodestinationandhowtokeepunwantedbitsoutsidethedoor.IPsec(IPsecurity)FirewallsIPsecThecompleteIPsecdesignisaframeworkformultipleservices,algorithmsandgranularities.Thereasonformultipleservicesisthatnoteveryonewantstopaythepriceforhavingalltheservicesallthetime,sotheservicesareavailablealacarte.Themajorservicesaresecrecy,dataintegrity,andprotectionfromreplayattacks(intruderreplaysaconversation).
Allofthesearebasedonsymmetric-keycryptographybecausehighperformanceiscrucial.Thereasonforhavingmultiplealgorithmsisthatanalgorithmthatisnowthoughttobesecuremaybebrokeninthefuture.BymakingIPsecalgorithm-independent,theframeworkcansurviveevenifsomeparticularalgorithmislaterbroken.ThereasonforhavingmultiplegranularitiesistomakeitpossibletoprotectasingleTCPconnection,alltrafficbetweenapairofhosts,oralltrafficbetweenapairofsecurerouters,amongotherpossibilities.IPSecThoughitisintheIPlayer,IPSecisconnectionoriented.tohaveanysecurity,akeymustbeestablishedandusedforsomeperiodoftime—inessence,akindofconnection.A''connection''inthecontextofIPseciscalledanSA(securityassociation).
AnSAisasimplexconnectionbetweentwoendpointsandhasasecurityidentifierassociatedwithit.Ifsecuretrafficisneededinbothdirections,twosecurityassociationsarerequired.Securityidentifiersarecarriedinpacketstravelingonthesesecureconnectionsandareusedtolookupkeysandotherrelevantinformationwhenasecurepacketarrives.IPsechastwoprincipalparts.Thefirstpartdescribestwonewheadersthatcanbeaddedtopacketstocarrythesecurityidentifier,integritycontroldata,andotherinformation.Theotherpart,ISAKMP(InternetSecurityAssociationandKeyManagementProtocol)dealswithestablishingkeys.IPSecIPseccanbeusedineitheroftwomodes.Intransportmode:theIPsecheaderisinsertedjustaftertheIPheader.TheProtocolfieldintheIPheaderischangedtoindicatethatanIPsecheaderfollowsthenormalIPheader(beforetheTCPheader).TheIPsecheadercontainssecurityinformation,primarilytheSAidentifier,anewsequencenumber,andpossiblyanintegritycheckofthepayload.Intunnelmode:theentireIPpacket,headerandall,isencapsulatedinthebodyofanewIPpacketwithacompletelynewIPheader.Tunnelmodeisusefulwhenthetunnelendsatalocationotherthanthefinaldestination.Insomecases,theendofthetunnelisasecuritygatewaymachine,forexample,acompanyfirewall.IPsecTheIPsecauthenticationheaderintransportmodeforIPv4.IPsecAHheaderTheNextheaderfieldisusedtostorethepreviousvaluethattheIPProtocolfieldhadbeforeitwasreplacedwith51toindicatethatanAHheaderfollows.ThePayloadlengthisthenumberof32-bitwordsintheAHheaderminus2.TheSecurityparametersindexistheconnectionidentifierTheSequencenumberfieldisusedtonumberallthepacketssentonanSA.theAuthenticationdata,whichisavariable-lengthfieldthatcontainsthepayload'sdigitalsignature.WhentheSAisestablished,thetwosidesnegotiatewhichsignaturealgorithmtheyaregoingtouse.SinceIPsecisbasedonsymmetric-keycryptographyandthesenderandreceivernegotiateasharedkeybeforesettingupanSA,thesharedkeyisusedinthesignaturecomputation.Thesharedkeyisnottransmitted,ofcourse.IPSecTheAHheaderdoesnotallowencryptionofthedata,soitismostlyusefulwhenintegritycheckingisneededbutsecrecyisnotneeded.OnenoteworthyfeatureofAHisthattheintegritycheckcoverssomeofthefieldsintheIPheader,namely,thosethatdonotchangeasthepacketmovesfromroutertorouter.TheTimetolivefieldchangesoneachhop,forexample,soitcannotbeincludedintheintegritycheck.However,theIPsourceaddressisincludedinthecheck,makingitimpossibleforanintrudertofalsifytheoriginofapacket.IPsec(a)ESPintransportmode.(b)ESPintunnelmode.FirewallsthedangerofinformationleakingoutadangerofinformationleakinginInparticular,viruses,worms,andotherdigitalpestscanbreachsecurity,destroyvaluabledata,andwastelargeamountsofadministrators'timetryingtocleanupthemesstheyleave.Consequently,mechanismsareneededtokeep''good''bitsinand''bad''bitsout.Firewalls:acompanycanhavemanyLANsconnectedinarbitraryways,butalltraffictoorfromthecompanyisforcedthroughanelectronicdrawbridge(firewall),asshowninFig.8-29
FirewallsAfirewallconsistingoftwopacketfiltersandanapplicationgateway
Firewalls-PacketfiltersEverypacketmusttransittwofiltersandanapplicationgatewaytogoinorout.Packetsmeetingsomecriterionareforwardednormally.Packetfiltersaretypicallydrivenbytablesconfiguredbythesystemadministrator.Thesetableslistsourcesanddestinationsthatareacceptable,sourcesanddestinationsthatareblocked,anddefaultrulesaboutwhattodowithpacketscomingfromorgoingtoothermachines.Blockingoutgoingpacketsistrickiersomesitesnotsticktothestandardportnumberingconventionsforsomeimportantservices,suchasFTP(FileTransferProtocol),portnumbersareassigneddynamicallyblockingUDPpacketsisevenharderFirewalls-ApplicationGatewayTheapplicationgatewayoperatesattheapplicationlevel.thegatewaydecideswhethertotransmitordiscardthemessagebasedonheaderfields,messagesize,oreventhecontent.FirewallsproblemsstillexistanintruderoutsidethefirewallcanputinfalsesourceaddressestobypassthischeckinsidershipsoutsecretdocumentsbyencryptingthemorevenphotographingthemandshippingthephotosasJPEGfiles,whichbypassesanywordfilters.awholeotherclassofattacksthatfirewallscannotdealwith:DoS(DenialofService)attacks,DDoS(DistributedDenialofService)attackAuthenticationProtocolsAuthenticationdealswiththequestionofwhetheryouareactuallycommunicatingwithaspecificprocess.Authorizationisconcernedwithwhatthatprocessispermittedtodo.Thegeneralmodelthatallauthenticationprotocolsusepublic-keycryptographyiswidelyusedfortheauthenticationprotocolsthemselvesandforestablishingthesessionkeyasecretsessionkeyforuseintheupcomingconversationAuthenticationprotocolsAuthenticationBasedonaSharedSecretKeyEstablishingaSharedKey:Diffie-HellmanAuthenticationUsingaKeyDistributionCenterAuthenticationUsingKerberosAuthenticationUsingPublic-KeyCryptographyAuthenticationBasedonaSharedSecretKeyFigure8-32Two-wayauthenticationusingachallenge-responseprotocolassumethatAliceandBobalreadyshareasecretkey,KAB
AuthenticationBasedonaSharedSecretKeyassumethatAliceandBobalreadyshareasecretkey,KABThisprotocolisbasedonaprinciplefoundinmanyauthenticationprotocols:onepartysendsarandomnumbertotheother,whothentransformsitinaspecialwayandthenreturnstheresult.Suchprotocolsarecalledchallenge-responseprotocols.notationused:A,BaretheidentitiesofAliceandBobRi'sarethechallenges,wherethesubscriptidentifiest
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 村委会安全生产七种制度
- 林业局内部控制基本制度
- 档案三合一制度指哪三合一
- 正兴街道办事处采购制度
- 民办学校部门责任制度
- 氧气厂应急管理工作制度
- 水泥生产线考核制度
- 汽修技术培训制度
- 河南人事档案数字化制度
- 电镀厂环境防治责任制度
- 病人防走失课件
- 饲料厂核算员工作流程
- 贵州茅台的经销申请书
- 大班音乐活动《光脚的小约翰》课件
- 2025湖南建投四建集团有限公司商务成控管理人员招聘笔试历年参考题库附带答案详解
- 2025年上海市事业单位招聘考试教师信息技术学科专业知识试卷试题
- 高考地理综合题答题术语库
- 中国美术学院合作协议书
- 2026年中考语文备考专题02:文言文对比阅读(《学弈》《关尹子教射》)12篇(解析版)
- T/CCAS 007-2019水泥产能核定标准
- 2024年陕西高中学业水平合格性考试数学试卷真题(含答案)
评论
0/150
提交评论